George,

i certainly agree. Noted for a revision.

Alex

Von: George Michaelson [mailto:[email protected]]
Gesendet: Donnerstag, 23. Juli 2015 18:52
An: Alexander Mayrhofer
Cc: [email protected]; [email protected]
Betreff: Re: [DNSOP] draft-mayrhofer-edns0-padding

What does it mean to exceed the proffered EDNS0 buffer size with your padded 
response?

You're 'silent' on length, but surely the server should respect the EDNS0 size 
proffer as a limit?

On Thu, Jul 23, 2015 at 6:50 PM, Alexander Mayrhofer 
<[email protected]<mailto:[email protected]>> wrote:
Hi,

I had a discussion with Daniel Khan Gillmor today, and we talked about his 
proposal to specify a padding option in TLS so that message-size based 
correlation attacks on encrypted DNS packets could be prevented. We  continued 
discussing other options (such as "artificial" RRs in the additional section), 
and I floated the idea that we could use EDNS0 to include padding in DNS 
packets.

So, I've created a quick-and-dirty strawman proposal draft for this idea, and 
i'm happy to discuss this during tomorrow's DPRIVE session if we have time:

https://www.ietf.org/id/draft-mayrhofer-edns0-padding-00.txt

Bring out the pitchforks and torches :)

Alex

_______________________________________________
DNSOP mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to