diff --git a/static/faq.html b/static/faq.html index e51a7122..7954b391 100644 --- a/static/faq.html +++ b/static/faq.html @@ -66,13 +66,7 @@ bundled apps make by default?
This is not a bug, but rather the feature is operating as it is intended to. When - operating in forced mode, private DNS requires a domain and will reject invalid - certificates to ensure that the source is authenticated, not just encrypted. Automatic - mode only uses encryption opportunistically, and must be able to fall back to - unauthenticated encryption or fall back to plaintext if the DNS server does not support - DNS over TLS or the certificate is not valid. Although this does not protect against an - active adversary that blocks encrypted communications to the DNS server or will replace - the certificates entirely to intercept the encrypted traffic, automatic will - transparently provide some opportunistic protection against a passive adversary. When a - private DNS provider hostname is specified, the phone will not proceed unless the - certificates for TLS are valid and will not fall back to an unauthenticated or plaintext - connection should the validation fail.
+By default, in the automatic mode, the Private DNS feature provides opportunistic + encryption by using DNS-over-TLS when supported by the DNS server IP addresses + provided by the network or the static IP configuration. Opportunistic encryption + provides protection against a passive listener, not an active attacker, since they can + force falling back to unencrypted DNS by blocking DNS-over-TLS. In the automatic mode, + certificate validation is not enforced, as it would provide no additional security and + would reduce the availability of opportunistic encryption.
+When Private DNS is explicitly enabled, it uses authenticated encryption without a + fallback. The authentication is performed based on the hostname of the server, so it + isn't possible to provide an IP address. The OS will look up the hostname of the Private + DNS server via unencrypted DNS and then force all other DNS lookups via DNS-over-TLS + with the identity of the server authenticated as part of providing authenticated + encryption.