DNS over HTTPS in Firefox
DoH support has been added to Firefox 62 to improve the way Firefox interacts with DNS. DoH uses encrypted networking to obtain DNS information from a server that is configured within Firefox. This means that DNS requests sent to the DoH cloud server are encrypted while old style DNS requests are not protected." The configured server is hosted by Cloudflare, which has posted this privacy agreement about the service.
Posted Jun 1, 2018 16:35 UTC (Fri)
by dc123 (guest, #117760)
[Link]
Posted Jun 1, 2018 16:36 UTC (Fri)
by fest3er (guest, #60379)
[Link] (9 responses)
I suspect that 1.1.1.1--and probably all of 1.1.1/24 and 1.0.0/24--should now be included in the list of 'never route' addresses, because what's on my private LAN is no one else's business.
Posted Jun 1, 2018 16:50 UTC (Fri)
by Sesse (subscriber, #53779)
[Link]
Posted Jun 1, 2018 18:35 UTC (Fri)
by flussence (guest, #85566)
[Link] (6 responses)
It sounds like someone else on your LAN already decided to hijack 1.1.1.1 for use in a non-routable (and standards-breaking) way. You can null route it, but you may find yourself locked out from trashy Cisco hardware and the like.
Posted Jun 1, 2018 22:03 UTC (Fri)
by ajs124 (guest, #110052)
[Link] (2 responses)
First it MITMs your DNS, but only on UDP, apparently TCP was too much effort. Then it breaks DNSSEC.
And if there's not connection to the outside world, it just starts to return 1.1.1.1, because that's totally not a private IP space anyone is ever going to use. Oh wait.
They also don't deploy IPv6, because when is that ever going to catch on?
Posted Jun 5, 2018 13:42 UTC (Tue)
by darwish (guest, #102479)
[Link]
I have a "Vodafone Kabel Deutschland" Internet connection at home, and there is IPv6, completely out of the box, _and enabled by default_.
Opening Google and asking "what is my IP" always shows my IPv6 address.
Posted Jun 17, 2018 16:52 UTC (Sun)
by nilsmeyer (guest, #122604)
[Link]
Posted Jun 4, 2018 16:28 UTC (Mon)
by jmanig (guest, #120108)
[Link] (2 responses)
Actually, 1.1.1.1 seems to be Cloudflare's new DNS over HTTPS server, or at least if the https://1.1.1.1 website is to be believed. I'll admit I just looked quickly and did not dig into whether this is legit or not.
Posted Jun 4, 2018 17:40 UTC (Mon)
by tialaramex (subscriber, #21167)
[Link] (1 responses)
Now, is it technically possible that a Cloudflare DNS server is on your LAN? Sure (maybe "your LAN" is in a datacentre or you work for Cloudflare). Is it likely? Nope, lots of idiots hijack 1.1.1.1 because they figure they'll pick a real value later, or they assume it's unused because it wasn't used back when they wrote their software, or just because they're very lazy and unimaginative.
And yes, it's legitimate. The 1.1.1.0/24 network (and several others in that neighbourhood) are so poisoned as to be useless for most purposes because of the hijacking I mentioned. However this particular address is memorable and thus valuable to Cloudflare. They struck a deal with, IIRC APNIC (the RIR for the Asia Pacific region) who were unable to issue this address to an LIR because it's poisoned, Cloudflare's DoS-resistant network resources would be used to monitor the subnet for APNIC and in exchange APNIC would let them advertise anycast routing into this /24 (effectively just for 1.1.1.1 itself) to run DNS services around the world.
Posted Jun 4, 2018 19:37 UTC (Mon)
by jmanig (guest, #120108)
[Link]
Posted Jun 6, 2018 15:00 UTC (Wed)
by buchanmilne (guest, #42315)
[Link]
Use tcpdump -nn, to avoid being fooled by the change in reverse DNS for 1.1.1.1.
Or, set your DNS servers up to be claim authority for 1.1.1.in-addr.arpa if you are going to steal someone else's public address space on your private LAN ...
> I suspect that 1.1.1.1--and probably all of 1.1.1/24 and 1.0.0/24--should now be included in the list of 'never route' addresses, because what's on my private LAN is no one else's business.
Your private LAN has no business being on 1.1.1/24, or any subnet of 1/8.
Posted Jun 2, 2018 0:15 UTC (Sat)
by kfox1111 (subscriber, #51633)
[Link]
Posted Jun 2, 2018 3:06 UTC (Sat)
by gdt (subscriber, #6284)
[Link] (13 responses)
The referenced A cartoon intro to DNS over HTTPS says: The resolver will also often include the first 24 bits of your IP address in the request. This helps the DNS server know where you are and pick a CDN closer to you. But this information can be used by DNS servers to link different requests together. Instead of doing this, Cloudflare will make the request from one of their own IP addresses near the user. Am I reading the implication correctly? ISPs which host CDNs will also need to host Cloudflare servers in order for the that ISP's other hosted CDN servers to be effective?
Posted Jun 2, 2018 10:55 UTC (Sat)
by roc (subscriber, #30627)
[Link] (4 responses)
E.g. if your country has two ISPs, ISP X hosts a CDN, and ISP Y hosts a Cloudflare server, the DNS request will appear to come from an IP address under ISP Y, and hopefully the CDN resolver will resolve it to ISP X's CDN.
