Ohta-san, I think the points you are making in response to what I have said are that
(1) it's easier for a government to fake a DNS delegation than to MiTM an IP connection, and (2) if it's a government that's faking your DNS, they can jail you for noticing. I think these are both valid points. However, I don't think they lead to the conclusion you are drawing. First, if the government really cares about censorship, it's probably going to do some degree of DPI for connections to IP addresses it has reason to care about. So you could in principle do a connection to a device that isn't on the government's radar and bypass their attack, for sure. But this is actually quite hard for a layperson to arrange, and impossible to automate, since any automatic mechanism would be known to the government in question. To the second question, this is also absolutely true, but at the same time, as we can see, just because something is illegal doesn't mean that it's not useful. E.g., the government in Russia has made it illegal to protest the war in Ukraine, and yet we see people protesting in the streets. Their goal is pretty clearly to bypass a government restriction on communication. Having a watchdog in software that notices when a certificate has been replaced by one that isn't valid isn't that hard, and while it might be made illegal after the fact, officially making it illegal would be a public act that would have to be announced by the government in order to be enforceable—otherwise software vendors would have no reason to know they were violating the law. By announcing it, the government in question is disclosing the status of your security, which is the whole point. Absent such a disclosure, citizens can continue to run such software, and continue to detect such attacks. In the presence of such a disclosure, citizens know that their traffic is not secure, which is obviously not great, but still represents success: the user now knows that the network isn't safe to use.
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop