Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Stefano Marinelli
@stefano@mastodon.bsd.cafe  ·  activity timestamp 3 weeks ago

A trend I really dislike in modern browsers is the activation of DoH, or in general any override of the DNS settings provided via DHCP.
In my case I use a local DNS server that doesn’t rely on forwarders but queries the tree directly. I also have integrated ad blocking thanks to filter lists.

This morning a client called me because Chrome could no longer reach their internal server. On their network there’s an internal DNS record that resolves the name to the LAN address, yet it seems their browser randomly resolves it to the external IP instead. I’ll probably fix it with a redirect or NAT hairpinning (I dream of the day when we finally have IPv6 everywhere), but it still feels like a workaround.

Why, when there’s a reasonably secure internal DNS, should you resolve using the usual big players that want to centralise all traffic? I mean, I understand the reasoning behind it. Still, it feels a bit like the "commercial" VPN situation: you fear your provider might inspect your traffic, so you hand everything over to some shady company based who knows where, claiming to protect you while flooding the world with ads.

#IT #SysAdmin #Browsers #Web_Browsers #Internet

  • Copy link
  • Flag this post
  • Block
Paul Armstrong
@psa@masto.ai replied  ·  activity timestamp 3 weeks ago

@stefano I find blocking the resolution of DoH servers helps a lot (I use Blocky, but any filtering DNS server should handle this):

https://github.com/hagezi/dns-blocklists/blob/main/wildcard/doh.txt

https://github.com/hagezi/dns-blocklists/blob/main/wildcard/dyndns.txt

GitHub

dns-blocklists/wildcard/dyndns.txt at main · hagezi/dns-blocklists

DNS-Blocklists: For a better internet - keep the internet clean! - hagezi/dns-blocklists
  • Copy link
  • Flag this comment
  • Block
fukawi2
@phs@aus.social replied  ·  activity timestamp 3 weeks ago

@stefano We (admins) have to workaround DOH with a canary domain to indicate to the browser not to use DOH: https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet

Canary domain - use-application-dns.net | Firefox Help

Network administrators may configure their networks to modify DNS requests for the following special-purpose domain, called a ''canary domain''.
  • Copy link
  • Flag this comment
  • Block
anparker
@anparker@techhub.social replied  ·  activity timestamp 3 weeks ago

@stefano Honestly, I'll feel better if it just my local ISP monitoring my DNS traffic, not some big tech company.

(Leaving aside that insignificant option when no one looking at it)

  • Copy link
  • Flag this comment
  • Block
linus
@linus@telegrafverket.cc replied  ·  activity timestamp 3 weeks ago

@stefano DoH support in browsers is great for those that need it, but the default activation of it to things like Google or Cloudflare is just crazy and should be illegal, it’s just data harvesting, and DNS records is pretty sensitive stuff. I guess someone could claim that in enterprise environments this should be handled with rollout policies to client devices but it’s still definitely not a sane default.

  • Copy link
  • Flag this comment
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-alpha.8 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login