Posted Jun 3, 2018 17:31 UTC (Sun)
by gdt (subscriber, #6284)
[Link] (3 responses)
The more likely situation is that both ISP X and ISP Y have CDN hosts. If ISP Y hosts a Cloudflare server and ISP X does not, then ISP X pulls from ISP Y's CDN, for all DNS-directed CDN services. The long-run likelihood is that the X-Y path has a charge [1]. Thus Mozilla's choice means that ISP X faces a strong financial motivation to install a Cloudflare CDN server. My view is that free software should promote open network infrastructure rather than promote a proprietary partner.
The other consideration is that ISP X is likely to be a small ISP and ISP Y is likely to be a large ISP (ISP Y is wealthy enough to host a Cloudflare CDN host, which is pretty far down the list of desirable CDN hosts). That is, Mozilla's acceptance of removing the EDNS Client Subnet Option proposed by Cloudflare adds to the market power of larger ISPs. It would be better if Mozilla had retained the EDNS Client Subnet Option, perhaps asking Cloudflare to enhance privacy by rounding the source IP address up to (a large fraction of?) the BGP-visible network rather than to the proposed /24. --
Posted Jun 3, 2018 20:45 UTC (Sun)
by tialaramex (subscriber, #21167)
[Link] (2 responses)
As it stands the only thing I can divine from a DNS request via Cloudflare's Mozilla DoH offering is that it... came from some particular Cloudflare node. Probably that node is near the originator, although maybe not. There's no way around revealing this unless you're happy sacrificing performance (e.g. TOR will incur a few hundred milliseconds latency, in exchange for which nobody knows where you are in the world)
But if the EDNS "Client Subnet" is back, I get to see part of an IP address which may be more or less incriminating. Among the addresses handled by my ISP are "dynamic" assignments, where even seeing the whole address without access to their logs doesn't tell you much, right through to genuinely portable address space owned by customers, where even seeing /20 potentially gives away the game about who the end user is. I'm in the middle, with a static (but not portable) /28 of my own. So when you snip off the last 8 bits, you narrow things down to maybe a dozen customers like me with "Client Subnet" as it stands today, and maybe you could make that hundreds, but you can't make it thousands without also destroying the utility of the technique, and you'd still identify those with portable space.
Posted Jun 4, 2018 2:19 UTC (Mon)
by gdt (subscriber, #6284)
[Link] (1 responses)
on the other hand you smash some of the routing data That's only the case if the BGP feed to the ISP's CDN providers differs from the BGP offered to globally-visible neighbors. In which case the solution is to provide CloudFlare with the same BGP feed as provided to the ISP's other CDNs providers.
Posted Jun 6, 2018 15:18 UTC (Wed)
by buchanmilne (guest, #42315)
[Link]
Which requires you to deploy CloudFlare everywhere you have any CDN.
Not going to happen.
In a real ISP I used to be involved with:
It was not technically challenging to adjust the route filters appropriately to advertise the client subnets correctly to allow for this, and customers using the ISPs DNS would transparently get the best experience with the least exposure of their DNS requests. It would be technically challenging to get this setup to work with or without Cloudflare in the ISPs DCs.
There is no real privacy improvement available here, because Mozilla's picture doesn't quite hold true. Due to the peering configuration, most DNS requrests to the large CDNs would not traverse the public internet, but would be routed across private peering connections (between the ISP and a root DNS operator, then between the ISP and it's CDN partner).
With DNS over HTTPS, now these requests may traverse the open internet, and be exposed to a 3rd-party (Cloudflare).
IMHO, for some use cases (e.g. public WiFi), this may be an improvement, but for either fixed-line or mobile-operator (e.g. 3G/LTE) internet access, this is a regression in terms of privacy (at least in my country).
In short, this move does make me wonder if Cloudflare recently made some large donation to Mozilla ... which makes me suspicious of both parties.
Posted Jun 2, 2018 11:24 UTC (Sat)
by excors (subscriber, #95769)
[Link] (7 responses)
With DoH, Mozilla/Cloudflare don't want to reveal even 24 bits of the user's IP, for privacy reasons; but they still want to allow CDN nameservers to do their location-based stuff. I presume they also want to work with CDNs that don't implement RFC 7871. To achieve that, they simply make the DNS request from a Cloudflare server that's close to the user. The CDN will return an IP that's close to the Cloudflare server (like it would for any normal request), which will therefore be close to the user.
The system's effectiveness depends on Cloudflare having servers relatively near every user, so their server's location is a good approximation of the user's location. Cloudflare is pretty big so they probably do already; and if they don't, the approximation will just get incrementally worse. There's no need for Cloudflare to have servers near other CDNs.
None of this should affect CDNs using anycast routing (like Cloudflare itself), where they have servers around the world sharing a single IP address and the routing protocol will direct every user to their nearest server, but it appears some major CDNs do still use DNS for this. I guess there is a bit of a conflict of interest for Cloudflare there, but if Cloudflare starts behaving anti-competitively and worsening the performance of other CDNs then Mozilla (whose priority is their user experience) can switch to a different provider or disable DoH, so it's probably not worth it for Cloudflare to mess around.
