Re: [dns-privacy] Fwd: New Version Notification for draft-annee-dprive-oblivious-dns-00.txt

2018-07-14 Thread Ben Schwartz
On Sat, Jul 14, 2018 at 8:30 PM Stephane Bortzmeyer wrote: > On Tue, Jul 03, 2018 at 06:18:51PM -0400, > Ben Schwartz wrote > a message of 293 lines which said: > > > My main question for the authors is: how does this compare to > > routing a DNS-over-TLS socket through a TCP forwarder? > >

Re: [dns-privacy] Fwd: New Version Notification for draft-annee-dprive-oblivious-dns-00.txt

2018-07-14 Thread Stephane Bortzmeyer
On Sat, Jul 14, 2018 at 09:13:56PM -0400, Nick Feamster wrote a message of 40 lines which said: > 1. Tor is vulnerable to DNS fingerprinting, particularly at the > recursive resolver. Many Tor exits use Google public DNS (~40%, by > exit throughput), I know this research but I don't see the

Re: [dns-privacy] Fwd: New Version Notification for draft-annee-dprive-oblivious-dns-00.txt

2018-07-14 Thread Nick Feamster
> On Jul 14, 2018, at 8:27 PM, Stephane Bortzmeyer wrote: > > On Tue, Jul 03, 2018 at 06:18:51PM -0400, > Ben Schwartz wrote > a message of 293 lines which said: > >> My main question for the authors is: how does this compare to >> routing a DNS-over-TLS socket through a TCP forwarder? >

Re: [dns-privacy] Fwd: New Version Notification for draft-annee-dprive-oblivious-dns-00.txt

2018-07-14 Thread Stephane Bortzmeyer
On Tue, Jul 03, 2018 at 06:18:51PM -0400, Ben Schwartz wrote a message of 293 lines which said: > My main question for the authors is: how does this compare to > routing a DNS-over-TLS socket through a TCP forwarder? Isn't it what Tor is doing? Reasons to use Tor: * well known and studied,