{"id":17832,"date":"2020-02-26T12:30:08","date_gmt":"2020-02-26T20:30:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/26\/news-11565\/"},"modified":"2020-02-26T12:30:08","modified_gmt":"2020-02-26T20:30:08","slug":"news-11565","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/26\/news-11565\/","title":{"rendered":"Firefox starts switching on DNS-over-HTTPS to encrypt lookups, stymie tracking"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/01\/cso_security_image_purple_with_umbrella_jpg_by_akindo_gettyimages-165962625-100827475-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Wed, 26 Feb 2020 11:11:00 -0800<\/strong><\/p>\n<p>Mozilla has started to turn on DNS-over-HTTPS, or DoH, as part of its overall strategy of stressing user privacy.<\/p>\n<p>&#8220;We know that unencrypted DNS is not only vulnerable to spying but is being exploited,&#8221; wrote Selena Deckelmann, Mozilla&#8217;s new vice president of desktop Firefox, in a <a href=\"https:\/\/blog.mozilla.org\/blog\/2020\/02\/25\/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users\/\" rel=\"noopener nofollow\" target=\"_blank\">Feb. 25 post to a company blog<\/a>. &#8220;We are helping&#8230;to make the shift to more secure alternatives [and] do this by performing DNS lookups in an encrypted HTTPS connection. This helps hide your browsing history from attackers on the network, helps prevent data collection by third parties on the network that ties your computer to websites you visit.&#8221;<\/p>\n<p>The browser \u2014 in Mozilla&#8217;s case, Firefox \u2014 looks up a site&#8217;s human-centric address, such as <i>mozilla.com<\/i>, in the DNS database, then retrieves and uses the computer-centric IP address, like <i>63.245.208.194<\/i>, to reach the website. Historically, the lookups have been done over unencrypted connections, even when the desired destination <i>was<\/i> guarded by HTTPS.<\/p>\n<p>As Deckelmann said, the openness of DNS lookups has been exploited, both by hackers and by entities wanting to track users across the web for commercial gain. The DNS traffic can be read by someone monitoring a public Wi-Fi network or examined by the user&#8217;s ISP (Internet service provider). Criminals can intercept the bits flying between the browser and DNS server, then insert bogus addresses that steer the unwary user to a malicious site.<\/p>\n<p>Shifting DNS lookups and their returns to encrypted connections prevents such abuses.<\/p>\n<p>Both Mozilla and Google have been beating the DoH drum, the former for nearly two years. In a <a href=\"https:\/\/blog.mozilla.org\/futurereleases\/2019\/09\/06\/whats-next-in-making-dns-over-https-the-default\/\" rel=\"noopener nofollow\" target=\"_blank\">September 2019 update<\/a> on DoH progress, Mozilla said that it would begin enabling DNS-over-HTTPS later that month. Instead, Mozilla did more testing.<\/p>\n<p>&#8220;Today, Firefox began the rollout of encrypted DNS over HTTPS (DoH) by default for U.S.-based users,&#8221; Deckelmann said Tuesday. &#8220;The rollout will continue over the next few weeks to confirm no major issues are discovered as this new protocol is enabled for Firefox&#8217;s U.S.-based users.&#8221;<\/p>\n<p>Users not living the U.S., and those who do but want DoH enabled immediately, not on Mozilla&#8217;s timetable, can open <em>Settings &gt; Network Settings &gt; Settings&#8230;<\/em>, then check the &#8220;Enable DNS over HTTPS&#8221; box (users will probably need to scroll down through the Connection Settings frame to find that box), choose &#8220;Cloudflare&#8221; or &#8220;NextDNS&#8221; from the list, and finally, click &#8220;OK.&#8221;<\/p>\n<p>Firefox will automatically disable DoH if it detects that parental browsing controls have been selected in the operating system. Likewise, DoH will disengage if admins have set any enterprise policies for Firefox, <i>unless<\/i> one of those policies was <a href=\"https:\/\/github.com\/mozilla\/policy-templates\/blob\/3c0d7fcf4ce4aaa7be5f5a3d66fa7c3e2b8487ad\/README.md#dnsoverhttps\" rel=\"noopener nofollow\" target=\"_blank\"><i>DNSOverHTTPS<\/i><\/a>.<\/p>\n<p>Google&#8217;s DoH plans for Chrome were different. Rather than switch DNS providers \u2014 when Firefox enables DoH, it defaults to Cloudflare as the new encrypted-connection &#8220;resolver,&#8221; with NextDNS as an alternative choice \u2014 Chrome instead uses a Google-maintained table to see whether that browser&#8217;s current DNS resolver has DoH servers. If it does, Chrome automatically switches to that.<\/p>\n<p>Like Firefox, managed copies of Chrome \u2014 those joined to a domain or that have at least one active group policy \u2014 won&#8217;t auto-upgrade to DoH. Enterprises will also be able to control the DoH experiment through a new policy, <i>DnsOverHttpsMode<\/i>.<\/p>\n<p>Google has been testing this &#8220;same provider, auto upgrade&#8221; approach since 2019, but has not yet spun it to the entire Chrome user base. According to <a href=\"https:\/\/groups.google.com\/a\/chromium.org\/forum\/#!msg\/net-dev\/lIm9esAFjQ0\/vJ93oMbAAgAJ\" rel=\"noopener nofollow\" target=\"_blank\">this document<\/a>, Google plans to do so with Chrome 81, currently slated to release March 17.<\/p>\n<p>Google&#8217;s approach relies on DNS providers&#8217; motivation to provide DoH servers as alternatives to their non-DoH servers. Not all will want to offer DoH \u2014 notably, some ISPs \u2014 because they benefit, either directly or indirectly, from the tracking and logging they can conduct on their customers.<\/p>\n<p>Firefox&#8217;s way of tackling DoH definitely takes a more aggressive line on user privacy.<\/p>\n<p>More information about DoH in Firefox can be found in <a href=\"https:\/\/support.mozilla.org\/en-US\/kb\/dns-over-https-doh-faqs\" rel=\"noopener nofollow\" target=\"_blank\">this Mozilla-made FAQ<\/a>.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3529424\/firefox-starts-switching-on-dns-over-https-to-encrypt-lookups-stymie-tracking.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/01\/cso_security_image_purple_with_umbrella_jpg_by_akindo_gettyimages-165962625-100827475-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Wed, 26 Feb 2020 11:11:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Mozilla has started to turn on DNS-over-HTTPS, or DoH, as part of its overall strategy of stressing user privacy.<\/p>\n<p>&#8220;We know that unencrypted DNS is not only vulnerable to spying but is being exploited,&#8221; wrote Selena Deckelmann, Mozilla&#8217;s new vice president of desktop Firefox, in a <a href=\"https:\/\/blog.mozilla.org\/blog\/2020\/02\/25\/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users\/\" rel=\"noopener nofollow\" target=\"_blank\">Feb. 25 post to a company blog<\/a>. &#8220;We are helping&#8230;to make the shift to more secure alternatives [and] do this by performing DNS lookups in an encrypted HTTPS connection. This helps hide your browsing history from attackers on the network, helps prevent data collection by third parties on the network that ties your computer to websites you visit.&#8221;<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3529424\/firefox-starts-switching-on-dns-over-https-to-encrypt-lookups-stymie-tracking.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[12014,714],"class_list":["post-17832","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-browsers","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17832"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17832\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17832"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}