>It occurs to me that it introduces knobs that might not work, since the 
>easiest way to implement it is to accept the EDNS0 options, ignore them, 
>and do whatever you were doing anyway.  (This isn't a new issue; see RFC 
>8689, the SMTP require TLS option, which I've implemented the same way.)

I don't understand the threat model here. The local DNS proxy that implements
this draft is on the same system as the application. The proxy either
comes with the operating system or is explicitly installed by the
user of the host.

Who benefits from a fake implementation? 

It seems weird to argue against a draft with the argument that it may 
intentionally be implemented wrong. 

>Since we all seem to agree that there are already plenty of ways to tell 
>devices what kind of upstream cache to use, what's the benefit of adding 
>another one that as likely as not wouldn't work?

Yes, there are ways for the network to inform a device. I don't any options
for a local proxy to inform a stub resolver. Or for the local proxy to
know what the application really wants of needs.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to