<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: [Axis of Easy] #SaveDotOrg: Why ISOC Sold The .ORG TLD To A Private Equity Firm	</title>
	<atom:link href="https://axisofeasy.com/aoe/axis-of-easy-savedotorg-why-isoc-sold-the-org-tld-to-a-private-equity-firm/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com/aoe/axis-of-easy-savedotorg-why-isoc-sold-the-org-tld-to-a-private-equity-firm/?pk_campaign=feed&#038;pk_kwd=axis-of-easy-savedotorg-why-isoc-sold-the-org-tld-to-a-private-equity-firm&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axis-of-easy-savedotorg-why-isoc-sold-the-org-tld-to-a-private-equity-firm</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Sat, 11 Apr 2020 08:55:39 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: CJ Smith		</title>
		<link>https://axisofeasy.com/aoe/axis-of-easy-savedotorg-why-isoc-sold-the-org-tld-to-a-private-equity-firm/?pk_campaign=feed&#038;pk_kwd=axis-of-easy-savedotorg-why-isoc-sold-the-org-tld-to-a-private-equity-firm/#comment-28949</link>

		<dc:creator><![CDATA[CJ Smith]]></dc:creator>
		<pubDate>Wed, 11 Dec 2019 21:03:28 +0000</pubDate>
		<guid isPermaLink="false">https://easydns.com/?p=19441#comment-28949</guid>

					<description><![CDATA[Re: How DNS-over-HTTPS would affect net neutrality

On DNS-over-HTTPS, we need to dig deeper.

Everything here is right on the mark, but from what I have read, there are deep technical and environmental concerns that suggest DNS- over-HTTPS has seriously problematic side effects compared to DNS-over-TLS. I get the impression that there is a large chunk of the discussion goes in the direction of &quot;if those ISPs want to block this DoH thing, it must be good&quot;. The prevalence of &quot;bad objections&quot; does not automatically make the target of those objections &quot;good&quot;. Or an alternate cliche - the enemy of my enemy is not automatically my friend.

Bert&#039;s blog entry heads in that direction, although he doesn&#039;t really touch on the side effects of DoH being widely implemented. And the last current comment there (Dec5,8:06) falls straight into the pit, suggesting that if too much centralization is the problem, widespread DoH would deal with it. The comment even treats DNS-over-HTTPS and DNS-over-TLS as equivalent, when a careful and wider reading suggests that the two are anything but equivalent either as individual solutions or widespread solutions.

Trying looking up what Paul Vixie has written, and follow some of those threads. Look up the use of DNS-over-HTTPS for exfiltration. A lot of it relates to enterprise concerns, which although valid, might seem to be out of scope for small scale users. Think through what those same concerns mean on a home network of a few computers, a few phones, a few smart TVs, and a half dozen IoT devices.

A notable part of the problem is that the one thing DNS-over-HTTPS does do - prevent on the wire interception - causes significant small-network problems down the road. As an example, on my home network, I use a subscribed DNS service - and any attempts to use port 53 to go around the router&#039;s DNS server are blocked. This means I can review logs and see what requests are being made. With DNS-over-HTTPS, DNS is now on port 443, so DNS is indistinguishable from browser traffic. This might be good for your browser - but it is also good for any malware on your system or small network, and also good for any unsavoury IoT devices that someone has hooked up.

Remember that it is possible to use recursive DNS to exfiltrate data, not just to contact a C&#038;C server. Now the malicious stuff doesn&#039;t even need a matching website - they can just exfiltrate using Google or CloudFlare.

In my view, the worst part is that at least I can deal with the centralization issues on my end by making specific choices in my browser, in my system, and in my network, both with DNS destination and protocol choices, and maybe even with a VPN. But if DNS-over-HTTPS becomes widespread, I can do almost nothing to deal with the negative side effects that follow relating to malicious use of the protective features. Even a VPN would still basically tunnel any malicious DNS-over-HTTPS traffic out to an endpoint, where it can continue on it&#039;s way, while remaining invisible to me the entire time.]]></description>
			<content:encoded><![CDATA[<p>Re: How DNS-over-HTTPS would affect net neutrality</p>
<p>On DNS-over-HTTPS, we need to dig deeper.</p>
<p>Everything here is right on the mark, but from what I have read, there are deep technical and environmental concerns that suggest DNS- over-HTTPS has seriously problematic side effects compared to DNS-over-TLS. I get the impression that there is a large chunk of the discussion goes in the direction of &#8220;if those ISPs want to block this DoH thing, it must be good&#8221;. The prevalence of &#8220;bad objections&#8221; does not automatically make the target of those objections &#8220;good&#8221;. Or an alternate cliche &#8211; the enemy of my enemy is not automatically my friend.</p>
<p>Bert&#8217;s blog entry heads in that direction, although he doesn&#8217;t really touch on the side effects of DoH being widely implemented. And the last current comment there (Dec5,8:06) falls straight into the pit, suggesting that if too much centralization is the problem, widespread DoH would deal with it. The comment even treats DNS-over-HTTPS and DNS-over-TLS as equivalent, when a careful and wider reading suggests that the two are anything but equivalent either as individual solutions or widespread solutions.</p>
<p>Trying looking up what Paul Vixie has written, and follow some of those threads. Look up the use of DNS-over-HTTPS for exfiltration. A lot of it relates to enterprise concerns, which although valid, might seem to be out of scope for small scale users. Think through what those same concerns mean on a home network of a few computers, a few phones, a few smart TVs, and a half dozen IoT devices.</p>
<p>A notable part of the problem is that the one thing DNS-over-HTTPS does do &#8211; prevent on the wire interception &#8211; causes significant small-network problems down the road. As an example, on my home network, I use a subscribed DNS service &#8211; and any attempts to use port 53 to go around the router&#8217;s DNS server are blocked. This means I can review logs and see what requests are being made. With DNS-over-HTTPS, DNS is now on port 443, so DNS is indistinguishable from browser traffic. This might be good for your browser &#8211; but it is also good for any malware on your system or small network, and also good for any unsavoury IoT devices that someone has hooked up.</p>
<p>Remember that it is possible to use recursive DNS to exfiltrate data, not just to contact a C&amp;C server. Now the malicious stuff doesn&#8217;t even need a matching website &#8211; they can just exfiltrate using Google or CloudFlare.</p>
<p>In my view, the worst part is that at least I can deal with the centralization issues on my end by making specific choices in my browser, in my system, and in my network, both with DNS destination and protocol choices, and maybe even with a VPN. But if DNS-over-HTTPS becomes widespread, I can do almost nothing to deal with the negative side effects that follow relating to malicious use of the protective features. Even a VPN would still basically tunnel any malicious DNS-over-HTTPS traffic out to an endpoint, where it can continue on it&#8217;s way, while remaining invisible to me the entire time.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Ron		</title>
		<link>https://axisofeasy.com/aoe/axis-of-easy-savedotorg-why-isoc-sold-the-org-tld-to-a-private-equity-firm/?pk_campaign=feed&#038;pk_kwd=axis-of-easy-savedotorg-why-isoc-sold-the-org-tld-to-a-private-equity-firm/#comment-28948</link>

		<dc:creator><![CDATA[Ron]]></dc:creator>
		<pubDate>Tue, 10 Dec 2019 23:48:31 +0000</pubDate>
		<guid isPermaLink="false">https://easydns.com/?p=19441#comment-28948</guid>

					<description><![CDATA[Milton Freidman?]]></description>
			<content:encoded><![CDATA[<p>Milton Freidman?</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
