From: Benjamin Schwartz <benjamin.m.schwartz@xxxxxxxxx> On Tue, Apr 4, 2023 at 9:54 AM Scott Rose via Datatracker <noreply@xxxxxxxx> wrote:
That's one option. The other options are (2) if you know you're not on a network with insecure devices behind a firewall or (3) if you apply port number restrictions that you believe are sufficient to prevent any
confusion.
Yes: "do you trust this server not to try to attack other devices on your network?" is a question whose answer cannot be automated. I get (3). My main concern is an implementer of a client determining client behavior when a port key is seen in a response RR. “Trust” can be interpreted in various ways, so clients may react differently. I don’t know if that will really
be an issue for the client except for certain attacks but then there are larger issues at that point. Since it is only the client side case and it is already SHOULD NOT, I don’t know how big of an issue this actually is. Wouldn’t be an issue most of the time.
Sending an HTTPS query is useless but also harmless, so I think "MUST NOT" would be too strong.
The text documents one reason: "if clients might learn about this DoH service through a different channel". If the client is provisioned with a complete DoH URI template, this draft doesn't apply, but the HTTPS
record draft does. I can also imagine cases where the HTTP client implementation used for DoH is extremely high-level, and performs its own HTTPS queries. Ok, I get that.
This section is not limited to DoH; it applies to all transports. RFC 8484 assumes that the DoH URI template is provisioned securely, so this mitigation would not be relevant. Ok. I understand the other minor wording changes/clarifications so snipped. Scott |
-- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call