Posted Jun 2, 2018 11:53 UTC (Sat)
by Sesse (subscriber, #53779)
[Link] (6 responses)
Posted Jun 3, 2018 11:33 UTC (Sun)
by tialaramex (subscriber, #21167)
[Link] (5 responses)
I suppose other options might include:
1. Recruit one or more other DoH providers willing to offer privacy, pick a random one (at start-up, for each query, or whatever)
2. Switch off privacy, preferring to give better CDN and sacrifice the user's privacy (or maybe do so outside the porn-viewing mode)
3. Incorporate this functionality but leave it unused by default (so 99% + of users never benefit)
When it comes to item (1) I think you've got the same situation as the Search box. Users _can_ pick GoodSearch, or whatever, but by default they get the search engine Mozilla picked. The DoH configuration absolutely can be changed by anybody who knows what DNS even is in the first place. Should the Mozilla corporation sell that default (assuming multiple bidders offer equivalent privacy) for $1M? It is, after all, just a default. How about for $10Bn? That's a LOT of evangelism and software development for the price of a default...
Posted Jun 6, 2018 14:37 UTC (Wed)
by buchanmilne (guest, #42315)
[Link] (4 responses)
Well, the question is, privacy from whom.
There is still no privacy from Cloudflare in this case.
How is this any better than using my ISPs DNS? The contents of my DNS requests are still (theoretically) visible by one entity (the same entity that may also be able to determine by other means the content I am viewing with varying levels of accuracy).
O, right, the US is broken and has insufficient competition in the ISP market, where in most other countries this is a solved problem (capitalistic free market!).
Thanks, but I will definitely not be enabling this feature, and will drop firefox if they make this a default.
In my country, ISPs are well regulated, we have adequate privacy laws, and my ISP:
For example, many ISPs have many different CDN deployments with different geographic deployments. The ISP I worked for a while ago had CDN deploymens for 4 different CDNs in 3 different data-centres. The biggest (by data volume) was deployed in 3, the next 2 were deployed in 2 DCs, the 4th in 1. And this ignores the off-network open-peering CDNs that are co-located with the CloudFlare POPs in our country.
To me it looks suspiciously like Firefox is being paid by Cloudflare to make them more attractive than other CDNs/DDoS prevention companies.
Posted Jun 6, 2018 15:54 UTC (Wed)
by excors (subscriber, #95769)
[Link] (3 responses)
I think the difference is that, by choosing to use Firefox, you have already chosen to trust Mozilla to respect your privacy rights, which implies trusting their agreements with any third parties they choose to share your data with. (You can evaluate that trust based on their privacy policy, and the privacy policy they got Cloudflare to agree to, and their past record in following such policies, and comments from developers about their intentions, etc, and decide whether that trust is justified or not.)
Meanwhile you might or might not trust your ISP - that's an independent decision. (Some ISPs have a history suggesting they shouldn't be trusted as anything more than a dumb pipe, sometimes from malice and sometimes incompetence). If you trust both Mozilla and your ISP, then DoH provides no privacy benefit (well, except from anyone passively monitoring your network traffic, which is a significant benefit) but also no privacy harm. If you trust Mozilla but not your ISP, then it does provide an obvious benefit. If you don't trust Mozilla, you shouldn't be using Firefox anyway because there's a million other ways they could harm you.
Posted Jun 6, 2018 17:10 UTC (Wed)
by jwilk (subscriber, #63328)
[Link] (2 responses)
Trust is not binary.
I trust Mozilla not to put backdoor in Firefox. I don't trust them at all to care about my privacy. In fact, I'm pretty sure they don't. (Hilariously, when you run Firefox for the first time, it phones home in order to show you the privacy policy.)
Similarly, I trust my ISP not to inject malicious code into my Internet traffic. I don't trust them that they don't snoop on me. I would be surprised if they didn't.
Posted Jun 20, 2018 18:20 UTC (Wed)
by mstone_ (subscriber, #66309)
[Link]
Posted Jun 26, 2018 20:10 UTC (Tue)
by flussence (guest, #85566)
[Link]
Posted Jun 2, 2018 3:48 UTC (Sat)
by magfr (subscriber, #16052)
[Link] (4 responses)
Posted Jun 2, 2018 9:39 UTC (Sat)
by tialaramex (subscriber, #21167)
[Link] (2 responses)
So much as this breaks already for anybody who picks 8.8.8.8 as their resolver, it will also break if they pick DoH with 1.1.1.1
Posted Jun 3, 2018 9:06 UTC (Sun)
by magfr (subscriber, #16052)
[Link] (1 responses)
Posted Jun 4, 2018 17:32 UTC (Mon)
by tialaramex (subscriber, #21167)
[Link]
In soft fail, after it gets a negative response over DoH, Firefox tries your default OS resolver. This means /etc/hosts entries, "split brain" private DNS entries and so on will work after that happens.
I can see there'd be split brain scenarios where this doesn't do what you want (e.g. the public Internet sees one server, which requires a separate multi-step authentication, but the private Intranet offers a different IP address for the same name, and on that server it uses, say, Windows authentication or a company SSO solution). But I suspect those are comparatively rare.
Posted Jun 8, 2018 16:32 UTC (Fri)
by mcmanus (guest, #4569)
[Link]
Posted Jun 2, 2018 15:43 UTC (Sat)
by phython (subscriber, #3278)
[Link]
Posted Jun 2, 2018 17:03 UTC (Sat)
by fratti (guest, #105722)
[Link] (42 responses)
Posted Jun 2, 2018 17:10 UTC (Sat)
by oldtomas (guest, #72579)
[Link] (1 responses)
Nowadays I tend to be speechless.
I for one hope that there's a way to disable it, and that it doesn't go the way of the "disable Javascript" checkbox.
After all, I definitely don't want "my" browser to bypass the operating system's resolver.
Posted Jun 6, 2018 16:48 UTC (Wed)
by jezuch (subscriber, #52988)
[Link]
Posted Jun 3, 2018 3:40 UTC (Sun)
by roc (subscriber, #30627)
[Link] (39 responses)
Posted Jun 3, 2018 7:57 UTC (Sun)
by oldtomas (guest, #72579)
[Link] (16 responses)
Nobody would argue that faster is better, and that it does make sense to understand what "most users" (whatever that is) need, but used exclusively, those metrics lead us to paint ourselves into a corner too early.
The most fatal one is "almost all users", which leads to a fatal co-optimization feedback loop which makes applications more and more patronizing ("you don't *need* that feature: telemetry has proven that") and users dumber and dumber.
I'm not surprised that bigcorps push hard in that direction: it's part of their business model, after all.
But seeing Mozilla doing this is really painful: after all, they're the Good Folks (yes, no irony here, I mean it!).
Posted Jun 3, 2018 11:59 UTC (Sun)
by tialaramex (subscriber, #21167)
[Link] (3 responses)
I'm sure at least one person in the world finds "Bing" to be absolutely the best search engine, and is annoyed every time something defaults to Google. But if it's a just _default_ that's better than making all the millions of people who prefer Google reach in and change that setting.
This is also a security consideration, and Mozilla absolutely does make decisions about security on behalf of its users with only "Build your own browser instead from our source" left as an option for those who disagree. For example the upcoming distrust of CA roots controlled by Symantec (Verisign, Thawte, etcetera) won't be something you opt into, or even a default, it'll just happen automatically when you upgrade Firefox. Again I have no doubt that at least one person in the world would prefer to continue trusting these roots, and that person might not even work at Symantec, but Mozilla chose on behalf of its entire user population to distrust these CA roots.
Posted Jun 3, 2018 21:52 UTC (Sun)
by ballombe (subscriber, #9523)
[Link] (1 responses)
Posted Jun 4, 2018 0:57 UTC (Mon)
by tialaramex (subscriber, #21167)
[Link]
I don't know how far Symantec got into that plan exactly, but somewhere between asking DigiCert "Can you help us?" and actually executing the plan changed into DigiCert acquiring the CA roots, branding, goodwill etcetera from the Symantec business. There was plenty of scepticism on m.d.s.policy but DigiCert seem to have been very diligent about this, I hope it's paying off for them profit-wise in proportion to the effort they must have spent.
One of the things that eased minds at m.d.s.policy is that DigiCert seems to understand the old roots had to go, and there was no foot-dragging, "mistakes" where old certificates have to be grandfathered in and so on as we'd come to expect from Symantec.
The end result will be that cryptographically nothing inherited (at presumably considerable expense) from Thawte, Versign, etcetera is left standing, that's all gone. In terms of infrastructure it's all DigiCert, in terms of staff, leadership is DigiCert there may be particular personnel even on the crypto side who are Symantec, but leadership is where it all went wrong previously so that's not a great worry. For customers, I suspect much of the branding and maybe sales teams are kept from Symantec, if you have a customer paying $5000 for Verisign, well, that customer probably doesn't care about some rotten ten year old 2048-bit RSA root from the actual Verisign, they just remember the brand name, and DigiCert have bought that.
From a trust perspective what we (m.d.s.policy, anybody paying attention) didn't trust was Symantec executive level management and thus the roots which had been under the oversight of that management. Negligence, incompetence, malice, I don't know and I don't care, personally as a lay person my suspicion is incompetence, I think the Symantec board hasn't the first idea what they're doing, and it was just more obvious to us, and we were better able to take action, than say, a pension fund or other shareholder.
Posted Jun 6, 2018 15:25 UTC (Wed)
by buchanmilne (guest, #42315)
[Link]
There is another browser that often re-sets such defaults, e.g. from Google to Bing.
I refuse to use that browser (for anything other than downloading a better browser).
There is also an OS that keeps trying to change your default browser to use that browser.
I refuse to use that OS.
I hope I don't need to add Firefox to the list ...
Posted Jun 3, 2018 12:01 UTC (Sun)
by brokentux (guest, #124718)
[Link]
Faster at what cost ?
As long it is easy, practical and doesn't require to the single intellectual effort the user will go for it. Bigcorp just see their own interest with the blessing of their own customers/client...
I agree with what you previously said : "I definitely don't want my browser to bypass the operating system's resolver.", it can be faster, but I will not swallow the "big privacy win".
Posted Jun 3, 2018 22:10 UTC (Sun)
by roc (subscriber, #30627)
[Link] (10 responses)
Posted Jun 4, 2018 10:55 UTC (Mon)
by oldtomas (guest, #72579)
[Link] (8 responses)
How did this "disable Javascript" go? Just because of Mozilla's stubborn "vision" of the Web as a fuzzball distributed application, we better take this option away because the user is too stupid to decide for herself ("telemetry has shown that..."). This in turn enourages web "programmers" out there (well, it's more the "frameworks", but you get the idea) to just ignore non-javascript "consumers", closing the feedback loop.
What this achieves is a slow and progressive breaking of the contract, that a web page is a "document", thus reducing user autonomy.
Sorry, but that makes me furious. Especially when it comes from allies.
