At first sight, it seems that this moves the logging hole from the DNS recursive to the ODNS recursive, and that's a meh.
Also, instead of using a complicated tunneling through the recursive resolver via name obfuscation, why not establish a secure connection to the ODNS server in the first place? -- Christian Huitema > On Apr 9, 2018, at 10:25 AM, Allison Mankin <[email protected]> wrote: > > Annie, Nick and Paul all plan to be at the Hackathon and the IETF in > Montreal. This is work I'm also involved in, and we are working on an i-d > for DPRIVE, to come soon. > > Allison > >> On 9 April 2018 at 18:20, Daniel Kahn Gillmor <[email protected]> wrote: >> hey DPRIVE folks-- >> >> People on this list might be interested in the recent "Oblivious DNS" >> work from Annie Edmundson, Paul Schmitt, and Nick Feamster: >> >> https://freedom-to-tinker.com/2018/04/02/a-privacy-preserving-approach-to-dns/ >> >> https://odns.cs.princeton.edu/ >> >> This was presented at DNS-OARC 28 in March 2018. >> >> --dkg >> >> _______________________________________________ >> dns-privacy mailing list >> [email protected] >> https://www.ietf.org/mailman/listinfo/dns-privacy > > _______________________________________________ > dns-privacy mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/dns-privacy
_______________________________________________ dns-privacy mailing list [email protected] https://www.ietf.org/mailman/listinfo/dns-privacy
