Moin!

On 16 Oct 2023, at 12:37, Peter Thomassen wrote:
> I share this concern (and Eric's, where the error page is an impersonation of 
> the target page!), and am not convinced that the potential benefit is larger 
> than the harm.

As said before an interstitial page created by the browser before the actual 
block page seems like a better solution to me than not have.

> An alternate route could be to make the error page "well-known", based on the 
> encrypted resolver's hostname (e.g. 
> https://dns.adguard.com/?malw.scalone.eu.), and have the browser display a 
> big warning ("This content does not come from the page you requested.).
>

DNS or even DoH resolvers are not general purpose web servers. So having the 
resolver issue a block page is a non starter at least for me. The whole point 
of using URLs is to point it somewhere where it can be served efficient. We 
could go down the road of requiring the resolver IP cert, but that would not 
work for DNR upgraded resolver.

Overall I think the browser displaying the URL and the web page having the 
certificate over the domain of the URL seems sufficient to me. The browser 
could check for not allowing certain  UTF characters or maybe having a 
reputation list, but that should be a secondary measurement.

So long
-Ralf
---
Ralf Weber
Principal Architect, Carrier Division

Akamai Technologies GmbH
Parkring 20-22, 85748 Garching
phone: +49.89.9400.6174
mobile: +49.151.22659325

Geschäftsführer: David Matthew McDonald Aitken, Justyna Kalina
Jankowska
Sitz der Gesellschaft: Garching
Amtsgericht München HRB 129886

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to