On Mon, Jul 15, 2019 at 8:53 PM Rob Sayre <say...@gmail.com> wrote: > > > On Mon, Jul 15, 2019 at 8:14 AM Paul Vixie <p...@redbarn.org> wrote: > >> On Monday, 15 July 2019 02:17:04 UTC Rob Sayre wrote: >> > On Sun, Jul 14, 2019 at 6:59 PM Paul Vixie <p...@redbarn.org> wrote: >> > > ... >> > >> > I'm surprised that you seem to view DoH as a problem. I mean, everyone >> knows >> > that TLS and IPSEC are compromised by determined attackers, ... >> >> if you know a way that modern TLS 1.3 can be compromised by MiTM > > > I think some parties just ask for the certs, if they can't acquire them > due to negligence. >
The certs are public information, so having the certs isn't useful. Can you please be clearer about the attack you are describing? -Ekr > > >> , i'd like to >> know more. a lot of us are moving from MiTM to explicit outbound proxy >> with an >> internally trusted key in order to fulfill our corporate or regulatory >> obligations. >> >> > but I didn't know >> > it was a continued sore spot. If you have more to say, I would like to >> hear >> > it. >> >> the introduction of the DoH RFC explains that this protocol is designed >> to >> prevent interference by on-path actors in dns operations. i am a >> committed, >> determined on-path interferer, both for parental controls at home and >> corporate controls at $dayjob. >> > > This response is disappointing to me, but I have to congratulate its > directness. > > thanks, > Rob > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop