[ / / / / / / / / / / / / / ] [ dir / animu / choroy / leftpol / mde / pinoy / vg / wboy / xivlg ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 69b1787ad6a24e1⋯.jpeg (30.38 KB, 512x512, 1:1, fR5Z1q4e.jpeg) (h) (u)

[–]

 No.1035038>>1035289 >>1035336 [Watch Thread][Show All Posts]

He wants everyone to use DNS-over-TLS (RFCs 7858, 8310) instead of DNS-over-HTTPS (RFC 8484), which he considers a "political project", so that he and others can spy more easily on network traffic:

https://twitter.com/paulvixie/status/1053765281917661184

 No.1035053>>1035062

DNS-over-HTTPS-with-SNI probably lets people spy on you just the same.

what's wrong with DNS-over-TLS?


 No.1035062>>1035070

>>1035053

>what's wrong with DNS-over-TLS?

It uses a designated port that is easily blockable. DNS-over-HTTPS uses the port 443 like HTTPS.


 No.1035070>>1035081

>>1035062

... that's it?

so for evasion purposes you can trivially change the port and use a DNS server that serves DNS-over-TLS on port 443.

if there's nothing wrong with the security of the traffic that's sent with the port, then it's fine. probably better than DNS-over-HTTPS.

it's a decade too late to think government firewalls are all about ports and that if you hide in the web traffic they can't do anything about you.


 No.1035079>>1035084

its not in your post but did he tell why he wanted tls instead


 No.1035081

>>1035070

>that if you hide in the web traffic they can't do anything about you

If it is mixed with other HTTPS traffic, then they have to snoop in on all HTTPS traffic.


 No.1035084

>>1035079

>DoH is an over the top bypass of enterprise and other private networks. But DNS is part of the control plane, and network operators must be able to monitor and filter it. Use DoT, never DoH.

and:

>That's inverted. A network operators who defends their control plane may be more worried by outside actors than by it's users. Defensive tunneling from my house or work is not in your interest or mine. Don't do it. Esp not by default. Please.

eh, but malware can get its DNS from any kind of ad-hoc process that it likes. DNS over pastebin.


 No.1035107

I simply route everything through Tor, which should be encrypting my connections anyway. Don't see any reason hacking around things when outside observes shouldn't even have an idea about what IP address you are really connecting to.


 No.1035134>>1035142 >>1035220

>someone disagrees with me on one specific issue, he must be morally corrupt

Kill yourself OP


 No.1035142

>>1035134

>he thinks it's a mere disagreement


 No.1035220>>1035230

>>1035134

this is something that would affect everyone tho. anything that makes censoring easier than its now is bad


 No.1035229>>1035238 >>1035398

>DNS-over-HTTPS (RFC 8484), which he considers a "political project",

does DNS-over-TLS require purchasing a domain name and an HTTPS certificate from the extremely kosher Certificate and Domain name jews?

wait until pozjew and chromejew block any DNS that doesn't have a kosher domain name, ie your own DNS resolver, or a resolver that doesn't go along with the jewish censorship of a particular set of domain names, or DNS servers that service non-standard tld's, like opennic


 No.1035230

>>1035220

anything new that comes out is almost 100% certainly more kosher than the previous thing it is replacing.

everything new is bad

everything old is less bad


 No.1035238>>1035344

>>1035229

DNS-over-TLS and DNS-over-HTTPS are distinct so please clarify your question.


 No.1035240>>1035259

I hate his fucking face. Is it possible to hate someone just after glancing at their photo only once? It apparently is!


 No.1035259

>>1035240

his face doesn't bother me, and he looks alright: https://en.wikipedia.org/wiki/Paul_Vixie

but he's got a twatter so ofc.

<DON'T DISPARAGE MUH FBI

https://twitter.com/paulvixie/status/1098313056197566464

<MUH RUSSIANS ATTACKING EU WHICH IS A "PEACE PROJECT"

https://twitter.com/paulvixie/status/1097767394179600384

<RUSSIAN PSYOPS GAVE US TRUMP AND BREXIT

https://twitter.com/paulvixie/status/1063914419120427009


 No.1035289>>1035290

>>1035038 (OP)

Spy agencies have probably found a security hole in https. I've suspected this since the letsencrypt movement was flooded by monetary "contributors".


 No.1035290>>1035388

>>1035289

how would pushing LE help them if that's the case? was there an alternative that LE made less compelling?


 No.1035308

DNS over HTTPS is bloated as shit compared to DNS over TLS.


 No.1035336

>>1035038 (OP)

>instead of DNS-over-HTTPS

Who has access to all the CA root certificates?


 No.1035344>>1035346

>>1035238

>so please clarify your question.

<Will any of this nu-dns require a domain name and a certificate from a (((trusted)))/backdoored security authority to function?

I thought per the standard https certificates are only issued to domain names no ip addresses.


 No.1035346>>1035353

>>1035344

that's correct. so what? DNS-over-HTTPS doesn't mean that if you want the IP of "8ch.net" that you connect to 8ch.net on port 443. How would you know 8ch.net's IP to do that?

A DNS server will still be involved.


