On Monday, August 8, 2016 1:29 PM, John Heidemann wrote:
>
> On Mon, 08 Aug 2016 10:49:17 -0700, =?utf-8?Q?=F0=9F=94=93Dan_Wing?=
> wrote:
> >Are there documented procedures for how a DPRIVE client handles joining a
> network with a captive portal, or other filtering, which prevents
accessing the
> DPRIVE DNS server?
>
> Yes. From RFC-7858 section 4.2:
>
> However, a configured DNS server may be temporarily unavailable when
> configuring a network. For example, for clients on networks that
> require authentication through web-based login, such authentication
> may rely on DNS interception and spoofing. Techniques such as those
> used by DNSSEC-trigger [DNSSEC-TRIGGER] MAY be used during network
> configuration, with the intent to transition to the designated DNS
> provider after authentication. The user MUST be alerted whenever
> possible that the DNS is not private during such bootstrap.
There is also a mention of that in section 4.2 of
draft-ietf-dprive-dtls-and-tls-profiles-03. The description of "strict
privacy" includes the mention that there may be queries sent before
authenticating the server. The text says:
This profile can include some initial meta
queries
(performed using Opportunistic Privacy) to securely obtain the IP
address and authentication information for the privacy-enabling
DNS server to which the DNS client will subsequently connect.
Then there is complement text is Section 6:
A privacy-enabling DNS server may be temporarily unavailable when
configuring a network. For example, for clients on networks that
require registration through web-based login (a.k.a. "captive
portals"), such registration may rely on DNS interception and
spoofing. Techniques such as those used by DNSSEC-trigger
[dnssec-trigger] MAY be used during network configuration, with the
intent to transition to the designated privacy-enabling DNS servers
after captive portal registration. The system MUST alert by some
means that the DNS is not private during such bootstrap.
Seems that the case is covered.
-- Christian Huitema
_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy