>> ISTM that it is quite possible that enterprises that deploy their own DoH
>> services could potentially reduce such leakage and gain overall. (I'm
>> assuming here that sensible browser-makers will end up providing
>> something that works for browsers running in networks with split-horizon
>> setups before those browsers turn on DoH as a default at scale.)
> 
> If Enterprise network provides a DoT/DoH server, browser should be able to 
> discover and use the Enterprise DoT/DoH server.

Well until now there has been no discovery mechanism for DoH servers. There is 
now draft adopted by the DoH WG that proposes a discovery mechanism. However 
whether browsers actually use it is another question. Hence the draft by 
VIttorio.

Neil

> On 12 Mar 2019, at 06:14, Konda, Tirumaleswar Reddy 
> <tirumaleswarreddy_ko...@mcafee.com> wrote:
> 
>> -----Original Message-----
>> From: Stephen Farrell <stephen.farr...@cs.tcd.ie 
>> <mailto:stephen.farr...@cs.tcd.ie>>
>> Sent: Tuesday, March 12, 2019 5:30 AM
>> To: Paul Vixie <p...@redbarn.org <mailto:p...@redbarn.org>>; d...@ietf.org 
>> <mailto:d...@ietf.org>
>> Cc: nalini elkins <nalini.elk...@e-dco.com 
>> <mailto:nalini.elk...@e-dco.com>>; Konda, Tirumaleswar Reddy
>> <tirumaleswarreddy_ko...@mcafee.com 
>> <mailto:tirumaleswarreddy_ko...@mcafee.com>>; dnsop@ietf.org 
>> <mailto:dnsop@ietf.org>; Ackermann,
>> Michael <mackerm...@bcbsm.com <mailto:mackerm...@bcbsm.com>>; Christian 
>> Huitema
>> <huit...@huitema.net <mailto:huit...@huitema.net>>; dns-priv...@ietf.org 
>> <mailto:dns-priv...@ietf.org>; Vittorio Bertola
>> <vittorio.bertola=40open-xchange....@dmarc.ietf.org 
>> <mailto:vittorio.bertola=40open-xchange....@dmarc.ietf.org>>
>> Subject: Re: [dns-privacy] [DNSOP] New: draft-bertola-bcp-doh-clients
>> 
>> 
>> (This distribution list is too scattered and diverse. Be great if some AD or
>> someone just picked one list for this.
>> In the meantime...)
>> 
>> On 11/03/2019 20:43, nalini elkins wrote:
>>> impact assessment that certain changes such as DoH and TLS1.3 will
>>> have on enterprises,
>> 
>> TLS1.3 will, I expect, noticeably improve security for an awful lot of
>> enterprises in time.
>> 
>> As for DoH, I wonder has anyone done studies on how split-horizon names
>> and access patterns leak today?
>> 
>> I don't recall having read that kind of study. I can imagine many ways in
>> which that kind of stuff would leak. I'd be very surprised if it never 
>> happens.
>> I don't know how often it does.
>> 
>> For names, leaking once is kinda fatal. For access patterns, I guess one leak
>> exposes an IP address that's interested in a name (e.g. secret-
>> project.example.com) but more would be needed for broader access
>> patterns to be exposed to "foreign"
>> recursives and/or in-band networks.
>> 
>> ISTM that it is quite possible that enterprises that deploy their own DoH
>> services could potentially reduce such leakage and gain overall. (I'm
>> assuming here that sensible browser-makers will end up providing
>> something that works for browsers running in networks with split-horizon
>> setups before those browsers turn on DoH as a default at scale.)
> 
> If Enterprise network provides a DoT/DoH server, browser should be able to 
> discover and use the Enterprise DoT/DoH server.
> 
> -Tiru
> 
>> 
>> Cheers,
>> S.
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org <mailto:DNSOP@ietf.org>
> https://www.ietf.org/mailman/listinfo/dnsop 
> <https://www.ietf.org/mailman/listinfo/dnsop>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to