Posted Jun 4, 2018 11:54 UTC (Mon)
by roc (subscriber, #30627)
[Link] (7 responses)
There never was any "contract" that a Web page is a static "document", and if there had been, it was lost when JS was enabled by default in Netscape 2 in 1995. If, somehow, that decision had never been made, the Web would have been replaced by something that did support code execution by default (e.g. Flash), and we'd all be worse off because some company, probably Microsoft, would own the Web much more thoroughly than any one company does today.
I'm sad it still makes you furious after 23 years.
Posted Jun 4, 2018 11:56 UTC (Mon)
by roc (subscriber, #30627)
[Link]
Posted Jun 4, 2018 13:05 UTC (Mon)
by excors (subscriber, #95769)
[Link] (3 responses)
Posted Jun 4, 2018 13:20 UTC (Mon)
by roc (subscriber, #30627)
[Link]
You were probably being sarcastic but if Microsoft had crushed the Web with their own platform through MSN or later WPF/Avalon, our situation today would be very different and probably a lot worse. Mozilla saved the day, with generous help from Bill Gates's blunders.
Posted Jun 4, 2018 18:39 UTC (Mon)
by tialaramex (subscriber, #21167)
[Link] (1 responses)
By 1996 MSN had become a web-based interactive media site although "MSN Classic", the above walled garden, survived until 1998, increasingly shrivelled and unmaintained and "MSN Dial-up", the service you paid for that was no longer the walled garden, survives to this day if you still want dial-up Internet access for some reason. By the turn of the century "MSN" meant a web site Microsoft owned, msn.com, that was a "web portal" when that was a thing, which if you're over sixty maybe it still is.
It's amazing to me that in 1995 there was (some) executive cover for MSN at Microsoft. Not just because Netscape Navigator 1.0 is from 1994, but because the Internet itself is clearly unstoppable by that point. In 1989 the Internet is dominant but perhaps not unstoppable, in the US a lot of systems are using IP, but JaNET is still an X.25 network, and many countries have little or no multi-institutional networking above bulletin-board type systems. By 1992 that's all over, "experimental" Internet service for JaNET dwarfs the "official" X.25 network it was created to run, countries with little English penetration are maintaining non-IP systems they've already built, but there is absolutely no demand for any new non-IP systems. There is a thriving cottage industry of filing the serial numbers off the Berkeley TCP/IP implementation and pasting it into other software to interoperate.
There seems to have been some conceit at Microsoft that MSN could co-exist with the Internet, rather than one or the other being extinguished. That never made any sense at all. The only reason to have MSN at all was if you were sure you could extinguish the Internet and sell MSN instead, and that didn't pass the laugh test by 1995.
Posted Jun 5, 2018 8:53 UTC (Tue)
by anselm (subscriber, #2796)
[Link]
The story goes that, in Bill Gates's book, The Road Ahead, everywhere the first printing said “Microsoft Network”, the second printing said “the Internet”.
Posted Jun 4, 2018 14:49 UTC (Mon)
by oldtomas (guest, #72579)
[Link] (1 responses)
You *know* that this is a very lopsided view of things. The Web is still degrading now, and the most important part of the slope started about five to seven years ago. Before, there always was a talk of "graceful degradation", but taking away the controls from users is just doing the rest. So yes, there were remnants of that contract there.
A strong indicator is web sites explaining to users how to enable Javascript (and trying to talk them into "just enable Javascript now, dammit"): those have been disappearing as those users become less and less.
Leaving that little checkbox there might have changed things a bit. One little piece of user empowerment less, alas.
(And yes, I acknowledge Mozilla's efforts with NoScript, but this is just a poor substitute).
I know you don't like to hear it, because Mozilla's vision is "the browser as application platform", but that's what I observe. So I'm furious and you're sad.
Posted Jun 4, 2018 15:47 UTC (Mon)
by Wol (subscriber, #4433)
[Link]
> You *know* that this is a very lopsided view of things. The Web is still degrading now, and the most important part of the slope started about five to seven years ago. Before, there always was a talk of "graceful degradation", but taking away the controls from users is just doing the rest. So yes, there were remnants of that contract there.
The broken contract I really miss is that it is down to the *receiver* *device* to control the formatting, such that what appears on the screen and what appears on the printer and what appears on whatever other device the user may have ... I'm just totally fed up with a "simple" web page in the browser turning into 30 or 40 pages on the printer, many with just one giant letter on them, and the information that I really wanted that was clearly visible on screen doesn't even print!!!
Cheers,
Posted Jun 15, 2018 1:56 UTC (Fri)
by flussence (guest, #85566)
[Link]
Posted Jun 3, 2018 18:42 UTC (Sun)
by niner (subscriber, #26151)
[Link] (7 responses)
Posted Jun 3, 2018 19:08 UTC (Sun)
by paulj (subscriber, #341)
[Link] (1 responses)
Posted Jun 3, 2018 23:35 UTC (Sun)
by knan (subscriber, #3940)
[Link]
It's complete madness. :)
Posted Jun 3, 2018 21:54 UTC (Sun)
by roc (subscriber, #30627)
[Link] (4 responses)
99% of users don't, so this is a privacy win for them.
If you take the position that Mozilla should never make DoH the default in Firefox for "reasons", then you're saying that those reasons are more important than giving those users that privacy win.
Posted Jun 3, 2018 23:43 UTC (Sun)
by knan (subscriber, #3940)
[Link] (1 responses)
In Europe, this will be illegal to do by default.
In the US, this might almost be a reasonable thing if you could trust a company, but the US is broken and most big companies are not to be trusted. And the US is not 99% of users.
