On 2019-03-12 4:51 p.m., Paul Vixie wrote:
On Tuesday, 12 March 2019 21:38:44 UTC Stephen Farrell wrote:
DoH intends "to prevent on-path interference with DNS operations", and that's
well beyond the remit of RFC 7626, and is therefore not spoken to one way or
another by IETF consensus. i do not believe that a non-interference objective
would reach broader IETF consensus. perhaps we can test that one day.
I'm not sure I understand the double-double negative happening here.
It appears to me that there is considerable support for DoH, meaning
there is support for non-interference.
In the IPv6 spectrum with the mac/slaac randomization games which have
become standardized, and which have been instituted to supply other
forms of security/hiding/non-interference, it appears that DoH would
similarly be 'allowed' through the standardization process.
Having said that, and if this is how one performs the testing, I would
have to say that DoH would be make it much harder for me as a security
engineer to perform my duties.
It would seem that if DoH is standardized, then it would probably become
standard practice, then like 8.8.8.8 and similar quads, by default
meaningful data becomes hidden for managing the interior of networks.
For some networks, pi-hole is a mechanism for preventing certain traffic
operations. AS I look at it this moment, it has over 112K domains
blacklisted, and on one particular network, 31% of the queries have been
blocked as a passive protection mechanism.
I find these blocks useful. With DoH, probably DoH would become
ubiquitous, and these types of blocks would be prevented.
Https is common ground for much hiding. DNS is probably our last
bastion of having any semblance of identification of what is happneing
to the interior of our networks. Carriers might not be so concerned.
But for those who operation enterprise, business, home, some forms of
social protection, security management becomes more difficult.
As has happened in the IPv6 space, the same happens here in the DNS
space: there are groups who wish the privacy/non-interference/hiding
ability vs the groups who need the information in the data streams to
properly secure and manage the interior and perimeter.
How would the requirements of each group be recognized? The simplest
would be to not proceed with DoH.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop