Re: [Add] Not a good BoF meeting

Thomas Peterson <nosretep.samoht@gmail.com> Wed, 24 July 2019 18:16 UTC

Return-Path: <nosretep.samoht@gmail.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD26F12017F for <add@ietfa.amsl.com>; Wed, 24 Jul 2019 11:16:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ea8mk_5aP2fX for <add@ietfa.amsl.com>; Wed, 24 Jul 2019 11:16:08 -0700 (PDT)
Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com [IPv6:2607:f8b0:4864:20::72c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0CBF120141 for <add@ietf.org>; Wed, 24 Jul 2019 11:16:07 -0700 (PDT)
Received: by mail-qk1-x72c.google.com with SMTP id 201so34439980qkm.9 for <add@ietf.org>; Wed, 24 Jul 2019 11:16:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=8ibQYDqqrqWn/4c9c0oiTYP73C5tTqt4Qp94yuL5cE0=; b=kqxM4r6UNdZmY6yOAVcCW3D8cJMWL4vh4Hax3TjYpOEsTYguDDmGjuDVCNebANWJ2n nCFnClyYPqLiWkfdOCMej+Gt2U33kdxhcdhrxvsqkBdIJagTM+5p7Ti5FaNM53jhPMog sx5yHwj14NRG+HtEEPNoS/8MChvhJrKhfCv3XrKTPzURxjY5uZD/F4FKszTp68yV4mdC 5OzuF6MGLNUoNjFVQCNndGvdv1vG51V+G37S/nNbaxzfLNv4RMto7a57owVC1cwOvIiV 6+DdSth0mTrB1lu4EATfj1hS9Mht72dly6LBMLXIGlWT0yctegQ+SiWMiN4P5928/7w5 Vohw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=8ibQYDqqrqWn/4c9c0oiTYP73C5tTqt4Qp94yuL5cE0=; b=EFa1JPFnFXm8aeov35mMoTIrkvRi6McQTJJMl87Z0rcTty8IZvqo34lb91jqRLQ++h oz3/nkDCZaQ9uo5pOrrZIwElnilIfuH+/7exTpF044lZjLRrZs0MOTJYkkPaKzOZNT/7 merQPhSuI2j7Trw26pX5HMK1361JyHZzAhHk1XS68BYm/dNtuAYvgQiGopv9AK5YfF8h bbbc03LT7P7/pNsAwDZWlOqr45JWGiuVFA/TxbUzqILQ03BrwB9ihAzpWgE9fGtcNPGS 3M+rKWIl+YPPnuiAfXpXopAULfI2+DHPXTR20timMgxZss9lb0OVDef9HHpWu/7ypDwQ d1CA==
X-Gm-Message-State: APjAAAWLRJiKCiLyFZWqKmN37ZdIcW929sScm4sHP7iKSxWDFjOzLEF1 8hjfmD2qZVf6yXLwwcgtayTO+Db6CBA=
X-Google-Smtp-Source: APXvYqywr2YcXRzOUwpVZjEuroyL6nw0XElULJt0Myk95UmUVhrlNMnT+beEoB3w0/yINk065Yafzg==
X-Received: by 2002:a05:620a:1006:: with SMTP id z6mr22685689qkj.312.1563992166767; Wed, 24 Jul 2019 11:16:06 -0700 (PDT)
Received: from ROADKILL.local ([199.180.96.142]) by smtp.gmail.com with ESMTPSA id h18sm19756814qkk.93.2019.07.24.11.16.04 (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Wed, 24 Jul 2019 11:16:06 -0700 (PDT)
To: Stephane Bortzmeyer <bortzmeyer@nic.fr>, add@ietf.org
References: <20190724165643.GA29051@laperouse.bortzmeyer.org>
From: Thomas Peterson <nosretep.samoht@gmail.com>
Message-ID: <2457067b-49fe-c2cf-d554-95f524573eea@gmail.com>
Date: Wed, 24 Jul 2019 19:16:02 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.0
MIME-Version: 1.0
In-Reply-To: <20190724165643.GA29051@laperouse.bortzmeyer.org>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/DBW9H5N7i3unHw_2sitDkFFzLRY>
Subject: Re: [Add] Not a good BoF meeting
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jul 2019 18:16:10 -0000

As the author of a draft (draft-peterson-doh-dhcp[0]) that provides 
discovery of DoH resolvers, I disagree as "trusting the network" is more 
complicated when there may be many operators and users in a given 
network, any of whom could be a threat. To me it is a positive if 
operators can provide secure means of DNS resolution within their 
network, and clients can choose to use them or not.

Regards

0: https://datatracker.ietf.org/doc/draft-peterson-dot-dhcp/

On 24/07/2019 17:56, Stephane Bortzmeyer wrote:
> * discovery of local DoH resolvers (in my opinion, a flawed idea from the
> start: if you trust the local network, you don't need DoH, if you
> don't, you won't trust its DoH announces anyway),