George,

i certainly agree. Noted for a revision.

Alex

Von: George Michaelson [mailto:g...@algebras.org]
Gesendet: Donnerstag, 23. Juli 2015 18:52
An: Alexander Mayrhofer
Cc: dns-priv...@ietf.org; dnsop@ietf.org
Betreff: Re: [DNSOP] draft-mayrhofer-edns0-padding

What does it mean to exceed the proffered EDNS0 buffer size with your padded 
response?

You're 'silent' on length, but surely the server should respect the EDNS0 size 
proffer as a limit?

On Thu, Jul 23, 2015 at 6:50 PM, Alexander Mayrhofer 
<alexander.mayrho...@nic.at<mailto:alexander.mayrho...@nic.at>> wrote:
Hi,

I had a discussion with Daniel Khan Gillmor today, and we talked about his 
proposal to specify a padding option in TLS so that message-size based 
correlation attacks on encrypted DNS packets could be prevented. We  continued 
discussing other options (such as "artificial" RRs in the additional section), 
and I floated the idea that we could use EDNS0 to include padding in DNS 
packets.

So, I've created a quick-and-dirty strawman proposal draft for this idea, and 
i'm happy to discuss this during tomorrow's DPRIVE session if we have time:

https://www.ietf.org/id/draft-mayrhofer-edns0-padding-00.txt

Bring out the pitchforks and torches :)

Alex

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org<mailto:DNSOP@ietf.org>
https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to