Ted Lemon wrote on 2019-02-12 12:07:
On Feb 12, 2019, at 11:04 AM, Paul Vixie <[email protected] <mailto:[email protected]>> wrote:
actually, there are other choices.

I may have failed to communicate.   What I mean is that you said that you can detect all nefarious traffic, but you can’t detect DoH, which to you is nefarious.   What I’m saying is that there’s no such distinction, or at least if there is at present, it is a temporary situation.

i realize that the political tacticians who designed DoH are searching for a world in which network operators have no control plane choices. i think they're proceeding from the mistaken belief that all control is evil, and that all network operators are equally deserving of disintermediation. and other mistaken beliefs as well, which i won't enumerate.


Of course you have choices about what to do about this; my point is not to suggest that you do not.


whether the situation turns out to be temporary or not is important to your final argument. probably you shouldn't go there so soon. spammers also believe that network operators should not be able to control their own networks, and malware authors, and botnet creators, and IoT innovators, and surveillance capitalists. none of those matters seem like they are, or will ever be, settled. so, none are "temporary".

my network, my rules. anyone who acts otherwise will be treated by me as an adversary, even folks like mozilla who have been fellow travelers for decades now, if they continue to pursue unblockable endpoint technology.

--
P Vixie

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to