No. i might did not explain it clearly.  

Regarding connecting requirement, my proposal is no different from existing DNS 
except the recursive server 
needs to talk to authoritative server via HTTPS(or TLS) using the TLSA record. 
The TLSA record contains child zone's(or the server hosting that child zone, 
those details can be discussed in the future)
 public key and is published in the parent zone. 
 I mean, for the authoritive servers, the trust chain can be built using TLSA 
other then DS. then a recursive server can ensure
the data it receives in each step of resolving comes from an authenticated 
server and is encrypted.


zuop...@cnnic.cn
 
From: Paul Wouters
Date: 2019-02-14 15:34
To: zuop...@cnnic.cn
CC: Stephane Bortzmeyer; dnsop
Subject: Re: Re: [DNSOP] extension of DoH to authoritative servers
On Thu, 14 Feb 2019, zuop...@cnnic.cn wrote:
 
> This idea is just a sketch model and provides another option for DNS security 
> and privacy. Transiting trust is hard but may be accomplished in the future. T
> he deployment of DNSSEC also takes a long time and is still in progress. 
 
No. It simply will break applications. For example, the libreswan IKE
daemon using DNSSEC will use the system's forwarder and perform full
DNSSEC validation, without having any idea of the chain of forwarders.
It does not need to, because it is using proper DNSSEC validation.
 
Your proposal of using transport security implies your node can always
talk to any worldwide DNS server. That is not the case in most networks.
 
Paul
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to