-
Notifications
You must be signed in to change notification settings - Fork 575
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS over HTTPS (DoH) #3033
Comments
Thanks for another great addition! Realizing this is brandnew, I wanted to ask clarification on what's mentioned here:
The second line seems odd, as in my understanding On another note, I wonder if it makes sense to explicitly inform users on how to |
Or just set |
@rusty-snake Thanks for clearing that up.
Indeed, there are several ways to opt-out. The network.trr.mode is a Firefox internal one. I referred to a DNS option. I just wanted to stress that a small entree in the fdns FAQ to inform users on how to opt-out would be nice. |
yes it will cause alot of troubles and hope never to be implemented by default. This is privacy suckness design to route all your traffic through CDN: https://twitter.com/isotopp/status/1170973842954686464 https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/
Yeah i believe you! ... Only if im idiot.. |
Sorry @netblue30 but enabling DoH by default like that will cause problems for people:
If DoH support does get integrated into firejail, please make it completely opt-in, like |
I had the feeling that would be the case, so it will stay forever as a separate plugin. It does bypass any dns-based security that is set up on the system or on the local network. Mozilla was supposed to deploy DoH as default this autumn in the browser, but they are getting a lot of pushback from governments, ISPs and enterprise people. So they are cooling down on it. We'll see what they do next. Apparently, Google will make it opt-in in Chromium. Anyway, as a separate/opt-in project it should be fine. Probably for enterprise users I will have to put a note on the main page of the project saying something like "don't use this on your employer network". I do expect them to start monitoring traffic on their networks. @TNTBOMBOM
That's a good point. We just added --server=random where it pics a random server form the list. Currently we have 7 servers there, and the list is growing. The most interesting so far are two small privacy-oriented nonprofit foundations: https://42l.fr and https://appliedprivacy.net. Thank you all for your input! |
thank you netblue30 for keeping this optional |
I wanted to add DoH support by default for all sandboxes, but I ended up using OpenSSL. I don't want to create problems for anybody, so this goes as a separate project at least for now. We can bring it in firejail later.
https://github.com/netblue30/fdns
The proxy runs on port 127.1.1.1, so in firejail you would run:
firejail --dns=127.1.1.1 firefox
DoH functionality is already included in Firefox, and apparently some other browsers will follow (see https://www.zdnet.com/article/dns-over-https-will-eventually-roll-out-in-all-major-browsers-despite-isp-opposition/). We are more interested in things like bittorrent etc.
The text was updated successfully, but these errors were encountered: