Liste des Groupes | Revenir à c misc |
Which part of “depends on” are you having trouble with?TLS doesn't /depend/ /on/ any domain information from the client.
Which cannot be sent encrypted over HTTP because HTTP encryptionServer Name Indication is part of TLS, not HTTP. HTTP comes /after/ SNI.
hasn’t been set up yet.
They don’t do “virtual hosting”, where multiple domains share the same IP address, and is an important feature of HTTP. That’s why there is a specific problem with that.Link - Postfix — Multiple domain SSL certificates | by Dave Teu | Better Coder | Medium
There are two rival specs for solving this: DNS-over-TLS, and DNS-over-HTTPS.DoT & DoH are about encrypted communications with a DNS server. The are completely independent of of TLS & SNI. What's more is that neither DoT, nor DoH can do shit about ensuring that the data sent through the DoT / DoH channel is valid. It's trivial to lie through DoT & DoH. Unless client's use DNSSEC through DoT & DoH to catch the lie.
DNS-over-TLS (DoT) is a separate protocol that can be identified as such by firewalls, while DNS-over-HTTPS (DoH) is essentially indistinguishable from any other HTTPS traffic.DoH is still subject to the SNI exposure and can be filtered that way.
DoH has become quite controversial.This doesn't have anything to do with TLS / SNI, so I'm not responding to it.
Les messages affichés proviennent d'usenet.