On Tue, 08 Mar 2016 22:35:39 +0000, "Wessels, Duane" wrote: 
>Hi Brian,
>
>
>> On Mar 8, 2016, at 7:38 AM, Brian Haberman <[email protected]> wrote:
>> 
>> 
>> I am a definite Yes on this work, but just have a couple of comments...
>> 
>> * Section 3.1 says "By mutual agreement with its server, the client MAY,
>> instead, use a port other than port 853 for DNS-over-TLS.  Such an other
>> port MUST NOT be port 53..." It would be useful to *briefly* explain the
>> MUST NOT. If it is by mutual agreement, what's the harm?
>
>This text was recently added during a review of 5966bis (DNS-over-TCP)
>where there was a concern that neither that nor this document said anything
>about not mixing cleartext and ciphertext.
>
>I suppose another reason is that middleware boxes might want to "inspect"
>port 53 and TLS over port 53 will fail.
>
>Would you be okay with adding this sentence or similar?  
>
>   Use of port 53 for DNS-over-TLS is prohibited
>   because mixing cleartext and ciphertext can result in false privacy.

Wrt this comment, I would suggest:

   Use of port 53 for DNS-over-TLS is prohibited to avoid
   complication in selecting use or non-use of TLS,
   and to reduce risk of downgrade attacks.

to be more explicit about "false privacy".  (Multiple other reviewers
commented on both complexity and downgrade risks---my understanding is
that is why we ended up so strict, and without STARTTLS.)

("complications" means in implementation, but I omitted that word to
keep it short.)

The other comments and changes all look good to me.

   -John

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to