On Mon, Jul 15, 2019 at 8:14 AM Paul Vixie <p...@redbarn.org> wrote: > On Monday, 15 July 2019 02:17:04 UTC Rob Sayre wrote: > > On Sun, Jul 14, 2019 at 6:59 PM Paul Vixie <p...@redbarn.org> wrote: > > > ... > > > > I'm surprised that you seem to view DoH as a problem. I mean, everyone > knows > > that TLS and IPSEC are compromised by determined attackers, ... > > if you know a way that modern TLS 1.3 can be compromised by MiTM
I think some parties just ask for the certs, if they can't acquire them due to negligence. > , i'd like to > know more. a lot of us are moving from MiTM to explicit outbound proxy > with an > internally trusted key in order to fulfill our corporate or regulatory > obligations. > > > but I didn't know > > it was a continued sore spot. If you have more to say, I would like to > hear > > it. > > the introduction of the DoH RFC explains that this protocol is designed to > prevent interference by on-path actors in dns operations. i am a > committed, > determined on-path interferer, both for parental controls at home and > corporate controls at $dayjob. > This response is disappointing to me, but I have to congratulate its directness. thanks, Rob
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop