Skip to content

Commit 5622205

Browse files
committed
whitespace
1 parent 784d033 commit 5622205

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

infra.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -881,7 +881,7 @@ similar proposals to achieve this outcome, with the IETF having
881881
standardized both DNS over TLS (DoT) in RFC 7858, and DNS over HTTPS
882882
(DoH) in RFC 8484. There is some debate about the merits of each but
883883
for the purposes of our discussion the differences are not terribly
884-
significant.
884+
significant.
885885

886886
The basic idea behind both approaches is simple enough. Rather than sending DNS
887887
queries and responses as plaintext UDP datagrams, the DNS client
@@ -910,7 +910,7 @@ making the queries. The resolver has access to all the client requests
910910
in unencrypted form, which would seem to be a requirement for those
911911
requests to be served. However, there have been efforts to improve the
912912
privacy of client requests using a technique known as *Oblivious
913-
DNS*.
913+
DNS*.
914914

915915
.. _fig-odns:
916916
.. figure:: figures/odns.png
@@ -937,14 +937,14 @@ deployments already available of both the proxy and target
937937
behavior. Notably, Apple has built a privacy-focused service that
938938
combines oblivious DNS with several other technologies to support
939939
private browsing. Large CDN operators such as Cloudflare have support
940-
for the target function.
940+
for the target function.
941941

942942
.. _reading_doh:
943943
.. admonition:: Further Reading
944944

945945
Hu, Z., et al. `Specification for DNS over Transport Layer
946946
Security (TLS) <https://www.rfc-editor.org/info/rfc7858>`__. RFC 7858, May 2016.
947-
947+
948948
Hoffman, P. and P. McManus. `DNS Queries over HTTPS (DoH)
949949
<https://www.rfc-editor.org/info/rfc8484>`__. RFC 8484,
950950
October 2018.

0 commit comments

Comments
 (0)