ed1703 schreef op zaterdag 22 januari 2022 @ 11:34:
[...]
Als de root-servers het zouden ondersteunen ja, maar dat doen ze vziw niet. (tenzij iemand hier andere info over heeft)
Wat je bereikt met DoH of zelfs DoT is dat je opgevraagde dns-records bij cloudflare of google liggen, omdat er geen ondersteuning is voor de protocollen met de upstream root-servers. Je bent dan overgeleverd aan die partijen, want die ondersteunen het wel.
Dan heb ik vanuit privacy-oogpunt liever dat de NL-ISP weet wat ik doe, dan cloudflare, quad9 of google.
Doen ze niet helaas
https://www.dnsfilter.com/blog/dns-over-tls
There is still work that needs to be done in both DNS encryption and SNI (Server Name Indication) encryption.
SNI is the layer above TLS and an extension of the TLS layer. Once you make a DNS request and TLS makes a secure connection with that IP address, SNI tells the server in clear text (not encrypted) what the name of that domain is. While this does not impact things like man-in-the-middle attacks, it does impact privacy. Currently, SNI is not encrypted, though it is something that is being worked on.
While DoT and DoH are the most secure and standardized methods for encrypting DNS, they do not encrypt the request that goes to the authoritative DNS. That request is received in clear text. This is a point of vulnerability in both DoT and DoH, as well as DNSCrypt. Right now there is no standard for encrypting this information.
https://blog.cloudflare.c...on-endgame-an-ech-update/
Cloudflare is wél bezig met ech
in collaboration with other participants in the standardization community and members of industry, we embarked towards a solution for encrypting all sensitive TLS metadata in transit. The result: TLS Encrypted ClientHello (ECH), an extension to protect this sensitive metadata during connection establishment.
Last year, we described the current status of this standard and its relation to the TLS 1.3 standardization effort, as well as ECH's predecessor, Encrypted SNI (ESNI). The protocol has come a long way since then, but when will we know when it's ready? There are many ways by which one can measure a protocol. Is it implementable? Is it easy to enable? Does it seamlessly integrate with existing protocols or applications? In order to assess these questions and see if the Internet is ready for ECH, the community needs deployment experience. Hence, for the past year, we’ve been focused on making the protocol stable, interoperable, and, ultimately, deployable. And today, we’re pleased to announce that we’ve begun our initial deployment of TLS ECH.
What does ECH mean for connection security and privacy on the network? How does it relate to similar technologies and concepts such as domain fronting? In this post, we’ll dig into ECH details and describe what this protocol does to move the needle to help build a better Internet.