server.  I suppose you could find your DoH server by name, but if you
can do that, you could equally well find your DoT or .well-known
server by name and define the problem out of existence.

I think it's best to verify by name, even if the DNS server is reached
through a hard-configured IP.  That's what we implemented for Knot
Resolver, at least.  On a related note, I'd also expect to send the name
as SNI by default; 8.8.8.8 was not even sending me a certificate unless
I sent SNI (only when using TLS 1.3 though)

When I said verify by name I meant by DNS name, so the certs can be signed by the existing ACME protocol or whatever.

Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to