Hi dprive,

Here's a list of changes introduced in version -01 regarding the use of SNI:

   - SNI guidance for authoritative servers on two scenarios;
      - using SNI for alternate server credentials
      - serving different records based on SNI
      - SNI guidance for recursive resolvers
   - added SNI privacy considerations

Do these changes resolve the concerns of the group enough to reach
consensus on the topic?

All thoughts, concerns, suggestions, and questions most welcome,
--
dkg and Joey


---------- Forwarded message ---------
From: <[email protected]>
Date: Thu, Dec 9, 2021 at 1:22 PM
Subject: New Version Notification for
draft-dkgjsal-dprive-unilateral-probing-01.txt
To: Daniel Kahn Gillmor <[email protected]>, Joey Salazar <
[email protected]>



A new version of I-D, draft-dkgjsal-dprive-unilateral-probing-01.txt
has been successfully submitted by Joey Salazar and posted to the
IETF repository.

Name:           draft-dkgjsal-dprive-unilateral-probing
Revision:       01
Title:          Unilateral Opportunistic Deployment of Encrypted
Recursive-to-Authoritative DNS
Document date:  2021-12-09
Group:          Individual Submission
Pages:          23
URL:
https://www.ietf.org/archive/id/draft-dkgjsal-dprive-unilateral-probing-01.txt
Status:
https://datatracker.ietf.org/doc/draft-dkgjsal-dprive-unilateral-probing/
Html:
https://www.ietf.org/archive/id/draft-dkgjsal-dprive-unilateral-probing-01.html
Htmlized:
https://datatracker.ietf.org/doc/html/draft-dkgjsal-dprive-unilateral-probing
Diff:
https://www.ietf.org/rfcdiff?url2=draft-dkgjsal-dprive-unilateral-probing-01

Abstract:
   This draft sets out steps that DNS servers (recursive resolvers and
   authoritative servers) can take unilaterally (without any
   coordination with other peers) to defend DNS query privacy against a
   passive network monitor.  The steps in this draft can be defeated by
   an active attacker, but should be simpler and less risky to deploy
   than more powerful defenses.  The draft also introduces (but does not
   try to specify) the semantics of signalling that would permit defense
   against an active attacker.

   The goal of this draft is to simplify and speed deployment of
   opportunistic encrypted transport in the recursive-to-authoritative
   hop of the DNS ecosystem.  With wider easy deployment of the
   underlying transport on an opportunistic basis, we hope to facilitate
   the future specification of stronger cryptographic protections
   against more powerful attacks.




The IETF Secretariat
_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to