Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OpenDNS and DNSCrypt #463

Closed
dead-not-sleeping opened this issue Aug 5, 2013 · 8 comments
Closed

OpenDNS and DNSCrypt #463

dead-not-sleeping opened this issue Aug 5, 2013 · 8 comments

Comments

@dead-not-sleeping
Copy link

Open for discussion.. Is OpenDNS with the DNSCrypt software a viable solution for prism-break?

http://www.opendns.com/technology/dnscrypt/

All opinions solicited!

@Zegnat
Copy link
Collaborator

Zegnat commented Aug 5, 2013

(Trying to merge all previous comments into one.)

In #47, @chuyskywalker commented:

I feel like this needs a foot note that OpenDNS is not a FOSS system and they are based in the U.S., thus making them highly susceptible to FISA orders.

In #72, @caffeinewriter and @owenversteeg reiterated the fact that ‘OpenDNS is not free’, the former adding:

Plus, the irony is that OpenDNS provided the DNS filtering for my school […]

In #184, @ikurua22 linked 2 blogs detailing logging and intercepting by OpenDNS:

  1. Parsing Privacy Policies: Is OpenDNS logging data forever? (2007-06-26)
  2. Five reasons to switch from OpenDNS to Google DNS. (2009-12-05)

From the DNSCrypt page:

[…] DNSCrypt turns regular DNS traffic into encrypted DNS traffic that is secure from eavesdropping and man-in-the-middle attacks.

This sounds good but does not limit the amount of traffic that can be recorded, stored, and censored by OpenDNS themselves.

@dead-not-sleeping
Copy link
Author

Thanks Zegnat- I had tried searching for threads on OpenDNS before posting and didn't find any.

@jedisct1
Copy link

jedisct1 commented Aug 9, 2013

Use it with CloudNS, which focuses on security and privacy, and is not in the US: https://cloudns.com.au/
DNSCrypt, DNSSEC, no hijacking, no logging.

@Zegnat
Copy link
Collaborator

Zegnat commented Aug 9, 2013

CloudNS does look good, any experience with them?

@jedisct1
Copy link

jedisct1 commented Aug 9, 2013

No issues so far.

Another option is dnssec-trigger: http://www.nlnetlabs.nl/projects/dnssec-trigger/

NLNet are also providing a free, non-hijacking, encrypted/authenticated service accessible through dnssec-trigger, and anybody can run such a server as well (DNS over SSL is supported by default in Unbound).

@owenversteeg
Copy link

Yup, OpenDNS may be the "good guys" in that they are against SOPA but again they are, contradictory to their name, not FOSS.

@Zegnat
Copy link
Collaborator

Zegnat commented Aug 14, 2013

@owenversteeg, note that non-FOSS is allowed on PRISM Break if their ease of use or availability outranks any other alternative. See web search. I think this would also apply to DNS.

If there is some guide that can be linked to describing how people can easily switch to CloudNS or an other system I believe these should be added ASAP. I just don’t know any.

@caffeinewriter
Copy link
Contributor

@Zegnat @owenversteeg Regardless of the fact that they are a "Good Guy", they are still subject to FISA requests and the like, and therefore, are not a good fit for PRISM Break. Albeit, I am biased, since, as I stated before, they provided DNS Site Filtering (read censorship) for my school. Sure this was to help keep kids focused, but the fact that the provide this technology as one of their core services is another reason I do not recommend them.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

No branches or pull requests

6 participants