> Il 24 marzo 2019 alle 22.42 Patrick McManus <mcma...@ducksong.com> ha scritto:
> 
> 
>     On Sun, Mar 24, 2019 at 10:31 PM Brian Dickson < 
> brian.peter.dick...@gmail.com mailto:brian.peter.dick...@gmail.com > wrote:
> 
>         > > 
> > 
> >         This is important for network operators in identifying encrypted 
> > DNS traffic,
> > 
> >     > 
>     not all clients acknowledge a network's right to do such things at all 
> times. And of course it would be useful to tell the difference between policy 
> and a RST injection attack.
> 
>     If the client does acknowledge the network has the right to set policy - 
> then the policy can be set on the client using existing configuration 
> mechanisms that allow the client to differentiate between authorized 
> configuration and perhaps less-authorized folks identifying their DNS 
> traffic. This is well worn ground in the HTTP space.
> 
Let's say I just bought a new smart TV that can browse the Internet, but I 
don't want my kids to be able to access inappropriate websites from it. Or, 
let's say I actually like the fact that my operator filters out malware 
destinations at the DNS level and I want my new TV to have that protection as 
well.

In today's "plain DNS" world, I choose a DNS resolver that provides that kind 
of filters for me, I set it up on my router, and my router pushes it to my 
smart TV via DHCP. What is the "existing configuration mechanism" that allows 
me to set this policy in the DoH world, i.e. if the TV came equipped with 
applications preconfigured to use their own remote resolver via DoH?

As a minimum, I would have to open all the applications and configure them one 
by one to use my desired resolver, and repeat this for every device connected 
to my network - while in the current situation this is all automated after I 
configure the resolver once on my router. But applications like Firefox might 
completely refuse to use the resolver I want, advertised by my router on my 
behalf, because it does not support DoH, or it does but is not on their list of 
"trusted resolvers". And Javascript bits in the pages I visit might use DoH to 
pre-encoded servers without even offering me any configuration.

Regards,

--

Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
vittorio.bert...@open-xchange.com mailto:vittorio.bert...@open-xchange.com 
Office @ Via Treviso 12, 10144 Torino, Italy
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to