Issues
- 0
Address David's review
#206 opened - 0
Describe "experimental" details
#197 opened - 0
Polish registry contents
#193 opened - 0
Clarify Tor "cost" in ODoH
#192 opened - 0
- 0
- 1
Fix idnits issues for ODoH
#188 opened - 0
Add "outside the IETF" to the abstract
#187 opened - 0
Discuss handling of 3xx responses
#186 opened - 0
- 2
[ODoH] how is path specified in SVCB RR?
#177 opened - 0
Describe allowances for proxy authentication
#175 opened - 1
- 2
minor: provide ipv6hint in examples
#172 opened - 2
- 1
Bump ODoH version
#162 opened - 7
- 3
DEER: Clarification of SUDN
#160 opened - 13
- 0
- 4
Recommend limits
#156 opened - 1
DEER caching text
#155 opened - 3
Check for bad dns request in the protocol
#154 opened - 3
ODoH: Failure status codes
#151 opened - 2
Promote proxy URI template
#150 opened - 2
[ODoH] Add EDNS(0) client subnet guidance
#149 opened - 4
Update HPKE to draft-06
#148 opened - 1
Clarification...
#146 opened - 1
Clarify use of address hints
#145 opened - 1
- 4
DEER: Reference threat model
#143 opened - 0
- 0
DEER: Work on abstract
#139 opened - 0
- 3
[Privacy] Malicious oDoH target can learn the client's IP address through an active attack
#136 opened - 4
Key rotation considerations
#135 opened - 2
Pin Oblivious DoH to HPKE-06
#132 opened - 2
Whitelist -> Allowlist
#131 opened - 0
Default HPKE ciphersuite?
#128 opened - 3
- 0
Add explicit key to indicate zone cuts
#121 opened - 2
HTTP server push clarification
#120 opened - 2
Editorial
#119 opened - 0
Add tracking/cross-referencing
#118 opened - 0
- 1
Explore mechanisms to audit proxies or rank the proxies by their reliability/privacy guarantees
#112 opened - 0
- 1
- 1
- 0