On 2/15/18, 2:45 AM, "dns-privacy on behalf of Stephane Bortzmeyer" 
<[email protected] on behalf of [email protected]> wrote:

    https://dnscrypt.info
    
    You'll note that the FAQ <https://dnscrypt.info/faq/> includes a
    comparison with IETF solutions. Some remarks:
    
    1) dnscrypt "Cannot be MITM’d by standard tools" vs. DNS-over-TLS
    "Readily compatible with industry-standard TLS interception/monitoring
    devices"
    
    This seems a strange approach of security. Using non-standard and
    little-known tools in the hope there will be less ready-made kits for
    script kiddies, works only on a very short term. It is a bit like "I
    coded my own CMS in PHP, it is full of security holes but because it
    is not the standard Wordpress / Drupal security holes, I'm secure".

Honestly, I'm not sure this is something I'd call out as a major benefit 
personally, but not for the reasons you listed.  It's the same as if you don't 
install the root certificate I want you to on my network -- you just don't get 
access at all.  But in some cases, that's exactly what the end user wants.

The cryptography primitives behind DNSCrypt has been tested, evaluated, and are 
published via IETF (RFC7539 & RFC7748.)  The entire DNSCrypt protocol has been 
published for some time (since 2011 iirc, version 2 in 2013.)  I read this 
section to be that DNSCrypt doesn't have a root certificate store that you can 
install a custom root to -- the industry-standard way of TLS 
interception/monitoring.  You either have the private key matching the 
fingerprint I want, or you don't.  (Of course, if I'm retrieving that public 
key from DNS/HTTP/etc, what proves that I have the right key...)
    
    7) DoH "Uses standard HTTP/2, on the standard port (443)." Not sure it
    is a good thing that all the Internet runs over port 443 :-(

Joke used to be that everything would run over port 80, I guess at least it's 
now encrypted right?

-- Brian


_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to