On Mon, 13 Apr 2015, Daniel Kahn Gillmor wrote:
i think most people consider DHCP configuration to be at best minimally
useful for DPRIVE -- it leaves you vulnerable at network connection
time, but then protects you against subsequent attacks. *shrug*
If you have an attacker on the last
On Thu 2015-04-09 10:36:17 -0400, Phillip Hallam-Baker wrote:
As I see it, there are two sub-problems:
1) How does a client discover and establish a binding to a DPRIV service?
2) What transport/sessions(s) are supported for queries?
Before answering either, I think it is pretty clear that
On Mon, 13 Apr 2015, Daniel Migault wrote:
Just for information, what are the technical reasons IPsec has not been
considered at all for providing DNS privacy.
People can already use an IPsec VPN and a remote DNS server without
anything new from IETF?
I think additionally, IPsec has a
On Mon, Apr 13, 2015 at 4:13 PM, Daniel Kahn Gillmor
d...@fifthhorseman.net wrote:
On Thu 2015-04-09 10:36:17 -0400, Phillip Hallam-Baker wrote:
As I see it, there are two sub-problems:
1) How does a client discover and establish a binding to a DPRIV service?
2) What transport/sessions(s) are
Hi Paul,
I'm not sure if your point was meant to relate only to DHCP
setting the DNS server IP, but if not then I have a question...
On 13/04/15 21:21, Paul Wouters wrote:
If you have an attacker on the last mile, there is nothing you can do.
Passive only protection against the last mile is a
[ Top post ]
What do other think here -- do we want to decide on the discovery and
binding problem first, or do we think that we should choose a document
and start working on that (and possibly add in discovery / binding
later)?
no-hats
I'd personally like to start working on a document - i
On Tue, Apr 7, 2015 at 3:33 PM, Warren Kumari war...@kumari.net wrote:
Hi all,
We are planning on starting a call for adoption on the documents on April
15th.
At the meeting in Dallas we heard that a number of people didn't feel
that they had enough information / knowledge of the documents
During the last month's meeting in Dallas, I was asked by Warren to compile
a list of relevant criteria that we need to consider when evaluating the
potential of each document. The following are starting points, so please
consider them in mind while reading the different documents (and of course
During the last month's meeting in Dallas, I was asked by Warren to compile
a list of relevant criteria that we need to consider when evaluating the
potential of each document. The following are starting points, so please
consider them in mind while reading the different documents (and of course