Deirdre Connolly wrote on 2024-09-30 10:59:
> We could add a recommendation like "Clients using ECH SHOULD select a DNS resolver that they trust to preserve the confidentiality of their queries and return authentic answers, and communicate using an authenticated and confidential transport", but this draft seems like an odd place for that text.

I support this more than the DNSSEC recommendation

i would not. much of the world now relies upon inauthentic dns responses for defense against bad actors. here's how US NCCIS puts it:

https://www.cisa.gov/news-events/alerts/2021/03/04/joint-nsa-and-cisa-guidance-strengthening-cyber-defense-through

it is precisely to prevent protective dns from being bypasses that many of us block all off-net DNS including off-net HTTPS to known DoH services. malicious insiders, intruders, malware, and poisoned supply chains do not want their DNS lookups to be monitored or blocked.

we can argue about where the advice should and shouldn't appear, but we mustn't appeal to "response authenticity" when recommending a recursive DNS service. response authenticity is what our attackers need.

--
P Vixie

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to