Deirdre Connolly wrote on 2024-09-30 10:59:
> We could add a recommendation like "Clients using ECH SHOULD select a DNS resolver that they trust to preserve the confidentiality of their queries and return authentic answers, and communicate using an authenticated and confidential transport", but this draft seems like an odd place for that text.
I support this more than the DNSSEC recommendation
i would not. much of the world now relies upon inauthentic dns responses 
for defense against bad actors. here's how US NCCIS puts it:
https://www.cisa.gov/news-events/alerts/2021/03/04/joint-nsa-and-cisa-guidance-strengthening-cyber-defense-through

it is precisely to prevent protective dns from being bypasses that many of us block all off-net DNS including off-net HTTPS to known DoH services. malicious insiders, intruders, malware, and poisoned supply chains do not want their DNS lookups to be monitored or blocked.
we can argue about where the advice should and shouldn't appear, but we 
mustn't appeal to "response authenticity" when recommending a recursive 
DNS service. response authenticity is what our attackers need.
--
P Vixie

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to