Posted Jun 4, 2018 10:15 UTC (Mon)
by roc (subscriber, #30627)
[Link]
I do not think either of these will be true, but we'll have to see.
> In the US, this might almost be a reasonable thing if you could trust a company, but the US is broken and most big companies are not to be trusted.
In the US, Cloudflare and Mozilla are a lot better then the telcos.
Posted Jun 4, 2018 9:42 UTC (Mon)
by niner (subscriber, #26151)
[Link] (1 responses)
That's pretty much the opposite of Cloudflare which is based in a country that right about now is even less trustworthy than China. Because China at least so far keeps its agreements and they are kind of predictable.
So in short: no, I have agreements with neither Cloudflare, nor the local companies that get my DNS data. But I don't need one because here we have laws for protecting our data. And that's true for a rather large part of your user base. So I very much doubt the 99 % claim.
Posted Aug 13, 2018 13:51 UTC (Mon)
by JanC_ (guest, #34940)
[Link]
Posted Jun 4, 2018 10:43 UTC (Mon)
by fratti (guest, #105722)
[Link] (13 responses)
Do you have any data on that performance claim? Because I heavily doubt it.
In almost all default router configs I've seen so far, one of two things happens:
While Cloudflare's peerings are quite good, they do not beat an ISP local route. They also do not beat LAN. They also do not beat the Windows local OS-wide DNS cache. That's one huge flaw in your argument already.
Secondly, DNS can (and does) use UDP. UDP is a datagram protocol. It is connectionless: there is no handshake. A client makes a request, a server responds, two packets in total if both of them are below the common internet MTU of 1500. Furthermore, the kernel knows when to send those packets, because it precisely knows when a message starts and when it ends: precisely when a packet starts and it ends.
Now compare this to HTTP on TLS on TCP:
"but ooh, OOOH!" you shout, "we can just keep the connection open! Yes! Handshake only once!"
Now that I've cast some serious doubt as to the performance claim, let's cast some serious doubt as to the "not centralised" claim.
DNS, in its current form, is by default centralised. Your average consumer laptop will get DNS from DHCP. Your average consumer router will get DNS from DHCP.
DoH is centralised by default. Cloudflare cackles as they get all the data because Mozilla buried the option to change the DoH "service" somewhere in about:config, and any alternative DoH service wouldn't have as good peerings as Cloudflare does.
And another question: where did you get the "for almost all users" statistic from? Did those users agree to participate in your data collection? How big was that sample size? Could you please tell me about the way your measuring setup was constructed?
Posted Jun 4, 2018 10:47 UTC (Mon)
by fratti (guest, #105722)
[Link]
Posted Jun 4, 2018 11:47 UTC (Mon)
by tialaramex (subscriber, #21167)
[Link]
So the answer is they're collecting that data. I'm sure if the data they get says "This is slower and often doesn't work" they will accept that and re-evaluate their approach.
It's important to actually collect data, that's how we got Natural Philosophy (and so Science) as a huge upgrade over previous approaches to philosophy that proceed as you've demonstrated by arguing from premises that seem to support the philosopher's position. Among the things philosophers felt comfortable they'd figured out by your method are that the Earth is fixed at the centre of the universe, flies are spontaneously generated by the decay of living matter, and all numbers are rational.
Chrome too has programmes collecting data (although it seems Google is more comfortable just "volunteering" its own users without their knowledge), it has found all sorts of interesting things through such experiments, and since it often shares the results that lets everybody avoid getting blind-sided. For example the reason TLS 1.3 on the wire looks so silly today is that the earlier drafts (before Draft 23) were randomly enabled for Google Chrome users, and Google's metrics showed that a frighteningly high proportion failed -- even though your approach (write down axioms, scratch your beard, come to a conclusion) said that these drafts were definitely back-compatible with TLS 1.2, reality insisted otherwise. So from there experimentation found a way to sneak past most of the garbage middleboxes that weren't compatible and the draft with those changes (plus other language that doesn't change anything on the wire) is what we have today.
[ For TLS 1.2 nobody did that before publication, they relied on your approach. The standard sat on paper for _years_ largely unused, because if you tried to enable it for ordinary users a huge proportion of them got a non-working browser, and so they'd just switch to a competitor who wasn't trying to do TLS 1.2. ]
Posted Jun 4, 2018 12:26 UTC (Mon)
by excors (subscriber, #95769)
[Link] (1 responses)
The latency of a single DNS request isn't hugely important in a web browser - the problem is when you need to sequentially make one request for the HTML page, then another to a different domain for the JS, then to a third domain for some JSON data, then to a fourth for an image, etc. Doing the handshake per request would be silly, but you can fix that by just keeping the DoH connection alive for a few seconds - you don't need an endless flood of keep-alive packets. If it times out and you need to restart the connection when the user clicks a link an hour later, that's fine.
https://bitsup.blogspot.com/2018/05/the-benefits-of-https... notes that DoH will be able to easily transition from HTTP/2-over-TCP to HTTP/2-over-QUIC-over-UDP, for more efficient transport and better handling of packet loss (which I assume is really bad in DNS-over-UDP), and there's the possibility of providing a speculative response before the request has even been sent (if they can work out how to preserve security/privacy/etc). Since browsers and CDNs obviously want to improve HTTP performance anyway, so the protocols and implementations will already exist, and DoH only requires coordination between a single browser and a single DNS provider (not every single ISP in the world) to provide the full benefit to the browser's users, it seems a reasonably straightforward approach.
