From: ummeegge <ummeegge@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [Fwd: Re: request for info: unbound via https / tls]
Date: Mon, 10 Dec 2018 13:14:02 +0100 [thread overview]
Message-ID: <d69e046565e67ec198962be291cf4577484cd401.camel@ipfire.org> (raw)
In-Reply-To: <B67AE78C-1139-483E-A47D-4F9576CC0CEC@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 2702 bytes --]
Hi Michael,
Am Montag, den 10.12.2018, 00:21 +0000 schrieb Michael Tremer:
> I am not sure what you are looking for.
Mainly for testing people which take also a look over the changes in
unbound initscript. Since the 'update_forwarders()' function from
unbound init will currently not be used if custom forwarders are in
usage.
'update_forwarders()' includes really a lot of other functions and it
was/is not that easy to check for all possible side affects if this
function will be bypassed and substituded by another one (cue: DNSSEC,
EDNS, ...). All changes causing the unbound initscript can be found in
here -->
https://gitlab.com/ummeegge/dot-for-ipfire/commits/master/unbound
.
Another point i am currently looking for is the question, if unbound is
the best possibility for DoT ? If you take look into the current
implementation status -->
https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Implementation+Status
unbound misses also some other DoT related features.
Am building currently GetDNS and Stubby just to get there also a better
inside of the differences.
Also, integrating DoT into webuserinterface is, as before mentioned in
here, a point. Should DoT become it´s own one, or is it a complete new
WUI menu point worth ?
In my humble opinion this DoT topic is still pretty much in a testing
phase not only speaking for myself but also looking around and finding
only two (may three) stable DoT providers speaks, i think, also a
little for itself.
> But I just wanted to say that I am following this conversation.
That´s great.
>
> So far I think that there are indeed many people interested in DoT.
> However, I have not received any feedback on what I was mailing
> before.
>
I hope some feedback comes around also since i am currently testing it
for a couple of weeks now and posted the results/code_changes in the
forum and some also in here.
> I think what is best now is to get this into small patches. What
> needs to be done to get this UI ready so that people can add those
> DNS servers? What will the default behaviour be? How will we make
> sure that the system does not fall back (to unauthenticated DNS)?
>
That´s the fundamental question, please see the above statements.
> I think that we can leave OpenSSL 1.1.1 aside for this for now,
> because it works perfectly fine with TLS 1.2. We should not mix
> multiple things together when they have no strict dependency
> (although I am really looking forward to see TLS 1.3 in IPFire soon).
>
OpenSSL-1.1.1 and TLS 1.3 fits perfectly into this topic and i hope i
can install today the new OpenSSL and to test it in my productive
environment.
> Best,
> -Michael
>
> > Best,
> >
> > Erik
> >
>
>
next prev parent reply other threads:[~2018-12-10 12:14 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <1525184928.3530.13.camel@gmail.com>
2018-05-01 14:33 ` Paul Simmons
2018-05-01 14:40 ` Peter Müller
2018-05-01 17:16 ` Paul Simmons
2018-05-03 16:03 ` Michael Tremer
2018-12-02 19:10 ` ummeegge
2018-12-02 20:23 ` Paul Simmons
2018-12-04 14:01 ` ummeegge
2018-12-04 16:19 ` Peter Müller
2018-12-05 7:35 ` ummeegge
2018-12-09 20:08 ` ummeegge
2018-12-10 0:21 ` Michael Tremer
2018-12-10 11:30 ` ummeegge
2018-12-10 0:21 ` Michael Tremer
2018-12-10 12:14 ` ummeegge [this message]
2018-12-10 12:32 ` ummeegge
2018-12-10 13:26 ` Michael Tremer
2018-12-10 14:37 ` ummeegge
2018-12-11 19:22 ` Michael Tremer
2018-12-11 19:43 ` ummeegge
2018-12-11 19:54 ` Michael Tremer
2018-12-12 13:42 ` ummeegge
2018-12-12 15:25 ` Michael Tremer
2018-12-12 17:44 ` ummeegge
2018-12-13 6:52 ` ummeegge
2018-12-13 16:26 ` Michael Tremer
2018-12-10 13:37 ` Michael Tremer
2018-12-11 2:01 ` Paul Simmons
2018-12-11 20:09 ` ummeegge
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d69e046565e67ec198962be291cf4577484cd401.camel@ipfire.org \
--to=ummeegge@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox