> On Jan 21, 2021, at 8:59 PM, Paul Vixie <p...@redbarn.org> wrote:
> 
> On Thu, Jan 21, 2021 at 03:36:41PM -0800, Wes Hardaker wrote:
>> "John Levine" <jo...@taugh.com> writes:
>> 
>>> They think DoH is swell, but not when it bypasses security controls
>>> and leaks info to random outside people
>> 
>> At least 15% of network operators seem to agree.
>> 
>> https://www.isi.edu/~hardaker/news/20191120-canary-domain-measuring.html
> 
> i think the makers of canary-respecting DNS stub resolvers are still
> figuring things out, and that if canary domains become prevalent,
> especially among surveillance capitalist ISPs or surveillance
> authoritarian states, the days of canary domains will change or end.
> 
> for my own networks, i won't install a canary domain, because that's
> a late-imposed change, unreliable, and a negative externality. any
> stub resolver who uses any DNS service other than the one i hand out
> in my DHCP assignments will be removed from the network.
> 
> (new behaviour should require new signalling. let networks who want to
> permit DNS bypass either by "use 8.8.8.8" or "use DoH" or otherwise,
> signal this by adding a new canary domain, or a new DHCP option.
> absent new signalling, behaviour should not change.)
> 
> -- 
> Paul Vixie

Would it be ok to allow DNSSEC signed responses from any server? If they’re 
signed and verified, does it matter how you got them?

Thanks,
Tom
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to