Posted Jun 6, 2018 15:40 UTC (Wed)
by buchanmilne (guest, #42315)
[Link]
This is hardly surprising; however for a long time the p0 for ICMP echo request to Cloudflare in my country was 170ms where the p50 for DNS requests to my ISPs caching DNS was < 20ms.
And most users are unlikely to worry about a p75 DNS resolution time of 181ms, if the quality of the p50 answers is 10x better (uses a CDN 5ms away rather than 50ms away, or 20ms away rather than 200ms away).
Posted Jun 4, 2018 13:34 UTC (Mon)
by roc (subscriber, #30627)
[Link] (1 responses)
https://bitsup.blogspot.com/2018/05/the-benefits-of-https...
Having said that: you're right. I overstated the case to say it's "actually faster for almost all users". Sorry. It probably is for many users, but we don't have that data yet, and improvements like QUIC and push are probably needed to make it really fast.
> Cloudflare cackles as they get all the data because Mozilla buried the option to change the DoH "service" somewhere in about:config, and any alternative DoH service wouldn't have as good peerings as Cloudflare does.
Google probably does, and they're running a public DoH service: https://github.com/curl/curl/wiki/DNS-over-HTTPS#publicly...
Posted Jun 4, 2018 19:06 UTC (Mon)
by fratti (guest, #105722)
[Link]
Posted Jun 4, 2018 17:37 UTC (Mon)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Simply keeping a pool of open TLS connections is probably going to be a speed win.
Posted Jun 5, 2018 14:11 UTC (Tue)
by nilsmeyer (guest, #122604)
[Link]
Posted Jun 8, 2018 20:27 UTC (Fri)
by mcmanus (guest, #4569)
[Link] (3 responses)
In the soft fail (expected) mode, the resolver never waits for the DoH connection to be ready - if the http2 session isn't up, then it uses the os resolver. Hard fail mode will block if that's what you want but that won't be the default config. Honestly, the connection is pretty much there unless you haven't been browsing at all lately - the browser looks up a surprising number of names. (nothing about this project changes that)
the cache is interesting. Firefox has a cache of its own - meant to cover the lack of an OS cache. The cloud cache might be farther away than an ISP cache (but sometimes not), but its probably actually better populated than most ISPs but not all. It will be interesting.
Lots of ISPs just forward silently to quad 8 anyhow as they sit in the middle. (note they don't assign the end user e2e quad 8 - wonder why that is.) Especially in asia.
and tcp absolutely can outperform 1 packet per message in udp some of the time because DNS senders have absolutely terrible strategies for loss recovery and congestion control and tcp has been working on those problems for a long time. Indeed I've seen DNS stacks that actually induce their own losses (and then crudely repair them with 1second timers) through too much parallelism.. so there are some definite non obvious tradeoffs here.
Posted Jun 8, 2018 23:09 UTC (Fri)
by fratti (guest, #105722)
[Link] (2 responses)
a lot of these arguments appear to try pushing DoH claiming the inferiority of real-world deployments of UDP DNS protocols, not actual inferiority of the protocol itself. I don't think this is fair, of course if you say "Yes, we at Cloudflare and Mozilla are going to deploy this better," it'll be a better deployment in the real world. That, however, does not make DoH a good idea, because you didn't fix the existing stacks, you made an overengineered new stack that is not more performant on the protocol level, but just on the implementation level. If you're going to take over both the protocol and the implementation, why not do it properly in both areas? Why not DTLS? Why HTTP?
Posted Jun 8, 2018 23:57 UTC (Fri)
by excors (subscriber, #95769)
[Link]
https://bitsup.blogspot.com/2018/05/the-benefits-of-https... seems to answer that.
Posted Jun 9, 2018 4:57 UTC (Sat)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Well, it failed miserably. With DNSSEC you are routinely looking at replies that are greater than 1500 bytes long. IPv4 fragmentation usually saves the day (though it's slowly getting more and more broken) but with IPv6 it's a complete non-starter.
There are two ways to fix it:
2) Just forget about all this stateless nonsense and go full-metal-stateful. This way you can utilize all the advances made by browsers, in particular QUIC and TLS 1.3. They allow zero-RTT connection initiation, at the cost of stored data.
Posted Jun 20, 2018 18:37 UTC (Wed)
by mstone_ (subscriber, #66309)
[Link]
My ISP is one of the largest in the US, and the latency to the nameservers they put in the DHCP replies is worse than the latency to 8.8.8.8... They also hijack NXDOMAIN, and they don't play particularly nicely with DNSSEC (would probably break the revenue stream from NXDOMAIN hijacking.)
Posted Jun 3, 2018 5:47 UTC (Sun)
by johnjones (guest, #5462)
[Link] (8 responses)
if that includes DNSSec can we please use that in our own resolvers rather than just Cloudflares ?
Posted Jun 3, 2018 7:27 UTC (Sun)
by tialaramex (subscriber, #21167)
[Link] (7 responses)
DoH is a transport for DNS that prevents people on the IP route between you and the resolver seeing your queries
These are entirely orthogonal.
In a new enough Firefox (no release Firefox is new enough, this article is about an experiment available to pre-release users) you can set any DoH resolver you like, Cloudflare's public resolver is being used for the test to understand whether this will work for many or few users in practice, and how much slower it is for them.
Posted Jun 3, 2018 14:45 UTC (Sun)
by johnjones (guest, #5462)
[Link] (6 responses)
seems a little pointless without DNSSEC but that would require mozilla do some actual engineering....
Posted Jun 3, 2018 15:53 UTC (Sun)
by excors (subscriber, #95769)
[Link] (5 responses)
Posted Jun 4, 2018 11:17 UTC (Mon)
by ledow (guest, #11753)
[Link] (4 responses)
Yes, you can communicate to CloudFlare, and yes Cloudflare "say" that they are checking DNSSEC but there's no guarantee at all. Are they going to take responsibility for frauds if someone hijacks the entry for hsbc.com and their DNSSEC resolver just says it's fine? Or if, as stated, they have some DNSSEC error in their records?
DNSSEC needs to be end-to-end, or it's worthless. It's built precisely for the purpose of preventing man-in-the-middle altering of DNS records. Sure, it's not "private", but it's "verified".
Your connection to this would be "private" but you have to trust the endpoint to never tamper? When they could have brought DNSSEC data down with the records so you didn't have to rely on them just saying "Look, trust me, that's really microsoft.com's address"?
It's a valid question, and a massive oversight if they've not done that.
Clients ABSOLUTELY need to do DNSSEC checking themselves, otherwise you literally gain nothing from even attempting to use DNSSEC for some part of the journey.
Posted Jun 4, 2018 12:43 UTC (Mon)
by excors (subscriber, #95769)
[Link] (1 responses)
Posted Jun 4, 2018 15:52 UTC (Mon)
by Wol (subscriber, #4433)
[Link]
"Unfair Terms And Conditions".
If Mozilla enable it by default, and disclaim warranty, then certainly for the man on the Clapham Omnibus they could get a *VERY* nasty shock in court ...
Cheers,
Posted Jun 4, 2018 17:40 UTC (Mon)
by Cyberax (✭ supporter ✭, #52523)
[Link] (1 responses)
Actually, it makes it easier. The major impediment for DNSSEC are clueless local resolvers that simply ignore DNSSEC record requests or even actively strip them off.
Posted Jun 7, 2018 2:25 UTC (Thu)
by johnjones (guest, #5462)
[Link]
there are patch's already for DNSSEC over TLS into the NSS
https://hg.mozilla.org/users/dkeeler_mozilla.com/dnssec-t...
anyone want to rework it and get it into the experimental ?
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
[1] The argument for the X-Y path being liklely charged in the long run: (1) If X-Y is a transit path then the path is already charged. (2) If X-Y is a peering path then the huge increase in traffic from Y to X will make a large enough change to the X:Y peering ratio such that is no longer in Y's interest to peer.DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
* The country has 3 major public peering locations.
** Cloudflare has presence at 2
** Major CDNs have presence at 3
** Smaller CDNs have presence at 1 or 2
* The ISP had 3 DCs, not co-located with the peering locations
** The ISP had 1 major CDN at 3 DCs, this CDN was actually only present at the largest peering location
** The ISP had 2 major CDNs in 2 DCs that were not at any local peering locations, and didn't want to be advertised to this ISP's peers
** The ISP had 1 major CDN in 2 DCs that were present at local peering locations, and were ok being advertised to this ISP's peers, but wanted to avoid sending any of this ISPs customers to the deployment at the peering location (as it was resource constrained).
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
- Is legally obligated to not give this data to any 3rd party without a warrant
- Has a much better view of the network topology than any 3rd party
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
Have they apologised yet for their use of a pre-existing backdoor to push Comcast ads in-browser to several million users last November? The closest I've seen to them even acknowledging that they got caught is a pageful of sneering corporate spin-doctoring congratulating themselves on the “shared user experience”.
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
I expect the technically savvy users to know what they are doing and handle the fallout so I don't worry about them.
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
MSN
MSN
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
Wol
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
> In Europe, this will be illegal to do by default.
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
A) the router gives out the ISPs DNS server over DHCP
B) the router gives out itself as DNS server over DHCP, forwarding requests to the ISPs and doing caching.
1. We've got a TCP handshake
2. We've got a TLS handshake (which can be done partially in the TCP handshake, but since you built a bad idea on top of previous bad ideas, nobody knows if the real world stacks will support this)
3. We've got a HTTP request which is in a stream protocol so the kernel needs some heuristic to figure out when to actually send a packet.
Well, but then what does that mean? You're going to be pinging back and forth keep-alive packets, keeping useless state on both machines, and essentially all you're doing is sending datagrams awkwardly wrapped in plain-text over a stream protocol making the kernel's network stack sad. You cannot get faster than request->response in one packet each. You do not get faster by adding more packets. This is not how protocols work. This is not how computers work. No, adding JSON and WebGL into the mix won't lubricate it with HTML5 awesomesauce.
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
This is also relevant: https://developers.google.com/speed/public-dns/docs/perfo...
The average ISP just isn't that good at managing this kind of service.
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
DNS over HTTPS in Firefox
1) Make DNS great^W small again. ECC instead of RSA basically fixes it for _most_ cases, but not all.
DNS over HTTPS in Firefox
DNS security ?
DNS security ?
DNS but no security ?
DNS but no security ?
DNS but no security ?
DNS but no security ?
DNS but no security ?
Wol
DNS but no security ?
Nothing stops you from doing it with DoH. Just query for NSKEY and RRSIG records and do the chain walking yourself.
DNS but no security ?