> On Sep 30, 2015, at 5:05 PM, Watson Ladd <[email protected]> wrote:
> 
> On Wed, Sep 23, 2015 at 10:32 AM, Warren Kumari <[email protected]> wrote:
>> Hi all,
>> 
>> Please review our documents:
>> https://datatracker.ietf.org/doc/draft-ietf-dprive-dns-over-tls/
>> https://datatracker.ietf.org/doc/draft-ietf-dprive-dnsodtls/
>> 
>> We would like to see a significant amount of review and discussion before
>> our meeting in Yokohama - if not it is hard to justify the meeting time.
>> 
>> I put in the request for early port allocation few days back...
> 
> Is "pining" really the right term for recording which resolvers
> support DNS? When I've seen pinning used it has been in the context of
> certificates, with pining involving remembering which certificate was
> used.

Watson,

I think that is a fair point and I've made the following change:

@@ -787,8 +787,8 @@
             Clients and
             servers MUST adhere to the TLS implementation recommendations
             and security considerations of <xref target="RFC7525"/>.
-            DNS clients keeping track of servers known to support TLS (i.e.,
-            "pinning") enables clients to detect downgrade attacks.
+            DNS clients keeping track of servers known to support TLS
+            enables clients to detect downgrade attacks.
             For servers with no connection history and no apparent
             support for TLS, clients depending on their Privacy
             Profile and privacy requirements may choose to (a) try another 
server when



> We don't seem to have a good deal to say about authenticating DNS resolvers.

Yes, and we are acknowledging such as out of scope for this document.


DW


_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to