Bobinas P4G
  • Login
  • Public

    • Public
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Ruby Rhod (feld@bikeshed.party)'s status on Friday, 06-Sep-2019 18:08:09 UTC Ruby Rhod Ruby Rhod
    • Dan Langille
    • Carsten Strotmann
    • Ruby Rhod
    @cstrotm @dvl the point is that encrypted DNS is easily unraveled. Just watch for the next SYN from that source IP and now you know the destination they're going to and you can infer what the DNS query was.

    Does not help with anyone's safety as a dictatorship will still identify your dissent. Only solution is a VPN and there's no value in doing this over a VPN.
    In conversation Friday, 06-Sep-2019 18:08:09 UTC from bikeshed.party permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Friday, 06-Sep-2019 18:16:08 UTC Ruby Rhod Ruby Rhod
      • Dan Langille
      • Carsten Strotmann
      @cstrotm @dvl this is another issue that was discussed. Combination of DoH and TLS 1.3 (encrypted SNI) means you can no longer do filtering of traffic on the edge at your company. Now what do you do? You have to whitelist IPs?

      And then look at the UK where it's illegal for ISPs to permit access to sites that host child porn. C-level execs will go to prison if the filtering is not working.

      Well, Firefox is (or will be?) shipping with DNS over HTTP enabled out of the box... this bypasses the ISP's DNS filters...

      So now what do we do?
      In conversation Friday, 06-Sep-2019 18:16:08 UTC permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Friday, 06-Sep-2019 18:20:10 UTC Ruby Rhod Ruby Rhod
      in reply to
      • Dan Langille
      • Carsten Strotmann
      @cstrotm @dvl You want to do content filtering for your children: what network-wide options do you have now?

      Ok, we can choose to allow censorship but we want to prevent MITM attacks on DNS records: DNSSEC is our only tool. But DNSSEC has almost no uptake and might be entirely dead if Resolverless DNS happens because they bypass it.

      ( Resolverless DNS has the webserver respond with a header including all DNS records of any external resources required to load the site so you don't have to waste the round trip doing DNS lookups. )
      In conversation Friday, 06-Sep-2019 18:20:10 UTC permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Friday, 06-Sep-2019 18:27:59 UTC Ruby Rhod Ruby Rhod
      • Dan Langille
      • Carsten Strotmann
      @cstrotm @dvl DNS filters are bypassed with a VPN though and protects you better than either of these solutions ever could. That's the point being made.

      I'll send you a link to the video of Paul Vixie's talk when we have the editing completed. It will make more sense when all of the details presented.
      In conversation Friday, 06-Sep-2019 18:27:59 UTC permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Friday, 06-Sep-2019 18:34:25 UTC Ruby Rhod Ruby Rhod
      • Dan Langille
      • Carsten Strotmann
      @cstrotm @dvl correct but the Resolverless DNS authors are not interested in supporting DNSSEC
      In conversation Friday, 06-Sep-2019 18:34:25 UTC permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Friday, 06-Sep-2019 18:36:46 UTC Ruby Rhod Ruby Rhod
      • Dan Langille
      • Carsten Strotmann
      @cstrotm @dvl one other point important to me for security:

      How do you detect malware, backdoors, and exfiltration if you can't filter DNS and alert based on it? You can no longer rely on things like a list of C&C servers, for example, or get an alert if Dropbox (banned at your company) is being used
      In conversation Friday, 06-Sep-2019 18:36:46 UTC permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Friday, 06-Sep-2019 18:51:28 UTC Ruby Rhod Ruby Rhod
      • Dan Langille
      • Carsten Strotmann
      @cstrotm @dvl to clarify: you prefer individual privacy at the risk of of making it harder for security folk to enforce security on their networks which might mean $tech_giant is hacked by a state actor and they get the info they need on the targets anyway
      In conversation Friday, 06-Sep-2019 18:51:28 UTC permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Friday, 06-Sep-2019 18:55:28 UTC Ruby Rhod Ruby Rhod
      • Dan Langille
      • Carsten Strotmann
      @cstrotm @dvl software can include their own DoH resolver... like Firefox is doing. Malware can include it too. How do you stop that?

      Require every device only run signed software? Enforce that at kernel level? I don't even know where to start with that.
      In conversation Friday, 06-Sep-2019 18:55:28 UTC permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Saturday, 07-Sep-2019 07:28:11 UTC Ruby Rhod Ruby Rhod
      • Dan Langille
      • Carsten Strotmann
      • SillyString
      @cstrotm @sillystring @dvl thank you for sharing
      In conversation Saturday, 07-Sep-2019 07:28:11 UTC permalink
    • Ruby Rhod (feld@bikeshed.party)'s status on Saturday, 07-Sep-2019 13:14:19 UTC Ruby Rhod Ruby Rhod
      • Carsten Strotmann
      @cstrotm @hannesm how is DNS privacy an issue when the IP of destination is never private? It doesn't make sense
      In conversation Saturday, 07-Sep-2019 13:14:19 UTC permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Bobinas P4G is a social network. It runs on GNU social, version 2.0.1-beta0, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Bobinas P4G content and data are available under the Creative Commons Attribution 3.0 license.