clarification about DHCP

This commit is contained in:
Daniel Micay 2020-02-28 21:47:22 -05:00
parent 17ed0acd26
commit bd93da0d47

View File

@ -368,11 +368,11 @@
<p>By default, in the automatic mode, the Private DNS feature provides opportunistic <p>By default, in the automatic mode, the Private DNS feature provides opportunistic
encryption by using DNS-over-TLS when supported by the DNS server IP addresses encryption by using DNS-over-TLS when supported by the DNS server IP addresses
provided by the network or the static IP configuration. Opportunistic encryption provided by the network (DHCP) or the static IP configuration. Opportunistic
provides protection against a passive listener, not an active attacker, since they can encryption provides protection against a passive listener, not an active attacker,
force falling back to unencrypted DNS by blocking DNS-over-TLS. In the automatic mode, since they can force falling back to unencrypted DNS by blocking DNS-over-TLS. In the
certificate validation is not enforced, as it would provide no additional security and automatic mode, certificate validation is not enforced, as it would provide no
would reduce the availability of opportunistic encryption.</p> additional security and would reduce the availability of opportunistic encryption.</p>
<p>When Private DNS is explicitly enabled, it uses authenticated encryption without a <p>When Private DNS is explicitly enabled, it uses authenticated encryption without a
fallback. The authentication is performed based on the hostname of the server, so it fallback. The authentication is performed based on the hostname of the server, so it