by websirnik on 12/8/20, 12:33 PM with 349 comments
by dang on 12/8/20, 6:38 PM
by TrueDuality on 12/8/20, 3:45 PM
Enterprises aside, there has been a rise of people using solutions like pi-hole in their home networks to filter out traffic not just for ads, but known malicious domains, and telemetry trackers (which Apple does get filtered by, only calling them out specifically because they have an active interest in not being filtered like this).
Yes I think it's also a problem that ISPs are snooping and selling this information, but I think that is a less severe problem than rampant malware infections and the excessive collection of online usage data in the telemetry systems present in every webapp, OS, mobile, or IoT device. This increases privacy in one place, while making it much harder to actively protect yourself from the more aggressive and invasive sources of data collection.
by Lammy on 12/8/20, 6:28 PM
Never forget the lesson in "Using Metadata to find Paul Revere": https://kieranhealy.org/blog/archives/2013/06/09/using-metad...
by crumbshot on 12/8/20, 2:23 PM
> However, each of these guarantees relies on one fundamental property — that the proxy and the target servers do not collude. So long as there is no collusion, an attacker succeeds only if both the proxy and target are compromised.
I'm not sure how an end user would be expected to assess this any more than they could ascertain whether any particular DoH/DoT provider is as trustworthy as they claim.
by eh78ssxv2f on 12/8/20, 5:56 PM
Apple/Cloudflare are working on privacy-friendly protocols that reduce the amount of information exposed to them.
At exactly the same time, Google is working on proxying browser traffic through them without any consents [1].
by landerwust on 12/8/20, 1:08 PM
by ignoramous on 12/8/20, 1:11 PM
> The target [resolver] sees only the [DNS] query and the proxy’s IP address. The proxy has no visibility into the DNS messages, with no ability to identify, read, or modify either the query being sent by the client or the answer being returned by the target. Only the intended target [resolver] can read the content of the [DNS] query and produce a [DNS] response.
> The whole process begins with clients that encrypt their query for the target using HPKE. Clients obtain the target’s public key via DNS, where it is bundled into a [SVCB/HTTPS] HTTPS resource record and protected by DNSSEC.
> Clients transmit these encrypted queries to a proxy over an HTTPS connection. Upon receipt, the proxy forwards the query to the designated target. The target then decrypts the query, produces a response by sending the query to a recursive resolver such as 1.1.1.1, and then encrypts the response to the client. The encrypted query from the client contains encapsulated keying material from which targets derive the response encryption symmetric key.
> ...50% of the time ODoH queries are resolved in fewer than 228ms.
BTW, DNSCrypt supports "oblivious" encrypted DNS queries via what it calls Anonymized Relays https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-D...
by darkwater on 12/8/20, 1:49 PM
by jamescun on 12/8/20, 1:35 PM
Given generally DNS is just the start of an intereaction, usually followed by the connection directly between the client and intended destination, I don't see what kind of snooping these privacy measures are there to prevent.
by ksm1717 on 12/8/20, 3:06 PM
by londons_explore on 12/8/20, 1:23 PM
by akvadrako on 12/8/20, 3:28 PM
https://tools.ietf.org/html/draft-pauly-dprive-oblivious-doh...
by g42gregory on 12/8/20, 5:08 PM
If not, here is a PaloAlto Networks blog advertising capability to block all DoH traffic, presumably at work [0]. It looks like you might not be able to use DoH at work, the way it currently stands. I wonder what would be the right solution?
[0] https://live.paloaltonetworks.com/t5/blogs/protecting-organi...
by joshspankit on 12/8/20, 2:42 PM
but why does Apple want this?
My knee-jerk is that they want to further hide/make unstoppable things like the Gatekeeper network checks, but there has to be more right?
by benlivengood on 12/8/20, 6:10 PM
by anonypla on 12/9/20, 10:37 AM
So while ODoH is a good thing (and also recommended in this study which has shown the weaknesses of DoH/DoT https://www.esat.kuleuven.be/cosic/publications/article-3153...) and is very similar to DNS over Tor with a DNS hidden service resolver (which Cloudflare also provides). It won't prevent a skilled and motivated adversary from determining your activity and possibly apply censorship.
I would guess that a solution to mitigate these would be to use an hybrid solution of VPN over Tor (or Tor over VPN) while also using DNS over Tor or ODoH and eSNI.
by jlgaddis on 12/8/20, 6:30 PM
If you wanted to go a step further, you can even allow "chaining" of proxies, such that the path a query takes might be, in an extreme example, similar to how Tor operates:
Client -> Proxy 1 -> Proxy 2 -> Proxy 3 -> Target -> Resolver
--Anyways, this is kinda sorta interesting, I guess, but honestly I'm more excited by and looking forward to the (hopefully!) eventual adoption and roll-out of "DNS SVCB and HTTPS RRs" [0] -- one of the other I-Ds (linked in the OP) on which ODoH is built -- and I suspect many other HN'ers will be as well (although I'd happily settle for SRV RR support in browsers).
--
[0]: https://tools.ietf.org/html/draft-ietf-dnsop-svcb-https-02
by geogriffin on 12/9/20, 1:13 AM
by clashmeifyoucan on 12/8/20, 2:03 PM
Also, not sure how useful the Tor comparison is, since Tor does 3 hops as opposed to their 1 so it would be a shame if it doesn't beat that.
by pcwrt on 12/9/20, 9:41 PM
by izacus on 12/8/20, 1:45 PM
Will ISPs be too scared to sue Apple and Cloudflare for this? Or are they giving them an out?
by mlegner on 12/8/20, 3:35 PM
The blog post only discusses how the proxying and encryption affect latency but not the processing at the server. In contrast to plain DoH (or DoT), where only symmetric cryptography is used after the first set-up, ODoH requires asymmetric cryptography (which is several orders of magnitude slower) for each individual request. The "less than 1ms" that they claim for the 99th percentile is no problem for the client but it is a problem for the resolver. Asymmetric cryptography is also used for verifying DNSSEC responses, but this is only necessary for records that are not cached.
On the other hand, an ODoH resolver may require to set up and keep track of a lower number of TLS connections as the number of proxies is likely smaller than the number of clients.
by gwbas1c on 12/8/20, 2:27 PM
In my state, Comcast is going to start charging heavy bandwidth users extra. After a few people get surprise bills, I suspect that lawmakers will require that internet providers break down a bill by application.
by thrwaway2020aug on 12/8/20, 2:25 PM
What does Cloudflare think of Safari's new CNAME-cloaking detection to block cookies? https://webkit.org/blog/11338/cname-cloaking-and-bounce-trac...
The reason I ask is because Cloudflare's "orange cloud" DNS mitigates that protection because it prevents Safari from detecting the cloak. On the other hand, I haven't run into many engineers who think CNAME-cloaking actually hurts privacy in light of Safari's other efforts to partition local storage.
Does Cloudflare think it would be help privacy for Apple to know the final IPs behind orange cloud DNS?
by John_Westra on 12/8/20, 3:11 PM
by TimWolla on 12/8/20, 1:09 PM
I thought HTTPS proxying (or rather: Any TCP protocol) was a solved problem by the HTTP CONNECT verb or SOCKS proxies.
What am I missing?
by karmakaze on 12/8/20, 4:44 PM
> “What ODoH is meant to do is separate the information about who is making the query and what the query is,” said Nick Sullivan, Cloudflare’s head of research.
> In other words, ODoH ensures that only the proxy knows the identity of the internet user and that the DNS resolver only knows the website being requested. Sullivan said that page loading times on ODoH are “practically indistinguishable” from DoH and shouldn’t cause any significant changes to browsing speed.
by CyberRabbi on 12/8/20, 5:11 PM
A tor-like solution is the only real solution for this threat model
by MrStonedOne on 12/8/20, 1:45 PM
While I'm sure aws route53 and cloudflare's own routing systems can handle this properly, Cloud isn't quite the answer. Not every workload fits on the cloud (see: Discord, which runs on leased servers), and a system that breaks down if your rented datacenters aren't in alignment with Cloud operating regions doesn't make a great solution.
by ajnin on 12/8/20, 6:12 PM
by OJFord on 12/8/20, 7:59 PM
Unfortunately I suppose the only way to really do that is with a resolv file (adlist/blocklist) of DoH hosts (which exist) but instead of pointing to 0.0.0.0, point to <preferred DoH>.
Edit - d'oh! I see it now - that would mean DoH provider knows query and IP, whereas here the ODoH proxy knows your IP but not the query. Nice.
by nuker on 12/8/20, 1:47 PM
by dj_mc_merlin on 12/8/20, 9:24 PM
by hkt on 12/8/20, 11:13 PM
by tie_ on 12/9/20, 7:37 AM
by new23d on 12/8/20, 1:37 PM
Who is the proxy here, and who the DNS resolver?
by phlhar on 12/8/20, 6:27 PM
by elliottinvent on 12/8/20, 11:41 PM
Pretty crucial hyphen
by dylz on 12/9/20, 5:02 AM
by cblconfederate on 12/8/20, 1:44 PM
In other words, in order to thwart efforts to make the internet anonymous , US companies are planning to takeover DNS for the vast majority of people.
by seek3r on 12/8/20, 1:04 PM
by exabrial on 12/9/20, 12:20 AM
by aftbit on 12/8/20, 9:41 PM
by theamk on 12/8/20, 1:38 PM
by ittan on 12/9/20, 1:25 AM
by nalekberov on 12/8/20, 1:35 PM
Centralization and too much power in certain amount of hands are the source of all evil.
by cannabis_sam on 12/8/20, 3:03 PM
by TimWolla on 12/8/20, 1:02 PM
by throwaway54235 on 12/8/20, 3:35 PM
You can resolve the websites from the Alexa top 100k list and create a ipaddr -> website map that will successfully apply to 90% of Internet traffic without ambiguity.
A lot of research papers also show how easy it is to fingerprint and detect a TLS handshake.
Assuming the SNI problem is going to be solved, the other problems are still here.
TL;DR: use Tor.
by teddyh on 12/8/20, 1:47 PM
by jaimex2 on 12/8/20, 2:07 PM
Governments subpoena the information or just block the protocol outright. ( or in China, get it delivered to their door by Apple )
Commercial parties have a bag full of tricks from fingerprinting to embeds on the page itself to track you.
Privacy seeking users are already tunneling their traffic.
That leaves script kiddies at Internet cafes. TLS kind of fixed that already so... Good work?
by freebuju on 12/8/20, 1:49 PM
Encrypted dns might be already in use by government or military agencies, but they know too well the effects of cascading this tech down to the masses. They will never let this reach the public.
by zero_deg_kevin on 12/8/20, 6:26 PM
But seriously, fuck this protocol and fuck every other BigCorp-sponsored protocol to remake the Internet. We the People Who Implement Protocols are too busy keeping the lights on to chase incremental, nice-to-have improvements.
by techelite on 12/8/20, 1:13 PM