At Tue, 8 Dec 2015 14:11:16 +0100,
Shane Kerr <[email protected]> wrote:
> As I mentioned a while ago, we have been working on a document to
> describe the various ways of (ab)using HTTP to transmit DNS traffic. We
> have finished a -00 draft, and I would appreciate it if you had a look
> and see if it makes sense.
I've read the draft. I think it contains some useful information, but
I don't have a particular opinion on whether this should be adopted as
a dnsop wg document - I'm not sure if it fits the charter of the wg.
Some comments on the draft (mostly editorial):
- Section 1
o Case 2: Clients may want to chose a resolver other than the one
locally available.
This doesn't necessarily seem to lead to DNS/HTTP; unless packets
using port 53 are blocked, clients can freely use other resolvers.
So isn't it essentially the same as case 1?
- Section 2.1
[...] The
difference between port 80 and 443 is that the traffic of port 80 is
usually intercepted as HTTP traffic while the traffic of port 443 is
usually considered to be encrypted, [...]
I first thought 'intercepted' should probably be 'interpreted'. On
reading toward the end of the doc I now see that is actually the
intent, but to avoid such confusion it might help if you say, e.g.
'usually intercepted as HTTP traffic for purposes as deeper
inspection'
- Section 2.2 s/coming/becoming/ ?
[...] Second, it
prevents resolvers from coming amplifier of reflection attack.
- Section 2.4 s/cause/because/ ?
[...] The support of DNSSEC might also be a
problem cause the response usually do not contain RR records with the
answer, making it impossible for a client to validate the reply.
--
JINMEI, Tatuya
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop