From 7a6b36d26061b6f8e3ee64f59bf7ce91def10ba7 Mon Sep 17 00:00:00 2001 From: Daniel Micay Date: Fri, 28 Feb 2020 23:09:21 -0500 Subject: [PATCH] more clarifications on Private DNS --- static/faq.html | 32 +++++++++++++++++++++++++++++++- 1 file changed, 31 insertions(+), 1 deletion(-) diff --git a/static/faq.html b/static/faq.html index 78c071e9..8654dd30 100644 --- a/static/faq.html +++ b/static/faq.html @@ -67,7 +67,12 @@
  • What does GrapheneOS do about cellular tracking and silent SMS?
  • How do I use a custom DNS server?
  • -
  • Why does Private DNS not accept IP addresses?
  • +
  • Why does Private DNS not accept IP + addresses?
  • +
  • Does DNS-over-TLS (Private DNS) protect + other connections?
  • +
  • Does DNS-over-TLS (Private DNS) hide + which sites are visited, etc.?
  • @@ -402,6 +407,31 @@ DNS server via unencrypted DNS and then force all other DNS lookups via DNS-over-TLS with the identity of the server authenticated as part of providing authenticated encryption.

    + +

    + Does DNS-over-TLS (Private DNS) protect other connections? +

    + +

    No, it only provides privacy for DNS resolution. Even authenticating DNS results + with DNSSEC does not protect other connections, unless the DNS records are part of the + system used to provide authenticated encryption, and DNS-over-TLS is not a substitute + for DNSSEC. If connections have authenticated encryption, they're secure even if DNS + resolution is hijacked by an attacker. If connections do not have authenticated + encryption, an attacker can listen in and tamper with them without hijacking DNS. + There are other ways to perform a MITM attack than DNS hijacking and internet routing + is fundamentally insecure. DNS-over-TLS may make a MITM harder for some attackers, but + don't count on it at all.

    + +

    + Does DNS-over-TLS (Private DNS) hide which sites are visited, etc.? +

    + +

    Private DNS only encrypts DNS, and an adversary monitoring connections can still + see the IP address at the other end of those connections. Many domains resolve to + ambiguous IP addresses, so encrypted DNS is part of what's required to take away a lot + of the information leaked to adversaries. However, TLS currently leaks domains via + SNI, so encrypted DNS is not yet accomplishing much. It's a forward looking feature + that will become more useful in the future.