 No.1035353>>1035354 >>1035355 >>1035358 >>1035373 >>1035398 >>1035403 >>1035409

>>1035346

no, i mean the dns resolver itself.

instead of dns:8.8.8.8 or whatever, are we now going to have

dns: kikeddns.com

but then how is it going to resolve kikeddns.com, when to resolve dns it must first know what it's dns server ip address is, it needs to know kikeddns.com is, but it's the dns server.

this question is because "dns over https" implies an "https certificate" which requires a domain name.

even if the above issue of a dns server resolving itself is ignored, it means that to shut down a non-kosher dns server it could easily be done by revoking the domain name required to run it, and therefore no https certificate would be recognized because they must be tied to a domain name, not an ip address.


 No.1035354>>1035357 >>1035398

>>1035353

there is an additional issue here of browsers hardcoding this bullshit into the browser, requiring users to use a specific set of dns servers, ones with valid https certificates, and forcing users to stop using their own local resolvers, ie tordns, or even just their router for performance reasons.

it's going to turn into yet another power grab; i like the idea of encrypted dns, but not with yet another third party right in the middle of it, the certificate issuers, and the domain registrar.


 No.1035355

>>1035353

>instead of dns:8.8.8.8 or whatever, are we now going to have

>dns: kikeddns.com

Sure if you want to leak that you're using HTTP-over-DNS. More realistically, you'd just have the IP of kikeddns.com. You connect to that IP and ask for kikeddns.com and the TLS works completely normally and you use it to resolve other hostnames.


 No.1035357

>>1035354

with the

>modern browsers are complete shit and need to be constantly updated

>if you don't constantly update then you'll get 0wned

>this is normal and healthy situation, software is hard :^)

>anyway don't you want latest HTML6 help-your-wife-cuck-you features

they'll probably just hardcode the shit into the browser.


 No.1035358

>>1035353

>it means that to shut down a non-kosher dns server it could easily be done by revoking the domain name required

there's no magical dependency of HTTPS on the normal public DNS system. You've probably gotten this idea from browsers and tools ignoring your hosts file or explicit IPs. That's a (((deliberate security feature))) of those tools.


 No.1035367>>1035392

What about DNSCrypt? I'm using it for a couple of years now. Is there any advantage of using DoH over DNSCrypt?


 No.1035373


 No.1035388

>>1035290

>how would pushing LE help them if that's the case?

It gives people who aren't into crypto a false sense of security.

One should never consider a system 100% secure. But mozilla, google and other fags want EVERYTHING to go trough https. It could be a coincidence but I begin to see enough of this sort of scheme.

There's another variation too this for example to make people believe that an information is true and to make if believably true they are on purpose going to censor the subject of that information on a certain media.


 No.1035392

>>1035367

Yes. DNS over HTTPS means it's impossible for your DNS requests to be MITM or taken.

>but with DNScrypt the request is encrypted!

So is DNS Over HTTPS. The main difference is that with DNScrypt metadata and timing-based attacks are technically possible, but not with DoH. On the other hand, DoH *could* centralize DNS more.

I think I read somewhere that DoH can be used to bypass DNS filters. Another thing to bear in mind is that DNScrypt is not a standard, so it could change at any moment.

Both are good options and can be used in tandem.


 No.1035398>>1035403

>>1035354

>>1035229

A DNS client is trivial to implement and is not in any way a hurdle preventing browser vendors from using their own resolvers. In reality, Chrome already has an internal DNS suite that it sometimes chooses to use. I'm thinking that DNS/HTTPS is being championed over its competition because it goes along with the "everything over HTTP" mentality that's been popular for the past half-decade or so.

>>1035353

>but then how is it going to resolve kikeddns.com, when to resolve dns it must first know what it's dns server ip address is, it needs to know kikeddns.com is, but it's the dns server.

You can use a hardcoded bootstrap service which is great if you want to do surveillance. You could also use an IP as an HTTP host rather than a domain. The following link goes to the website of a US intelligence agency, for example: http://172.217.13.110


 No.1035403>>1035407

>>1035353

You don't need to resolve an IP address. Do you think the browser sends a DNS query to find out where 8.8.8.8 is, so it can send the actual DNS thing you want? Retard.

>>1035398

The problem DoH solves is that DNS requests leak a bunch of info. The DNS resolver simply re-sends your request to several other servers and the request(s) can be MITM'd or leaked. DoH can avoid that.


 No.1035407

>>1035403

Looking at https://tools.ietf.org/html/rfc8484#section-4.1.1 , it looks like DoH uses the exact same architecture as DNS but with an intermediary HTTPS transport layer on top, which I don't think makes it any different than DNSCrypt for general purpose use.


 No.1035408

could just put the ips of the domains i use in the hosts file and turn off dns completely.


 No.1035409

>>1035353

As pants-on-head retarded as DNS over HTTPS is, this isn't really a problem. SSL/TLS certificates are issued and verified against a common name (the CN string) and sometimes using the subject alternate name (SAN) extension to provide multiple names in a single cert. There's nothing to inherently verify against in any cert. We all just basically decided to agree that the common name is where the domain goes.

It could, like all trusted root certs, simply be a self-signed cert that you must explicitly add to your trust store, or it could have the common name be the IP address of the server. There's a myriad of ways to do this.


 No.1035527>>1035767

Newfag here, is there a way to enforce specific rather than pre-defined DoT server through asuswrt-merlin? Thanks


 No.1035767

>>1035527

Why DoT and not DoH?




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
37 replies | 0 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / animu / choroy / leftpol / mde / pinoy / vg / wboy / xivlg ][ watchlist ]