DNSCrypt / dnscrypt-protocol

DNSCrypt protocol specification
https://dnscrypt.info
Other
136 stars 40 forks source link

Leverage DNSSEC for resolver validation #1

Open simonclausen opened 6 years ago

simonclausen commented 6 years ago

So I've had this floating around my mind for quite some time, but have never gotten around to thinking it through or doing a design suggestion. And probably won't for some time, so here's a bunch of notes to get started.

This starts with something you can't really get around, when you want to add a secure layer on anything:

Right now this is, in part, solved by having an authoritative list of DNSCrypt resolvers on GitHub, with changes happening through pull requests.

Users are also free to use servers outside this list by supplying the needed info to the DNSCrypt client manually. In this case it is entirely up to the user to figure out to make sure the info they got has not been altered during transport.

This issue is also widely solved by using PKI and CA's, which the authoritative is self bases it self upon (GitHub has been validated by a CA, etc, etc).

Perceived issues:

So what if we could get around all of this?

The rough idea:

What do you think?

simonclausen commented 6 years ago

Forgot a couple of points: