|
|
Subscribe / Log in / New account

DNS over HTTPS in Firefox

The Mozilla blog has an article describing the addition of DNS over HTTPS (DoH) as an optional feature in the Firefox browser. "DoH support has been added to Firefox 62 to improve the way Firefox interacts with DNS. DoH uses encrypted networking to obtain DNS information from a server that is configured within Firefox. This means that DNS requests sent to the DoH cloud server are encrypted while old style DNS requests are not protected." The configured server is hosted by Cloudflare, which has posted this privacy agreement about the service.

to post comments

DNS over HTTPS in Firefox

Posted Jun 1, 2018 16:35 UTC (Fri) by dc123 (guest, #117760) [Link]

What can I say, the name speaks for itself.

DNS over HTTPS in Firefox

Posted Jun 1, 2018 16:36 UTC (Fri) by fest3er (guest, #60379) [Link] (9 responses)

That might explain the disconcerting ARP traffic (who-has w.x.y.z, tell 1dot1dot1dot1.cloudflare-dns.com) that now appears on my LAN.

I suspect that 1.1.1.1--and probably all of 1.1.1/24 and 1.0.0/24--should now be included in the list of 'never route' addresses, because what's on my private LAN is no one else's business.

DNS over HTTPS in Firefox

Posted Jun 1, 2018 16:50 UTC (Fri) by Sesse (subscriber, #53779) [Link]

1.1.1.1 is not private address space, so if you're using it on your LAN, you're doing it wrong.

DNS over HTTPS in Firefox

Posted Jun 1, 2018 18:35 UTC (Fri) by flussence (guest, #85566) [Link] (6 responses)

"1dot1dot1dot1.cloudflare-dns.com" isn't Cloudflare ARP scanning your LAN remotely — which is in fact impossible unless you're sitting in their datacentre and connected to their server with a crossover cable — that's just what the official owner of 1.1.1.1 has set its reverse DNS to.

It sounds like someone else on your LAN already decided to hijack 1.1.1.1 for use in a non-routable (and standards-breaking) way. You can null route it, but you may find yourself locked out from trashy Cisco hardware and the like.

DNS over HTTPS in Firefox

Posted Jun 1, 2018 22:03 UTC (Fri) by ajs124 (guest, #110052) [Link] (2 responses)

Vodafone (Germany) does that. Their router (EasyBOX 804, in my case) firmware was evidently written by someone that has never even taken a look at any DNS or other Internet related RFC.

First it MITMs your DNS, but only on UDP, apparently TCP was too much effort. Then it breaks DNSSEC.

And if there's not connection to the outside world, it just starts to return 1.1.1.1, because that's totally not a private IP space anyone is ever going to use. Oh wait.

They also don't deploy IPv6, because when is that ever going to catch on?

DNS over HTTPS in Firefox

Posted Jun 5, 2018 13:42 UTC (Tue) by darwish (guest, #102479) [Link]

> Vodafone (Germany) ... don't deploy IPv6, because when is that ever going to catch on?

I have a "Vodafone Kabel Deutschland" Internet connection at home, and there is IPv6, completely out of the box, _and enabled by default_.

Opening Google and asking "what is my IP" always shows my IPv6 address.

DNS over HTTPS in Firefox

Posted Jun 17, 2018 16:52 UTC (Sun) by nilsmeyer (guest, #122604) [Link]

I remember when it still was Kabel Deutschland they were highjacking NXDOMAIN, instead displaying a search engine with lots of advertising.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 16:28 UTC (Mon) by jmanig (guest, #120108) [Link] (2 responses)

> that's just what the official owner of 1.1.1.1 has set its reverse DNS to.

Actually, 1.1.1.1 seems to be Cloudflare's new DNS over HTTPS server, or at least if the https://1.1.1.1 website is to be believed. I'll admit I just looked quickly and did not dig into whether this is legit or not.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 17:40 UTC (Mon) by tialaramex (subscriber, #21167) [Link] (1 responses)

Yes, but the point is that when you use software to examine ARP packets on your local network, that software isn't magically divining the true identity of the sender of those packets, if the packets have IP address 1.1.1.1 the software just does rDNS and says 1dot1dot1dot1.cloudflare-dns.com because that's what the entry for 1.1.1.1 in the reverse DNS says.

Now, is it technically possible that a Cloudflare DNS server is on your LAN? Sure (maybe "your LAN" is in a datacentre or you work for Cloudflare). Is it likely? Nope, lots of idiots hijack 1.1.1.1 because they figure they'll pick a real value later, or they assume it's unused because it wasn't used back when they wrote their software, or just because they're very lazy and unimaginative.

And yes, it's legitimate. The 1.1.1.0/24 network (and several others in that neighbourhood) are so poisoned as to be useless for most purposes because of the hijacking I mentioned. However this particular address is memorable and thus valuable to Cloudflare. They struck a deal with, IIRC APNIC (the RIR for the Asia Pacific region) who were unable to issue this address to an LIR because it's poisoned, Cloudflare's DoS-resistant network resources would be used to monitor the subnet for APNIC and in exchange APNIC would let them advertise anycast routing into this /24 (effectively just for 1.1.1.1 itself) to run DNS services around the world.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 19:37 UTC (Mon) by jmanig (guest, #120108) [Link]

OK, I understand your comment a little better now. Thank you for the clarification.

DNS over HTTPS in Firefox

Posted Jun 6, 2018 15:00 UTC (Wed) by buchanmilne (guest, #42315) [Link]

> That might explain the disconcerting ARP traffic (who-has w.x.y.z, tell 1dot1dot1dot1.cloudflare-dns.com) that now appears on my LAN.

Use tcpdump -nn, to avoid being fooled by the change in reverse DNS for 1.1.1.1.

Or, set your DNS servers up to be claim authority for 1.1.1.in-addr.arpa if you are going to steal someone else's public address space on your private LAN ...

> I suspect that 1.1.1.1--and probably all of 1.1.1/24 and 1.0.0/24--should now be included in the list of 'never route' addresses, because what's on my private LAN is no one else's business.

Your private LAN has no business being on 1.1.1/24, or any subnet of 1/8.

DNS over HTTPS in Firefox

Posted Jun 2, 2018 0:15 UTC (Sat) by kfox1111 (subscriber, #51633) [Link]

"Firefox does not yet use DoH by default."

DNS over HTTPS in Firefox

Posted Jun 2, 2018 3:06 UTC (Sat) by gdt (subscriber, #6284) [Link] (13 responses)

The referenced A cartoon intro to DNS over HTTPS says:

The resolver will also often include the first 24 bits of your IP address in the request. This helps the DNS server know where you are and pick a CDN closer to you. But this information can be used by DNS servers to link different requests together. Instead of doing this, Cloudflare will make the request from one of their own IP addresses near the user.

Am I reading the implication correctly? ISPs which host CDNs will also need to host Cloudflare servers in order for the that ISP's other hosted CDN servers to be effective?

DNS over HTTPS in Firefox

Posted Jun 2, 2018 10:55 UTC (Sat) by roc (subscriber, #30627) [Link] (4 responses)

Not necessarily.

E.g. if your country has two ISPs, ISP X hosts a CDN, and ISP Y hosts a Cloudflare server, the DNS request will appear to come from an IP address under ISP Y, and hopefully the CDN resolver will resolve it to ISP X's CDN.

DNS over HTTPS in Firefox

Posted Jun 3, 2018 17:31 UTC (Sun) by gdt (subscriber, #6284) [Link] (3 responses)

The more likely situation is that both ISP X and ISP Y have CDN hosts. If ISP Y hosts a Cloudflare server and ISP X does not, then ISP X pulls from ISP Y's CDN, for all DNS-directed CDN services. The long-run likelihood is that the X-Y path has a charge [1]. Thus Mozilla's choice means that ISP X faces a strong financial motivation to install a Cloudflare CDN server. My view is that free software should promote open network infrastructure rather than promote a proprietary partner.

The other consideration is that ISP X is likely to be a small ISP and ISP Y is likely to be a large ISP (ISP Y is wealthy enough to host a Cloudflare CDN host, which is pretty far down the list of desirable CDN hosts). That is, Mozilla's acceptance of removing the EDNS Client Subnet Option proposed by Cloudflare adds to the market power of larger ISPs.

It would be better if Mozilla had retained the EDNS Client Subnet Option, perhaps asking Cloudflare to enhance privacy by rounding the source IP address up to (a large fraction of?) the BGP-visible network rather than to the proposed /24.

--
[1] The argument for the X-Y path being liklely charged in the long run: (1) If X-Y is a transit path then the path is already charged. (2) If X-Y is a peering path then the huge increase in traffic from Y to X will make a large enough change to the X:Y peering ratio such that is no longer in Y's interest to peer.

DNS over HTTPS in Firefox

Posted Jun 3, 2018 20:45 UTC (Sun) by tialaramex (subscriber, #21167) [Link] (2 responses)

Your proposed "rounding up" makes things very tricky, I doubt it will satisfy either group, on the one hand you're still handing over a partial address (so the privacy advocates won't be happy) on the other hand you smash some of the routing data that would help ensure stuff goes where the CDN expects, so you don't comprehensively solve the problem of choosing a bad answer.

As it stands the only thing I can divine from a DNS request via Cloudflare's Mozilla DoH offering is that it... came from some particular Cloudflare node. Probably that node is near the originator, although maybe not. There's no way around revealing this unless you're happy sacrificing performance (e.g. TOR will incur a few hundred milliseconds latency, in exchange for which nobody knows where you are in the world)

But if the EDNS "Client Subnet" is back, I get to see part of an IP address which may be more or less incriminating. Among the addresses handled by my ISP are "dynamic" assignments, where even seeing the whole address without access to their logs doesn't tell you much, right through to genuinely portable address space owned by customers, where even seeing /20 potentially gives away the game about who the end user is. I'm in the middle, with a static (but not portable) /28 of my own. So when you snip off the last 8 bits, you narrow things down to maybe a dozen customers like me with "Client Subnet" as it stands today, and maybe you could make that hundreds, but you can't make it thousands without also destroying the utility of the technique, and you'd still identify those with portable space.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 2:19 UTC (Mon) by gdt (subscriber, #6284) [Link] (1 responses)

on the other hand you smash some of the routing data

That's only the case if the BGP feed to the ISP's CDN providers differs from the BGP offered to globally-visible neighbors. In which case the solution is to provide CloudFlare with the same BGP feed as provided to the ISP's other CDNs providers.

DNS over HTTPS in Firefox

Posted Jun 6, 2018 15:18 UTC (Wed) by buchanmilne (guest, #42315) [Link]

> That's only the case if the BGP feed to the ISP's CDN providers differs from the BGP offered to globally-visible neighbors. In which case the solution is to provide CloudFlare with the same BGP feed as provided to the ISP's other CDNs providers.

Which requires you to deploy CloudFlare everywhere you have any CDN.

Not going to happen.

In a real ISP I used to be involved with:
* The country has 3 major public peering locations.
** Cloudflare has presence at 2
** Major CDNs have presence at 3
** Smaller CDNs have presence at 1 or 2
* The ISP had 3 DCs, not co-located with the peering locations
** The ISP had 1 major CDN at 3 DCs, this CDN was actually only present at the largest peering location
** The ISP had 2 major CDNs in 2 DCs that were not at any local peering locations, and didn't want to be advertised to this ISP's peers
** The ISP had 1 major CDN in 2 DCs that were present at local peering locations, and were ok being advertised to this ISP's peers, but wanted to avoid sending any of this ISPs customers to the deployment at the peering location (as it was resource constrained).

It was not technically challenging to adjust the route filters appropriately to advertise the client subnets correctly to allow for this, and customers using the ISPs DNS would transparently get the best experience with the least exposure of their DNS requests. It would be technically challenging to get this setup to work with or without Cloudflare in the ISPs DCs.

There is no real privacy improvement available here, because Mozilla's picture doesn't quite hold true. Due to the peering configuration, most DNS requrests to the large CDNs would not traverse the public internet, but would be routed across private peering connections (between the ISP and a root DNS operator, then between the ISP and it's CDN partner).

With DNS over HTTPS, now these requests may traverse the open internet, and be exposed to a 3rd-party (Cloudflare).

IMHO, for some use cases (e.g. public WiFi), this may be an improvement, but for either fixed-line or mobile-operator (e.g. 3G/LTE) internet access, this is a regression in terms of privacy (at least in my country).

In short, this move does make me wonder if Cloudflare recently made some large donation to Mozilla ... which makes me suspicious of both parties.

DNS over HTTPS in Firefox

Posted Jun 2, 2018 11:24 UTC (Sat) by excors (subscriber, #95769) [Link] (7 responses)

I think the idea is: Some CDNs set up their authoritative DNS server so that someone from Europe asking for cdn.example.com will be given the IP for a CDN server in Europe, and someone in the US asking for the same domain will be given a different IP for a server in the US. Traditionally they can't tell where the end user is, they just know the IP of the intermediate nameserver that is asking on the user's behalf, which is hopefully close to the user but may not be. RFC 7871 adds a mechanism for intermediate nameservers to report the end user's IP address (typically truncated to 24/56 bits), allowing the authoritative server to make a more accurate location-based choice.

With DoH, Mozilla/Cloudflare don't want to reveal even 24 bits of the user's IP, for privacy reasons; but they still want to allow CDN nameservers to do their location-based stuff. I presume they also want to work with CDNs that don't implement RFC 7871. To achieve that, they simply make the DNS request from a Cloudflare server that's close to the user. The CDN will return an IP that's close to the Cloudflare server (like it would for any normal request), which will therefore be close to the user.

The system's effectiveness depends on Cloudflare having servers relatively near every user, so their server's location is a good approximation of the user's location. Cloudflare is pretty big so they probably do already; and if they don't, the approximation will just get incrementally worse. There's no need for Cloudflare to have servers near other CDNs.

None of this should affect CDNs using anycast routing (like Cloudflare itself), where they have servers around the world sharing a single IP address and the routing protocol will direct every user to their nearest server, but it appears some major CDNs do still use DNS for this. I guess there is a bit of a conflict of interest for Cloudflare there, but if Cloudflare starts behaving anti-competitively and worsening the performance of other CDNs then Mozilla (whose priority is their user experience) can switch to a different provider or disable DoH, so it's probably not worth it for Cloudflare to mess around.

DNS over HTTPS in Firefox

Posted Jun 2, 2018 11:53 UTC (Sat) by Sesse (subscriber, #53779) [Link] (6 responses)

So in a sense, this makes sure no other CDN can get better geolocation than Cloudflare's CDN? :-)

DNS over HTTPS in Firefox

Posted Jun 3, 2018 11:33 UTC (Sun) by tialaramex (subscriber, #21167) [Link] (5 responses)

Yes, that would be the trade for having privacy, if Firefox chooses to use DoH for the default resolver and sets Cloudflare as the default.

I suppose other options might include:

1. Recruit one or more other DoH providers willing to offer privacy, pick a random one (at start-up, for each query, or whatever)

2. Switch off privacy, preferring to give better CDN and sacrifice the user's privacy (or maybe do so outside the porn-viewing mode)

3. Incorporate this functionality but leave it unused by default (so 99% + of users never benefit)

When it comes to item (1) I think you've got the same situation as the Search box. Users _can_ pick GoodSearch, or whatever, but by default they get the search engine Mozilla picked. The DoH configuration absolutely can be changed by anybody who knows what DNS even is in the first place. Should the Mozilla corporation sell that default (assuming multiple bidders offer equivalent privacy) for $1M? It is, after all, just a default. How about for $10Bn? That's a LOT of evangelism and software development for the price of a default...

DNS over HTTPS in Firefox

Posted Jun 6, 2018 14:37 UTC (Wed) by buchanmilne (guest, #42315) [Link] (4 responses)

> Yes, that would be the trade for having privacy, if Firefox chooses to use DoH for the default resolver and sets Cloudflare as the default.

Well, the question is, privacy from whom.

There is still no privacy from Cloudflare in this case.

How is this any better than using my ISPs DNS? The contents of my DNS requests are still (theoretically) visible by one entity (the same entity that may also be able to determine by other means the content I am viewing with varying levels of accuracy).

O, right, the US is broken and has insufficient competition in the ISP market, where in most other countries this is a solved problem (capitalistic free market!).

Thanks, but I will definitely not be enabling this feature, and will drop firefox if they make this a default.

In my country, ISPs are well regulated, we have adequate privacy laws, and my ISP:
- Is legally obligated to not give this data to any 3rd party without a warrant
- Has a much better view of the network topology than any 3rd party

For example, many ISPs have many different CDN deployments with different geographic deployments. The ISP I worked for a while ago had CDN deploymens for 4 different CDNs in 3 different data-centres. The biggest (by data volume) was deployed in 3, the next 2 were deployed in 2 DCs, the 4th in 1. And this ignores the off-network open-peering CDNs that are co-located with the CloudFlare POPs in our country.

To me it looks suspiciously like Firefox is being paid by Cloudflare to make them more attractive than other CDNs/DDoS prevention companies.

DNS over HTTPS in Firefox

Posted Jun 6, 2018 15:54 UTC (Wed) by excors (subscriber, #95769) [Link] (3 responses)

> How is this any better than using my ISPs DNS?

I think the difference is that, by choosing to use Firefox, you have already chosen to trust Mozilla to respect your privacy rights, which implies trusting their agreements with any third parties they choose to share your data with. (You can evaluate that trust based on their privacy policy, and the privacy policy they got Cloudflare to agree to, and their past record in following such policies, and comments from developers about their intentions, etc, and decide whether that trust is justified or not.)

Meanwhile you might or might not trust your ISP - that's an independent decision. (Some ISPs have a history suggesting they shouldn't be trusted as anything more than a dumb pipe, sometimes from malice and sometimes incompetence). If you trust both Mozilla and your ISP, then DoH provides no privacy benefit (well, except from anyone passively monitoring your network traffic, which is a significant benefit) but also no privacy harm. If you trust Mozilla but not your ISP, then it does provide an obvious benefit. If you don't trust Mozilla, you shouldn't be using Firefox anyway because there's a million other ways they could harm you.

DNS over HTTPS in Firefox

Posted Jun 6, 2018 17:10 UTC (Wed) by jwilk (subscriber, #63328) [Link] (2 responses)

By choosing to use your ISP, you have already chosen to trust the ISP to respect your privacy rights, which implies trusting their agreements with any third parties they choose to share your data with... Oh wait, that's not right.

Trust is not binary.

I trust Mozilla not to put backdoor in Firefox. I don't trust them at all to care about my privacy. In fact, I'm pretty sure they don't. (Hilariously, when you run Firefox for the first time, it phones home in order to show you the privacy policy.)

Similarly, I trust my ISP not to inject malicious code into my Internet traffic. I don't trust them that they don't snoop on me. I would be surprised if they didn't.

DNS over HTTPS in Firefox

Posted Jun 20, 2018 18:20 UTC (Wed) by mstone_ (subscriber, #66309) [Link]

wait, you get ISP choice?

DNS over HTTPS in Firefox

Posted Jun 26, 2018 20:10 UTC (Tue) by flussence (guest, #85566) [Link]

>I trust Mozilla not to put backdoor in Firefox.
Have they apologised yet for their use of a pre-existing backdoor to push Comcast ads in-browser to several million users last November? The closest I've seen to them even acknowledging that they got caught is a pageful of sneering corporate spin-doctoring congratulating themselves on the “shared user experience”.

DNS over HTTPS in Firefox

Posted Jun 2, 2018 3:48 UTC (Sat) by magfr (subscriber, #16052) [Link] (4 responses)

How does this interact with the rather common setup where an entity intranet (on an RFC1918 network) is presented through the entitys internal DNS server but not publicly available?

DNS over HTTPS in Firefox

Posted Jun 2, 2018 9:39 UTC (Sat) by tialaramex (subscriber, #21167) [Link] (2 responses)

DoH isn't changing anything there. "Split Brain" DNS already doesn't do what you want if anybody chooses to use a resolver other than the one you're offering private records from.

So much as this breaks already for anybody who picks 8.8.8.8 as their resolver, it will also break if they pick DoH with 1.1.1.1

DNS over HTTPS in Firefox

Posted Jun 3, 2018 9:06 UTC (Sun) by magfr (subscriber, #16052) [Link] (1 responses)

Except that most users doesn't pick their name server, they use whatever DHCP tells them to use and then things, while still technically broken, appears to"just work" and it is the user experience of those users I worry about.
I expect the technically savvy users to know what they are doing and handle the fallout so I don't worry about them.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 17:32 UTC (Mon) by tialaramex (subscriber, #21167) [Link]

Apparently Firefox's implementation has both a soft fail and a hard fail DoH mode. In hard fail, too bad, you wanted DoH, the name you asked about is NXDOMAIN (or no records) according to the DoH resolver, so, this site isn't reachable.

In soft fail, after it gets a negative response over DoH, Firefox tries your default OS resolver. This means /etc/hosts entries, "split brain" private DNS entries and so on will work after that happens.

I can see there'd be split brain scenarios where this doesn't do what you want (e.g. the public Internet sees one server, which requires a separate multi-step authentication, but the private Intranet offers a different IP address for the same name, and on that server it uses, say, Windows authentication or a company SSO solution). But I suspect those are comparatively rare.

DNS over HTTPS in Firefox

Posted Jun 8, 2018 16:32 UTC (Fri) by mcmanus (guest, #4569) [Link]

The Firefox DoH implementation has a soft fallback mode that is meant to deal with most instances of split horizon dns, 1918, and captive portals. Developers who already rely on a specific resolver to redirect between a couple different responsive addresses (like using /etc/hots to test a particular vip) would need to disable doh to use the os resolver. This should pretty much only be an issue when each address is 'working' at the http level (and 1918's are always screened out). Its possible we wold make that part of dev-tools in the same way that the cache is often bypassed easily in dev-tools.

DNS over HTTPS in Firefox

Posted Jun 2, 2018 15:43 UTC (Sat) by phython (subscriber, #3278) [Link]

It seems odd that the RFC uses :scheme = https instead of :scheme = dns. There doesn't seem to be a useful reason to support dns over http/1.0.

DNS over HTTPS in Firefox

Posted Jun 2, 2018 17:03 UTC (Sat) by fratti (guest, #105722) [Link] (42 responses)

The quest to over-re-engineer every protocol to run on top of HTTPS, be centralised, be slower and aid in surveillance continues.

DNS over HTTPS in Firefox

Posted Jun 2, 2018 17:10 UTC (Sat) by oldtomas (guest, #72579) [Link] (1 responses)

About ten years ago, I liked to express that as "multiplexing the whole Internet over port 80" (well, it's more like 443 these days, but you get the idea).

Nowadays I tend to be speechless.

I for one hope that there's a way to disable it, and that it doesn't go the way of the "disable Javascript" checkbox.

After all, I definitely don't want "my" browser to bypass the operating system's resolver.

DNS over HTTPS in Firefox

Posted Jun 6, 2018 16:48 UTC (Wed) by jezuch (subscriber, #52988) [Link]

Look, the OSI model is evolving. It's just grown an 8th layer :) We can have fun speculating which will be the 9th - Facebook API's? I can imagine just fine a future where everything other than fb is suspicious and blocked by middleware by default ;)

DNS over HTTPS in Firefox

Posted Jun 3, 2018 3:40 UTC (Sun) by roc (subscriber, #30627) [Link] (39 responses)

For almost all users, this is actually faster and a big privacy win. It's also not necessarily "centralised" since other operators than Cloudflare could offer a similar service.

DNS over HTTPS in Firefox

Posted Jun 3, 2018 7:57 UTC (Sun) by oldtomas (guest, #72579) [Link] (16 responses)

"Almost all users" and "faster" are exactly that kind of dangerous metrics.

Nobody would argue that faster is better, and that it does make sense to understand what "most users" (whatever that is) need, but used exclusively, those metrics lead us to paint ourselves into a corner too early.

The most fatal one is "almost all users", which leads to a fatal co-optimization feedback loop which makes applications more and more patronizing ("you don't *need* that feature: telemetry has proven that") and users dumber and dumber.

I'm not surprised that bigcorps push hard in that direction: it's part of their business model, after all.

But seeing Mozilla doing this is really painful: after all, they're the Good Folks (yes, no irony here, I mean it!).

DNS over HTTPS in Firefox

Posted Jun 3, 2018 11:59 UTC (Sun) by tialaramex (subscriber, #21167) [Link] (3 responses)

But this is about a _default_ so the "almost all users" line seems appropriate.

I'm sure at least one person in the world finds "Bing" to be absolutely the best search engine, and is annoyed every time something defaults to Google. But if it's a just _default_ that's better than making all the millions of people who prefer Google reach in and change that setting.

This is also a security consideration, and Mozilla absolutely does make decisions about security on behalf of its users with only "Build your own browser instead from our source" left as an option for those who disagree. For example the upcoming distrust of CA roots controlled by Symantec (Verisign, Thawte, etcetera) won't be something you opt into, or even a default, it'll just happen automatically when you upgrade Firefox. Again I have no doubt that at least one person in the world would prefer to continue trusting these roots, and that person might not even work at Symantec, but Mozilla chose on behalf of its entire user population to distrust these CA roots.

DNS over HTTPS in Firefox

Posted Jun 3, 2018 21:52 UTC (Sun) by ballombe (subscriber, #9523) [Link] (1 responses)

FWIW, It seems that symantec has resold its CA business to digicert.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 0:57 UTC (Mon) by tialaramex (subscriber, #21167) [Link]

Yes, the way that happened starts with Symantec being told the old roots have to go away. Symantec was to build completely new systems, fresh roots, re-train staff, and so on. Since that obviously could not be done (at least correctly) overnight, they were to bring in a third party, which would have to be a big existing public CA, to host infrastructure until they could cut over to their new systems after re-gaining our trust.

I don't know how far Symantec got into that plan exactly, but somewhere between asking DigiCert "Can you help us?" and actually executing the plan changed into DigiCert acquiring the CA roots, branding, goodwill etcetera from the Symantec business. There was plenty of scepticism on m.d.s.policy but DigiCert seem to have been very diligent about this, I hope it's paying off for them profit-wise in proportion to the effort they must have spent.

One of the things that eased minds at m.d.s.policy is that DigiCert seems to understand the old roots had to go, and there was no foot-dragging, "mistakes" where old certificates have to be grandfathered in and so on as we'd come to expect from Symantec.

The end result will be that cryptographically nothing inherited (at presumably considerable expense) from Thawte, Versign, etcetera is left standing, that's all gone. In terms of infrastructure it's all DigiCert, in terms of staff, leadership is DigiCert there may be particular personnel even on the crypto side who are Symantec, but leadership is where it all went wrong previously so that's not a great worry. For customers, I suspect much of the branding and maybe sales teams are kept from Symantec, if you have a customer paying $5000 for Verisign, well, that customer probably doesn't care about some rotten ten year old 2048-bit RSA root from the actual Verisign, they just remember the brand name, and DigiCert have bought that.

From a trust perspective what we (m.d.s.policy, anybody paying attention) didn't trust was Symantec executive level management and thus the roots which had been under the oversight of that management. Negligence, incompetence, malice, I don't know and I don't care, personally as a lay person my suspicion is incompetence, I think the Symantec board hasn't the first idea what they're doing, and it was just more obvious to us, and we were better able to take action, than say, a pension fund or other shareholder.

DNS over HTTPS in Firefox

Posted Jun 6, 2018 15:25 UTC (Wed) by buchanmilne (guest, #42315) [Link]

> I'm sure at least one person in the world finds "Bing" to be absolutely the best search engine, and is annoyed every time something defaults to Google.

There is another browser that often re-sets such defaults, e.g. from Google to Bing.

I refuse to use that browser (for anything other than downloading a better browser).

There is also an OS that keeps trying to change your default browser to use that browser.

I refuse to use that OS.

I hope I don't need to add Firefox to the list ...

DNS over HTTPS in Firefox

Posted Jun 3, 2018 12:01 UTC (Sun) by brokentux (guest, #124718) [Link]

I would argue "faster is better"

Faster at what cost ?

As long it is easy, practical and doesn't require to the single intellectual effort the user will go for it. Bigcorp just see their own interest with the blessing of their own customers/client...

I agree with what you previously said : "I definitely don't want my browser to bypass the operating system's resolver.", it can be faster, but I will not swallow the "big privacy win".

DNS over HTTPS in Firefox

Posted Jun 3, 2018 22:10 UTC (Sun) by roc (subscriber, #30627) [Link] (10 responses)

Users should have privacy and security by default without them having to lift a finger or understand how the system works. Not because they're "dumb", but because they should be free to spend their scarce attention on other things that are more important to them. Just as I want my car to operate safely without me having to look under the bonnet.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 10:55 UTC (Mon) by oldtomas (guest, #72579) [Link] (8 responses)

And Mozilla should take a small step back in its arrogance in defining what "privacy and security" is, and making opt-outs/different choices easier.

How did this "disable Javascript" go? Just because of Mozilla's stubborn "vision" of the Web as a fuzzball distributed application, we better take this option away because the user is too stupid to decide for herself ("telemetry has shown that..."). This in turn enourages web "programmers" out there (well, it's more the "frameworks", but you get the idea) to just ignore non-javascript "consumers", closing the feedback loop.

What this achieves is a slow and progressive breaking of the contract, that a web page is a "document", thus reducing user autonomy.

Sorry, but that makes me furious. Especially when it comes from allies.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 11:54 UTC (Mon) by roc (subscriber, #30627) [Link] (7 responses)

Sites would depend on Javascript regardless of whether browsers allow disabling Javascript, because the vast majority of users have it enabled and it's useful. This has never been in Mozilla's power to fix.

There never was any "contract" that a Web page is a static "document", and if there had been, it was lost when JS was enabled by default in Netscape 2 in 1995. If, somehow, that decision had never been made, the Web would have been replaced by something that did support code execution by default (e.g. Flash), and we'd all be worse off because some company, probably Microsoft, would own the Web much more thoroughly than any one company does today.

I'm sad it still makes you furious after 23 years.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 11:56 UTC (Mon) by roc (subscriber, #30627) [Link]

I should also point out that Mozilla did a significant amount of work on WebExtensions APIs in the last couple of years to make sure NoScript still works.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 13:05 UTC (Mon) by excors (subscriber, #95769) [Link] (3 responses)

I seem to remember thinking The Microsoft Network was much cooler than the web, some time around 1995. I think it was an internet-based (but not web-based) dial-up service with multimedia pages and chat rooms and stuff, but it had a tragically short life. Maybe the web should have stuck with static hyperlinked documents, and we could all still be enjoying MSN today.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 13:20 UTC (Mon) by roc (subscriber, #30627) [Link]

Yeah, Microsoft was copying AOL's playbook and setting up their own walled garden, MSN, making deals with all kinds of potential content providers. But before it really got going they saw that the Web would swamp them and pivoted to focusing on Internet Explorer, cancelling all those deals overnight.

You were probably being sarcastic but if Microsoft had crushed the Web with their own platform through MSN or later WPF/Avalon, our situation today would be very different and probably a lot worse. Mozilla saved the day, with generous help from Bill Gates's blunders.

MSN

Posted Jun 4, 2018 18:39 UTC (Mon) by tialaramex (subscriber, #21167) [Link] (1 responses)

The Microsoft Network wasn't the Internet, quite deliberately. It was a walled garden. It's very important in a walled garden not to show the "customers" trapped inside your garden that there _is_ an outside, because of the grass-is-greener phenomenon. After all, if there's an outside, who is to say there aren't better things out there than in here? And once they start thinking that the jig is very much up. Several walled gardens existed, Microsoft's was probably the last to launch, AOL and Compuserve were more notable and longer-lived (as walled gardens anyway).

By 1996 MSN had become a web-based interactive media site although "MSN Classic", the above walled garden, survived until 1998, increasingly shrivelled and unmaintained and "MSN Dial-up", the service you paid for that was no longer the walled garden, survives to this day if you still want dial-up Internet access for some reason. By the turn of the century "MSN" meant a web site Microsoft owned, msn.com, that was a "web portal" when that was a thing, which if you're over sixty maybe it still is.

It's amazing to me that in 1995 there was (some) executive cover for MSN at Microsoft. Not just because Netscape Navigator 1.0 is from 1994, but because the Internet itself is clearly unstoppable by that point. In 1989 the Internet is dominant but perhaps not unstoppable, in the US a lot of systems are using IP, but JaNET is still an X.25 network, and many countries have little or no multi-institutional networking above bulletin-board type systems. By 1992 that's all over, "experimental" Internet service for JaNET dwarfs the "official" X.25 network it was created to run, countries with little English penetration are maintaining non-IP systems they've already built, but there is absolutely no demand for any new non-IP systems. There is a thriving cottage industry of filing the serial numbers off the Berkeley TCP/IP implementation and pasting it into other software to interoperate.

There seems to have been some conceit at Microsoft that MSN could co-exist with the Internet, rather than one or the other being extinguished. That never made any sense at all. The only reason to have MSN at all was if you were sure you could extinguish the Internet and sell MSN instead, and that didn't pass the laugh test by 1995.

MSN

Posted Jun 5, 2018 8:53 UTC (Tue) by anselm (subscriber, #2796) [Link]

The story goes that, in Bill Gates's book, The Road Ahead, everywhere the first printing said “Microsoft Network”, the second printing said “the Internet”.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 14:49 UTC (Mon) by oldtomas (guest, #72579) [Link] (1 responses)

> There never was any "contract" that a Web page is a static "document", and if there had been, it was lost when JS was enabled by default in Netscape 2 in 1995.

You *know* that this is a very lopsided view of things. The Web is still degrading now, and the most important part of the slope started about five to seven years ago. Before, there always was a talk of "graceful degradation", but taking away the controls from users is just doing the rest. So yes, there were remnants of that contract there.

A strong indicator is web sites explaining to users how to enable Javascript (and trying to talk them into "just enable Javascript now, dammit"): those have been disappearing as those users become less and less.

Leaving that little checkbox there might have changed things a bit. One little piece of user empowerment less, alas.

(And yes, I acknowledge Mozilla's efforts with NoScript, but this is just a poor substitute).

I know you don't like to hear it, because Mozilla's vision is "the browser as application platform", but that's what I observe. So I'm furious and you're sad.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 15:47 UTC (Mon) by Wol (subscriber, #4433) [Link]

> > There never was any "contract" that a Web page is a static "document", and if there had been, it was lost when JS was enabled by default in Netscape 2 in 1995.

> You *know* that this is a very lopsided view of things. The Web is still degrading now, and the most important part of the slope started about five to seven years ago. Before, there always was a talk of "graceful degradation", but taking away the controls from users is just doing the rest. So yes, there were remnants of that contract there.

The broken contract I really miss is that it is down to the *receiver* *device* to control the formatting, such that what appears on the screen and what appears on the printer and what appears on whatever other device the user may have ... I'm just totally fed up with a "simple" web page in the browser turning into 30 or 40 pages on the printer, many with just one giant letter on them, and the information that I really wanted that was clearly visible on screen doesn't even print!!!

Cheers,
Wol

DNS over HTTPS in Firefox

Posted Jun 15, 2018 1:56 UTC (Fri) by flussence (guest, #85566) [Link]

I'll believe that when Mozilla starts actively promoting DNSSEC over crooked CAs and unnecessarily terrorising users to pressure hosts into supporting that system. Until then the words are as hollow as the security model.

DNS over HTTPS in Firefox

Posted Jun 3, 2018 18:42 UTC (Sun) by niner (subscriber, #26151) [Link] (7 responses)

How on earth can telling a US corporation about every single site I visit be considered a privacy win?? Because of a privacy agreement with another US corporation (Mozilla or how they call it in the text "Firefox") that the user is not part of? Or the "promise" where every clause is somehow qualified? Like they promise to not sell _personal_ information or user identifiers, but what about the other data? "Anonymous user X visits the following sites". That's certainly enough of a fingerprint already. Or the promise to not sell, license, sublicense, etc. the data without Mozilla's permission. Oh how nice. They ask Mozilla. Good that they won't ask me...

DNS over HTTPS in Firefox

Posted Jun 3, 2018 19:08 UTC (Sun) by paulj (subscriber, #341) [Link] (1 responses)

And how does this re-direction of personally sensitive DNS traffic to a specific US corporation interact with the EU GDPR?

DNS over HTTPS in Firefox

Posted Jun 3, 2018 23:35 UTC (Sun) by knan (subscriber, #3940) [Link]

I think it interacts as follows: turn this on by default, in order to get Mozilla fined to oblivion.

It's complete madness. :)

DNS over HTTPS in Firefox

Posted Jun 3, 2018 21:54 UTC (Sun) by roc (subscriber, #30627) [Link] (4 responses)

Do you have similar or better privacy agreements with everyone who can see your DNS traffic today? If not, this is a privacy win for you.

99% of users don't, so this is a privacy win for them.

If you take the position that Mozilla should never make DoH the default in Firefox for "reasons", then you're saying that those reasons are more important than giving those users that privacy win.

DNS over HTTPS in Firefox

Posted Jun 3, 2018 23:43 UTC (Sun) by knan (subscriber, #3940) [Link] (1 responses)

In repressive regimes, this will be blocked.

In Europe, this will be illegal to do by default.

In the US, this might almost be a reasonable thing if you could trust a company, but the US is broken and most big companies are not to be trusted. And the US is not 99% of users.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 10:15 UTC (Mon) by roc (subscriber, #30627) [Link]

> In repressive regimes, this will be blocked.
> In Europe, this will be illegal to do by default.

I do not think either of these will be true, but we'll have to see.

> In the US, this might almost be a reasonable thing if you could trust a company, but the US is broken and most big companies are not to be trusted.

In the US, Cloudflare and Mozilla are a lot better then the telcos.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 9:42 UTC (Mon) by niner (subscriber, #26151) [Link] (1 responses)

I say again: I do not have any privacy agreement with Cloudflare. None. Mozilla (foundation? corporation?) might have some agreement, but I am not a party of this. So no, that's not really any hurdle to climb. Who can see my DNS traffic? If I don't go to any lengths like using a VPN, it's my employer, whom I do kinda trust and it's my ISP. Which is an Austrian corporation under Austrian law which has had real privacy provisions for a long time and which recently got real teeth as well. And yes, this law requires the corporation to tell me any time what they do with my data and which prohibits it from selling or sharing it with anyone and which requires them to keep it safe.

That's pretty much the opposite of Cloudflare which is based in a country that right about now is even less trustworthy than China. Because China at least so far keeps its agreements and they are kind of predictable.

So in short: no, I have agreements with neither Cloudflare, nor the local companies that get my DNS data. But I don't need one because here we have laws for protecting our data. And that's true for a rather large part of your user base. So I very much doubt the 99 % claim.

DNS over HTTPS in Firefox

Posted Aug 13, 2018 13:51 UTC (Mon) by JanC_ (guest, #34940) [Link]

Cloudflare has a large presence in the EU though, so they would be required to follow European privacy laws just like your employer & ISP.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 10:43 UTC (Mon) by fratti (guest, #105722) [Link] (13 responses)

>For almost all users, this is actually faster and a big privacy win. It's also not necessarily "centralised" since other operators than Cloudflare could offer a similar service.

Do you have any data on that performance claim? Because I heavily doubt it.

In almost all default router configs I've seen so far, one of two things happens:
A) the router gives out the ISPs DNS server over DHCP
B) the router gives out itself as DNS server over DHCP, forwarding requests to the ISPs and doing caching.

While Cloudflare's peerings are quite good, they do not beat an ISP local route. They also do not beat LAN. They also do not beat the Windows local OS-wide DNS cache. That's one huge flaw in your argument already.

Secondly, DNS can (and does) use UDP. UDP is a datagram protocol. It is connectionless: there is no handshake. A client makes a request, a server responds, two packets in total if both of them are below the common internet MTU of 1500. Furthermore, the kernel knows when to send those packets, because it precisely knows when a message starts and when it ends: precisely when a packet starts and it ends.

Now compare this to HTTP on TLS on TCP:
1. We've got a TCP handshake
2. We've got a TLS handshake (which can be done partially in the TCP handshake, but since you built a bad idea on top of previous bad ideas, nobody knows if the real world stacks will support this)
3. We've got a HTTP request which is in a stream protocol so the kernel needs some heuristic to figure out when to actually send a packet.

"but ooh, OOOH!" you shout, "we can just keep the connection open! Yes! Handshake only once!"
Well, but then what does that mean? You're going to be pinging back and forth keep-alive packets, keeping useless state on both machines, and essentially all you're doing is sending datagrams awkwardly wrapped in plain-text over a stream protocol making the kernel's network stack sad. You cannot get faster than request->response in one packet each. You do not get faster by adding more packets. This is not how protocols work. This is not how computers work. No, adding JSON and WebGL into the mix won't lubricate it with HTML5 awesomesauce.

Now that I've cast some serious doubt as to the performance claim, let's cast some serious doubt as to the "not centralised" claim.

DNS, in its current form, is by default centralised. Your average consumer laptop will get DNS from DHCP. Your average consumer router will get DNS from DHCP.

DoH is centralised by default. Cloudflare cackles as they get all the data because Mozilla buried the option to change the DoH "service" somewhere in about:config, and any alternative DoH service wouldn't have as good peerings as Cloudflare does.

And another question: where did you get the "for almost all users" statistic from? Did those users agree to participate in your data collection? How big was that sample size? Could you please tell me about the way your measuring setup was constructed?

DNS over HTTPS in Firefox

Posted Jun 4, 2018 10:47 UTC (Mon) by fratti (guest, #105722) [Link]

Oops, meant "is by default decentralised" for DNS in its current form.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 11:47 UTC (Mon) by tialaramex (subscriber, #21167) [Link]

Mozilla has both volunteers who provide automatic data about their production version of Firefox which is aggregated and then presented in public so that anybody can look for patterns, AND volunteers running pre-production versions with deliberate test features ("Shield Studies"), in this case one of those features runs your existing resolution and DoH in parallel, throws away the answers from DoH and reports back metrics to Mozilla.

So the answer is they're collecting that data. I'm sure if the data they get says "This is slower and often doesn't work" they will accept that and re-evaluate their approach.

It's important to actually collect data, that's how we got Natural Philosophy (and so Science) as a huge upgrade over previous approaches to philosophy that proceed as you've demonstrated by arguing from premises that seem to support the philosopher's position. Among the things philosophers felt comfortable they'd figured out by your method are that the Earth is fixed at the centre of the universe, flies are spontaneously generated by the decay of living matter, and all numbers are rational.

Chrome too has programmes collecting data (although it seems Google is more comfortable just "volunteering" its own users without their knowledge), it has found all sorts of interesting things through such experiments, and since it often shares the results that lets everybody avoid getting blind-sided. For example the reason TLS 1.3 on the wire looks so silly today is that the earlier drafts (before Draft 23) were randomly enabled for Google Chrome users, and Google's metrics showed that a frighteningly high proportion failed -- even though your approach (write down axioms, scratch your beard, come to a conclusion) said that these drafts were definitely back-compatible with TLS 1.2, reality insisted otherwise. So from there experimentation found a way to sneak past most of the garbage middleboxes that weren't compatible and the draft with those changes (plus other language that doesn't change anything on the wire) is what we have today.

[ For TLS 1.2 nobody did that before publication, they relied on your approach. The standard sat on paper for _years_ largely unused, because if you tried to enable it for ordinary users a huge proportion of them got a non-working browser, and so they'd just switch to a competitor who wasn't trying to do TLS 1.2. ]

DNS over HTTPS in Firefox

Posted Jun 4, 2018 12:26 UTC (Mon) by excors (subscriber, #95769) [Link] (1 responses)

https://www.theregister.co.uk/2017/12/14/protecting_dns_p... says DNS performance is often surprisingly slow - "the 75th percentile for lookups is 181 milliseconds". (I don't know where that data originally comes from, but I don't doubt it exists). It sounds like many ISPs just implement DNS badly, and they don't care enough to improve it, and the people who do care (like end users and Mozilla) didn't have the power to fix anything. But now Mozilla can fix it by moving users onto more efficient DNS implementations.

The latency of a single DNS request isn't hugely important in a web browser - the problem is when you need to sequentially make one request for the HTML page, then another to a different domain for the JS, then to a third domain for some JSON data, then to a fourth for an image, etc. Doing the handshake per request would be silly, but you can fix that by just keeping the DoH connection alive for a few seconds - you don't need an endless flood of keep-alive packets. If it times out and you need to restart the connection when the user clicks a link an hour later, that's fine.

https://bitsup.blogspot.com/2018/05/the-benefits-of-https... notes that DoH will be able to easily transition from HTTP/2-over-TCP to HTTP/2-over-QUIC-over-UDP, for more efficient transport and better handling of packet loss (which I assume is really bad in DNS-over-UDP), and there's the possibility of providing a speculative response before the request has even been sent (if they can work out how to preserve security/privacy/etc). Since browsers and CDNs obviously want to improve HTTP performance anyway, so the protocols and implementations will already exist, and DoH only requires coordination between a single browser and a single DNS provider (not every single ISP in the world) to provide the full benefit to the browser's users, it seems a reasonably straightforward approach.

DNS over HTTPS in Firefox

Posted Jun 6, 2018 15:40 UTC (Wed) by buchanmilne (guest, #42315) [Link]

> DNS performance is often surprisingly slow - "the 75th percentile for lookups is 181 milliseconds".

This is hardly surprising; however for a long time the p0 for ICMP echo request to Cloudflare in my country was 170ms where the p50 for DNS requests to my ISPs caching DNS was < 20ms.

And most users are unlikely to worry about a p75 DNS resolution time of 181ms, if the quality of the p50 answers is 10x better (uses a CDN 5ms away rather than 50ms away, or 20ms away rather than 200ms away).

DNS over HTTPS in Firefox

Posted Jun 4, 2018 13:34 UTC (Mon) by roc (subscriber, #30627) [Link] (1 responses)

I'm not doing this work. I don't even work for Mozilla. So I don't have the data myself. But I know the people who are doing it, and I trust them and their claims.

https://bitsup.blogspot.com/2018/05/the-benefits-of-https...
This is also relevant: https://developers.google.com/speed/public-dns/docs/perfo...
The average ISP just isn't that good at managing this kind of service.

Having said that: you're right. I overstated the case to say it's "actually faster for almost all users". Sorry. It probably is for many users, but we don't have that data yet, and improvements like QUIC and push are probably needed to make it really fast.

> Cloudflare cackles as they get all the data because Mozilla buried the option to change the DoH "service" somewhere in about:config, and any alternative DoH service wouldn't have as good peerings as Cloudflare does.

Google probably does, and they're running a public DoH service: https://github.com/curl/curl/wiki/DNS-over-HTTPS#publicly...

DNS over HTTPS in Firefox

Posted Jun 4, 2018 19:06 UTC (Mon) by fratti (guest, #105722) [Link]

Ah yes, a choice between Google and Cloudflare, now this truly is decentralisation.

DNS over HTTPS in Firefox

Posted Jun 4, 2018 17:37 UTC (Mon) by Cyberax (✭ supporter ✭, #52523) [Link]

DNS can use UDP. But if you're using DNSSEC then the replies are most likely larger than your MTU, prompting a fallback to TCP. So now you have UDP request followed by a TCP request.

Simply keeping a pool of open TLS connections is probably going to be a speed win.

DNS over HTTPS in Firefox

Posted Jun 5, 2018 14:11 UTC (Tue) by nilsmeyer (guest, #122604) [Link]

Cloudflare may have a lower latency connection to the authorative nameserver (very often they are the authorative nameserver) so in practice the lookup can be a lot faster.

DNS over HTTPS in Firefox

Posted Jun 8, 2018 20:27 UTC (Fri) by mcmanus (guest, #4569) [Link] (3 responses)

Hi - these are interesting thoughts that we have considered. They will need more attention as we get more experienced doing DNS with an authenticated endpoint.

In the soft fail (expected) mode, the resolver never waits for the DoH connection to be ready - if the http2 session isn't up, then it uses the os resolver. Hard fail mode will block if that's what you want but that won't be the default config. Honestly, the connection is pretty much there unless you haven't been browsing at all lately - the browser looks up a surprising number of names. (nothing about this project changes that)

the cache is interesting. Firefox has a cache of its own - meant to cover the lack of an OS cache. The cloud cache might be farther away than an ISP cache (but sometimes not), but its probably actually better populated than most ISPs but not all. It will be interesting.

Lots of ISPs just forward silently to quad 8 anyhow as they sit in the middle. (note they don't assign the end user e2e quad 8 - wonder why that is.) Especially in asia.

and tcp absolutely can outperform 1 packet per message in udp some of the time because DNS senders have absolutely terrible strategies for loss recovery and congestion control and tcp has been working on those problems for a long time. Indeed I've seen DNS stacks that actually induce their own losses (and then crudely repair them with 1second timers) through too much parallelism.. so there are some definite non obvious tradeoffs here.

DNS over HTTPS in Firefox

Posted Jun 8, 2018 23:09 UTC (Fri) by fratti (guest, #105722) [Link] (2 responses)

Hi,

a lot of these arguments appear to try pushing DoH claiming the inferiority of real-world deployments of UDP DNS protocols, not actual inferiority of the protocol itself. I don't think this is fair, of course if you say "Yes, we at Cloudflare and Mozilla are going to deploy this better," it'll be a better deployment in the real world. That, however, does not make DoH a good idea, because you didn't fix the existing stacks, you made an overengineered new stack that is not more performant on the protocol level, but just on the implementation level. If you're going to take over both the protocol and the implementation, why not do it properly in both areas? Why not DTLS? Why HTTP?

DNS over HTTPS in Firefox

Posted Jun 8, 2018 23:57 UTC (Fri) by excors (subscriber, #95769) [Link]

> Why not DTLS? Why HTTP?

https://bitsup.blogspot.com/2018/05/the-benefits-of-https... seems to answer that.

DNS over HTTPS in Firefox

Posted Jun 9, 2018 4:57 UTC (Sat) by Cyberax (✭ supporter ✭, #52523) [Link]

I spent an inordinate amount of time trying to make sure that an UDP-only DNS server can work in the current Internet, with IPv6. Purely out of engineering sense - DNS should be stateless and connectionless.

Well, it failed miserably. With DNSSEC you are routinely looking at replies that are greater than 1500 bytes long. IPv4 fragmentation usually saves the day (though it's slowly getting more and more broken) but with IPv6 it's a complete non-starter.

There are two ways to fix it:
1) Make DNS great^W small again. ECC instead of RSA basically fixes it for _most_ cases, but not all.

2) Just forget about all this stateless nonsense and go full-metal-stateful. This way you can utilize all the advances made by browsers, in particular QUIC and TLS 1.3. They allow zero-RTT connection initiation, at the cost of stored data.

DNS over HTTPS in Firefox

Posted Jun 20, 2018 18:37 UTC (Wed) by mstone_ (subscriber, #66309) [Link]

I don't think you grasp just how really, really, really terrible many ISP DNS implementations are.

My ISP is one of the largest in the US, and the latency to the nameservers they put in the DHCP replies is worse than the latency to 8.8.8.8... They also hijack NXDOMAIN, and they don't play particularly nicely with DNSSEC (would probably break the revenue stream from NXDOMAIN hijacking.)

DNS security ?

Posted Jun 3, 2018 5:47 UTC (Sun) by johnjones (guest, #5462) [Link] (8 responses)

DNSsec is working over HTTPS or just plain DNS ?

if that includes DNSSec can we please use that in our own resolvers rather than just Cloudflares ?

DNS security ?

Posted Jun 3, 2018 7:27 UTC (Sun) by tialaramex (subscriber, #21167) [Link] (7 responses)

DNSSEC is a bunch of new DNS record types that let us make and prove assertions about DNS answers we get so that we can be sure they're right even if we got them from a cache.

DoH is a transport for DNS that prevents people on the IP route between you and the resolver seeing your queries

These are entirely orthogonal.

In a new enough Firefox (no release Firefox is new enough, this article is about an experiment available to pre-release users) you can set any DoH resolver you like, Cloudflare's public resolver is being used for the test to understand whether this will work for many or few users in practice, and how much slower it is for them.

DNS but no security ?

Posted Jun 3, 2018 14:45 UTC (Sun) by johnjones (guest, #5462) [Link] (6 responses)

So the Firefox DNS query is sent over HTTP via TLS and firefox is unable to verify if the answer is correct ?

seems a little pointless without DNSSEC but that would require mozilla do some actual engineering....

DNS but no security ?

Posted Jun 3, 2018 15:53 UTC (Sun) by excors (subscriber, #95769) [Link] (5 responses)

https://blog.cloudflare.com/dns-resolver-1-1-1-1/ indicates Cloudflare's 1.1.1.1 service does DNSSEC validation (with some workarounds for "domains with detected and vetted DNSSEC errors") - clients don't need to do DNSSEC checking themselves if they trust the resolver to do it. I assume Firefox's DoH with Cloudflare will work the same way.

DNS but no security ?

Posted Jun 4, 2018 11:17 UTC (Mon) by ledow (guest, #11753) [Link] (4 responses)

Yes, but that totally destroys the point of verifying the records in the first place.

Yes, you can communicate to CloudFlare, and yes Cloudflare "say" that they are checking DNSSEC but there's no guarantee at all. Are they going to take responsibility for frauds if someone hijacks the entry for hsbc.com and their DNSSEC resolver just says it's fine? Or if, as stated, they have some DNSSEC error in their records?

DNSSEC needs to be end-to-end, or it's worthless. It's built precisely for the purpose of preventing man-in-the-middle altering of DNS records. Sure, it's not "private", but it's "verified".

Your connection to this would be "private" but you have to trust the endpoint to never tamper? When they could have brought DNSSEC data down with the records so you didn't have to rely on them just saying "Look, trust me, that's really microsoft.com's address"?

It's a valid question, and a massive oversight if they've not done that.

Clients ABSOLUTELY need to do DNSSEC checking themselves, otherwise you literally gain nothing from even attempting to use DNSSEC for some part of the journey.

DNS but no security ?

Posted Jun 4, 2018 12:43 UTC (Mon) by excors (subscriber, #95769) [Link] (1 responses)

Is Mozilla going to take responsibility for fraud if their DNSSEC implementation is buggy and incorrectly says a site is fine? I assume not, because of the standard disclaimer of warranty, and that seems like essentially the same situation. Unless you're going to check the DNSSEC records yourself with pen and paper, you inevitably have to trust somebody else. Trust is transitive - if you trust Mozilla then that implies you trust the third-party libraries they choose to use in their code (via trusting Mozilla's methods of evaluating those libraries), and similarly you trust the third-party services they choose to cooperate with. So you should either trust Mozilla and Cloudflare equally, or you should trust nobody and never do online banking.

DNS but no security ?

Posted Jun 4, 2018 15:52 UTC (Mon) by Wol (subscriber, #4433) [Link]

> Is Mozilla going to take responsibility for fraud if their DNSSEC implementation is buggy and incorrectly says a site is fine? I assume not, because of the standard disclaimer of warranty, and that seems like essentially the same situation.

"Unfair Terms And Conditions".

If Mozilla enable it by default, and disclaim warranty, then certainly for the man on the Clapham Omnibus they could get a *VERY* nasty shock in court ...

Cheers,
Wol

DNS but no security ?

Posted Jun 4, 2018 17:40 UTC (Mon) by Cyberax (✭ supporter ✭, #52523) [Link] (1 responses)

> Clients ABSOLUTELY need to do DNSSEC checking themselves, otherwise you literally gain nothing from even attempting to use DNSSEC for some part of the journey.
Nothing stops you from doing it with DoH. Just query for NSKEY and RRSIG records and do the chain walking yourself.

Actually, it makes it easier. The major impediment for DNSSEC are clueless local resolvers that simply ignore DNSSEC record requests or even actively strip them off.

DNS but no security ?

Posted Jun 7, 2018 2:25 UTC (Thu) by johnjones (guest, #5462) [Link]

agreed mozilla should simply give the option to verify the DNS responses given over HTTPS i.e. DNSSEC

there are patch's already for DNSSEC over TLS into the NSS

https://hg.mozilla.org/users/dkeeler_mozilla.com/dnssec-t...

anyone want to rework it and get it into the experimental ?


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds