On 5/2/19 10:59 PM, John Levine wrote:
> I believe that DoT and DoH have the same certificate issues as the web
> server.  I suppose you could find your DoH server by name, but if you
> can do that, you could equally well find your DoT or .well-known
> server by name and define the problem out of existence.

I think it's best to verify by name, even if the DNS server is reached
through a hard-configured IP.  That's what we implemented for Knot
Resolver, at least.  On a related note, I'd also expect to send the name
as SNI by default; 8.8.8.8 was not even sending me a certificate unless
I sent SNI (only when using TLS 1.3 though)

--Vladimir

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to