#DNS over #TLS authentication profiles draft have seen some modifications after exam by #IESG. Need some review (IMHO, it is done, and should be published). #IETF99
Alex Mayrhofer on the #DNS padding policy (to improve #privacy when encrypting with #TLS, which does not hide messages sizes). Draft near completion. #IETF99

The proposed padding policy comes from the excellent measurements done by Daniel K. Gilmore and presented at the #NDSS17 conference this year. We have facts to back the proposed policy ("pad to the next multiple of 128 bytes")

#DNS #IETF99

128 on the query side, it will be larger on the response. #precision #DNS #IETF99
"It would be interesting to hear opinions from the attacking side. Anyone in the room working for a spy agency?" #DNS #padding #IETF99
@bortzmeyer Does it include Google or ISP ? 😬
@Shaft #DNS encryption is not a problem for Google, they are the end point :-(

Christian Huitema on stage about #DNS over #QUIC (draft, not adopted, not implemented). QUIC includes #TLS.

"First, a show of hands, who knows about QUIC?"

#DNS #privacy #IETF99

@bortzmeyer And many people raised their hands! (Good to see)
@danyork I wonder if they know QUIC in depth (having implemented and/or used it) or just a theoretical view (having read the draft). #IETF99
@bortzmeyer Haha, comme s'il était encore vivant, Huitéma. Le gros mytho.
Daniel K. Gilmore on demultiplexing #HTTPS and #DNS when they share the same #TLS port. It's implemented, yes, see https://dns.cmrg.net/ (it is actually a DNS public resolver). #privacy #IETF99
So you can have a #TLS server where an external adversary cannot tell if it provides #HTTPS or #DNS. (Does not work with #ALPN, though.) #privacy #IETF99
This was the hack of the day, long discussion at #IETF99. #DNS #TLS #HTTPS
Sara Dickinson reminds us of https://dnsprivacy.org/, to track the deployment of #DNS-over-#TLS name servers. #IETF99
Shane Kerr c the "hallenges the "#DNS over #TCP is more costly than DNS over #UDP" story. UDP servers are hugely overprovisioned because of DoS attacks enabled by UDP. TCP may allow to decrease this overprovisioning. #IETF99