-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ocsp and crl blocklist #470
Comments
Same nonsense as #468 OCSP isn't spying. It's for secure connections |
Would be nice to have an opt-in in nextdns I think. |
Why? If you think you need to block this and reduce your security, add the domain(s) to your blacklist. |
Read scott his blog... |
Read the comments on his blog, e.g.:
https://scotthelme.co.uk/revocation-checking-is-pointless/#comment-4834056007 So the guy post a blog about his research but he doesn't understand what he do. You can read about both feature: |
Which ironically isn't encrypted. So whoever sniffing traffic can see what you're doing. Just compile a comprehensive list of hashes, and you know which app someone is launching over the network, it's a builtin backdoor! |
Made my day. |
Some people obviously don't understand the purpose or mechanism of the Online Certificate Status Protocol (OCSP). A report wrote, macOS sends an "application hash" each time you run the app. This "hash" is the encoded, already-known certificate that is sent to the OCSP server for the validity check. The same happens when you go to a website that supports OCSP and use Firefox … Read more at https://blog.jacopo.io/en/post/apple-ocsp/ |
@beerisgood I understand what you are trying to say but, thinking more and more here (lol... me thinking??? 😄), is waging between security and privacy. And, I am sure you two would meet somewhere in the middle in bar with unlimited quantities of beer for dispose. 😄 Here is the topic is have asked Thorin and BigE for opinion: Cheers |
Security should always be preferred but of course I'm fine if a option exist to block such stuff for increased privacy. |
I hope option for OCSP blocking would be opt-in rather than opt-out (#470 (comment)) as blocking OCSP by default would stop the aforementioned Arkenfox user.js using (arkenfox/user.js#1063 (comment)) and other OCSP hard-failing browsers from working. |
Thanks, looks like I misunderstood what was said from the initial articles. Consider me correctly educated on the matter then :) |
Tested the OCSP and CRL blocking now for 24 hours. Block CRLs and stuff will start to break. For now, blocking OCSP if fine and blocking CRL is a BIG NO NO. Will update for OCSP if I find something new. Cheers UPDATE: It would be nice if we can get https://github.com/ScottHelme/revocation-endpoints/blob/master/ocsp.txt into blocklist NextDNS option. |
Aside from |
We don't have only browsers on our networks. 😉 Thank you and cheers |
@beerisgood They can do that sh*t and its a "low hanging fruit". |
that is also wrong. Read |
Oh... my bad and apologies. Thank you @beerisgood, appreciated. 😄 |
I think these blocklists (ocsp and crl) need to be added to nextdns.
https://github.com/ScottHelme/revocation-endpoints
Some background info:
https://scotthelme.co.uk/revocation-checking-is-pointless/
https://sneak.berlin/20201112/your-computer-isnt-yours/
The text was updated successfully, but these errors were encountered: