Christian Huitema 于2018年4月10日周二 上午2:44写道:
> On 4/9/2018 11:00 AM, Warren Kumari wrote:
>
> On Mon, Apr 9, 2018 at 1:53 PM Christian Huitema
> wrote:
>
>> At first sight, it seems that this moves the logging hole from the DNS
>> recursive to the ODNS
On Tue, Apr 10, 2018 at 6:05 AM, Tony Finch wrote:
> Willem Toorop wrote:
> >
> > ODNS queries could be nested. I.e.
> >
> > {{{www.foo.bar}k.odns.google.com}k.odns.quad9.net}k.odns.cloudflare.com
>
> OnionDNS :-)
>
Yeah, that would make it look
Willem Toorop wrote:
>
> ODNS queries could be nested. I.e.
>
> {{{www.foo.bar}k.odns.google.com}k.odns.quad9.net}k.odns.cloudflare.com
OnionDNS :-)
Tony.
--
f.anthony.n.finch http://dotat.at/
West Fitzroy: Northwesterly 7 to severe gale 9, veering
Op 09-04-18 om 20:16 schreef Bill Woodcock:
>> On Apr 9, 2018, at 10:59 AM, Shumon Huque wrote:
>> The ODNS server can still easily collude with recursive server operators to
>> unmask the clients though, so I'm not sure how much privacy we've really
>> gained. At some point,
Hi,
Many interesting points, and +1 to "Yes, please clarify your threat
modeling in the i-d which you develop". ODNS looks interesting,
and the more ideas in the pot the better.
However, lets not forget that we've just "approved" the re-charter.
As I said, years ago, without attacking the
On Mon, Apr 9, 2018 at 2:43 PM, Christian Huitema wrote:
> On 4/9/2018 11:00 AM, Warren Kumari wrote:
>
> On Mon, Apr 9, 2018 at 1:53 PM Christian Huitema
> wrote:
>>
>> At first sight, it seems that this moves the logging hole from the DNS
>> recursive
On Mon, Apr 9, 2018 at 2:16 PM, Bill Woodcock wrote:
>
>
> > On Apr 9, 2018, at 10:59 AM, Shumon Huque wrote:
> > The ODNS server can still easily collude with recursive server operators
> to unmask the clients though, so I'm not sure how much privacy we've
> On Apr 9, 2018, at 10:59 AM, Shumon Huque wrote:
> The ODNS server can still easily collude with recursive server operators to
> unmask the clients though, so I'm not sure how much privacy we've really
> gained. At some point, it may be reasonable to ask why aren't clients
On Mon, Apr 9, 2018 at 1:53 PM Christian Huitema
wrote:
> At first sight, it seems that this moves the logging hole from the DNS
> recursive to the ODNS recursive, and that's a meh.
>
> Also, instead of using a complicated tunneling through the recursive
> resolver via name
On Mon, Apr 9, 2018 at 1:53 PM, Christian Huitema
wrote:
> At first sight, it seems that this moves the logging hole from the DNS
> recursive to the ODNS recursive, and that's a meh.
>
> Also, instead of using a complicated tunneling through the recursive
> resolver via name
At first sight, it seems that this moves the logging hole from the DNS
recursive to the ODNS recursive, and that's a meh.
Also, instead of using a complicated tunneling through the recursive resolver
via name obfuscation, why not establish a secure connection to the ODNS server
in the first
Annie, Nick and Paul all plan to be at the Hackathon and the IETF in
Montreal. This is work I'm also involved in, and we are working on an i-d
for DPRIVE, to come soon.
Allison
On 9 April 2018 at 18:20, Daniel Kahn Gillmor wrote:
> hey DPRIVE folks--
>
> People on this
On Mon 2018-04-09 13:20:28 -0400, Daniel Kahn Gillmor wrote:
> People on this list might be interested in the recent "Oblivious DNS"
> work from Annie Edmundson, Paul Schmitt, and Nick Feamster
gah, i left off Jennifer Rexford from the list of researchers -- no
slight was intended by the
13 matches
Mail list logo