Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
DNS-over-TLS (RFC7858) #536
Comments
thestinger
added
the
Type: enhancement
label
Dec 18, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment|
It definitely shouldn't involve code in the kernel. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
spacekitteh
Dec 19, 2016
Indeed, it is merely an example of a complete-ish implementation at a low level. Do the external deps use Bionic for their libc as well?
spacekitteh
commented
Dec 19, 2016
|
Indeed, it is merely an example of a complete-ish implementation at a low level. Do the external deps use Bionic for their libc as well? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Dec 19, 2016
Contributor
Everything Android uses Bionic. If you wanted to bundle BoringSSL into Bionic you could.
|
Everything Android uses Bionic. If you wanted to bundle BoringSSL into Bionic you could. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
spacekitteh
Dec 19, 2016
As a workaround in the meantime, perhaps including a simple dns-over-tls-supporting resolver app and forward all requests to it might be acceptable?
spacekitteh
commented
Dec 19, 2016
|
As a workaround in the meantime, perhaps including a simple dns-over-tls-supporting resolver app and forward all requests to it might be acceptable? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Dec 20, 2016
Contributor
It can likely just be done in netd because DNS requests are likely already proxied to netd from everywhere else by default and preventing apps from shooting themselves in the foot by going out of the way to change that isn't necessary.
|
It can likely just be done in netd because DNS requests are likely already proxied to netd from everywhere else by default and preventing apps from shooting themselves in the foot by going out of the way to change that isn't necessary. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
stensonb
Jan 4, 2017
fair warning: I know nothing about android development or the android ecosystem...
why not use dnscrypt-proxy, and a local dns cache?
stensonb
commented
Jan 4, 2017
|
fair warning: I know nothing about android development or the android ecosystem... why not use dnscrypt-proxy, and a local dns cache? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
spacekitteh
Jan 4, 2017
spacekitteh
commented
Jan 4, 2017
|
Dnscrypt is only for authentication, not privacy.
…On Wed, 4 Jan 2017, 14:27 Bryan Stenson, ***@***.***> wrote:
fair warning: I know nothing about android development or the android
ecosystem...
why not use dnscrypt-proxy <https://dnscrypt.org/>, and a local dns cache?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#536 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AB2crKoVU3OQXb_6k-mrToFJxh0uqrrJks5rOx-XgaJpZM4LQFUK>
.
|
thestinger
changed the title from
Investigate DNS-over-TLS (RFC7858)
to
DNS-over-TLS (RFC7858)
Jun 11, 2017
thestinger
added
the
Priority: low
label
Jun 11, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Jun 11, 2017
Contributor
They might be interested in this upstream which would be a way of getting it done, not sure. Since DNS queries are usually followed by connecting to the resolved IP, it won't hide much other than hosts with multiple / many hostnames and in terms of authentication DNS should be untrusted either way. Authentication might be more useful in terms of mitigating denial of service a compromised DNS server, by falling back to a different server if authentication fails, but it's a marginal benefit.
|
They might be interested in this upstream which would be a way of getting it done, not sure. Since DNS queries are usually followed by connecting to the resolved IP, it won't hide much other than hosts with multiple / many hostnames and in terms of authentication DNS should be untrusted either way. Authentication might be more useful in terms of mitigating denial of service a compromised DNS server, by falling back to a different server if authentication fails, but it's a marginal benefit. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
spacekitteh
commented
Jun 12, 2017
|
It is important for anonymity, like when using VPNs and Tor, for example. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment|
The DNS should be going over the VPN / Tor already. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
spacekitteh
commented
Jun 12, 2017
|
True enough |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Oct 23, 2017
Contributor
This is being implemented upstream so we'll just wait for it. It's a very low priority for us since the IP addresses are still leaked and TLS SNI leaks the domain being requested so there's not much really being hidden.
|
This is being implemented upstream so we'll just wait for it. It's a very low priority for us since the IP addresses are still leaked and TLS SNI leaks the domain being requested so there's not much really being hidden. |
spacekitteh commentedDec 18, 2016
•
edited
Edited 1 time
-
spacekitteh
edited Dec 18, 2016
RFC7858
From my limited understanding, Bionic appears to implement Android's DNS lookup mechanism. Thus it must be investigated if this is even possible without separating out the libresolv-ish parts from libc in order to link to a TLS lib.
Here seems to be the meat of the implementation.
Some items of interest:
android_getaddrinfo_proxyfor doing DNS lookup over a proxyRelated upstream issue/feature request