Deutsch   English   Français   Italiano  
<vir1jv$17csf$4@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Lawrence D'Oliveiro <ldo@nz.invalid>
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Thu, 5 Dec 2024 02:02:39 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 39
Message-ID: <vir1jv$17csf$4@dont-email.me>
References: <67464f37@news.ausics.net>
	<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
	<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
	<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
	<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
	<viobpa$s79$2@tncsrv09.home.tnetconsulting.net>
	<viod8c$fp5p$1@dont-email.me>
	<vion3k$fau$1@tncsrv09.home.tnetconsulting.net>
	<vioqhn$mcr7$1@dont-email.me>
	<viquuk$l6k$1@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 05 Dec 2024 03:02:39 +0100 (CET)
Injection-Info: dont-email.me; posting-host="b8ada25e4317f2ac3fdfff6f2c3be1a9";
	logging-data="1291151"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+mO/nGQo37gC/KacT8PjJp"
User-Agent: Pan/0.161 (Chasiv Yar; )
Cancel-Lock: sha1:qRBMQcOBQ5+LP+USuxnEdPKSBG0=
Bytes: 2877

On Wed, 4 Dec 2024 19:17:08 -0600, Grant Taylor wrote:

> On 12/3/24 23:49, Lawrence D'Oliveiro wrote:
>
>> That cert depends on the domain name.
> 
> No, not quite.
> 
> The domain name can be used to inform which cert the server should use,

Which part of “depends on” are you having trouble with?

> and that's EXACTLY what Server Name Indication (a.k.a. SNI) is.  SNI is
> part of TLS.

Which cannot be sent encrypted over HTTP because HTTP encryption
hasn’t been set up yet.

> Also, consider protocols that don't send a Host: header (as HTTP does)
> still using SNI to indicate which domain name is being connected to.

They don’t do “virtual hosting”, where multiple domains share the same
IP address, and is an important feature of HTTP. That’s why there is a
specific problem with that.

There are two rival specs for solving this: DNS-over-TLS, and
DNS-over-HTTPS. DNS-over-TLS (DoT) is a separate protocol that can be
identified as such by firewalls, while DNS-over-HTTPS (DoH) is
essentially indistinguishable from any other HTTPS traffic.

DoH has become quite controversial. On the one hand, corporates who
want to control traffic on their networks for security reasons hate
it. But on the other hand, it can be useful to bypass restrictions for
those who live under certain authoritarian regimes. You can’t have
it both ways.

Mozilla decided to go for DoH, for which a British association of ISPs
called them a “villain”
<https://www.theregister.com/2019/07/10/ispa_clears_mozilla/>.