Hello, IETF folks. I still don't think that main IETF mailing list was a good place to post this question. Have a little silly question about current state of the art DNS privacy. *) We have DNSSEC to validate DNS responses from authoritative DNS servers for recursive queries. It works for recursive DNS resolvers you (configure || trust) for domains that have zones signed. So we have more-less (i should say more!) working mechanism for DNS response authentication. *) At the same time last years 2016+ there are efforts to make communication between trusted recursive resolver and client encrypted hence secure. There is DNS-over-TLS available under RFC8310 and RFC7858. There is a problem. Two pieces of puzzle does not completely connect, maybe. I realize that these efforts are developed to solve two different sides of the same problem. One for client, other for resolver. But there is a logical conclusion: DNS responses are consumed by clients in the final. Is there a need to encrypt whole communication between recursive resolver and authoritative servers? What if someone wish to establish own recursive resolver in order to not trust "big guys" services and hide the name resolution traffic at the same time? There is a problem that it can't be easily done, I realize it from my point of view. Maybe I am wrong. But what I know is the one thing - chicken and egg problem: we authenticate by names. In DNS-over-TLS it is solved by simply specifying resolver public key into trusted store. In case of TLS encryption for DNS resolution itself, we don't have this way. What is your attitude? Is there a problem at all? -- Philippe Duke NetAssist LLC