drduh / macOS-Security-and-Privacy-Guide

Guide to securing and improving privacy on macOS

Home Page:https://drduh.github.io/macOS-Security-and-Privacy-Guide/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

DNS over HTTPS

paulmillr opened this issue · comments

Big Sur allows to use encrypted DNS. This is very useful for privacy. See: https://paulmillr.com/posts/encrypted-dns/

Perhaps it would make sense to include some eDNS advice in the guide.

Alose note, there is a bug (or a feature ?! 😒) that disable DoH/DoT when using a firewall like Little Snitch.

commented

The DNS section could definitely use updates. If you're using DOH/DOT, please send a PR with your recommendation.

Here is a huge list of misc. DNS providers
https://kb.adguard.com/en/general/dns-providers

A simple solution is to use nextdns (link with my affiliate), it handles all, web interface to manage everything, white/Black list, logs (optional), all OS, via curl... free 300.000 requests/month
Works perfectly well, easy to white list, just check your log on the site.
I have tried a lot but the problem is always when you need something blocked, here it takes one copy/paste logs-> whitelist.
https://nextdns.io/fr?from=98ctfnjk

NextDNS with OISD filter list and Quad9 are best one - in that order. Cloudflare is a lot behind at malware protection and privacy is some kind of bad.

@beerisgood A lost of OISD are accessible in nextdns which is easy to handle.

Huge list of Blocking Lists:
https://oisd.nl/?p=inc

Discover this with my.nextdns.io log.

— Firefox 89 seems to bypass a VPN (zenmate bought by cyberghost) for DNS Requests (to my.nextdns.io on router) if set to No-proxy or Use-system-proxy. Zenmate (very fast btw in Belgium) uses Cloudflare 1111, before it was 8888 google.

In other words, it was still using my.nextdns.io instead of zenmate dns???

It is not an exhaustive test, neither all possibilities or with different vpn. perhaps just a GUI bug.

Relaunch FF after any change in Network Prefs!!!

if there is somebody monitoring your wifi/ethernet traffic (and you are not using a VPN/tor), they already know the IP address that you are connecting to.

Yes, your DNS may be encrypted, so they don't know initially what you are connecting to, but they will still know the end point you are connecting to.

In this case what is the point of using DOH?

@jotulaja1 that's incorrect. An attacker would only know an IP. IP is much less than domain name. Sometimes it can be like 20 domains hosted on one IP. Also IPs are rotated between servers, for example, on AWS.

Doh increases the complexity for eavesdropping. Not only they need to save the IPs to the db, they'll also need to do real-time dns scraping. That's complex and most dpi systems don't work like that.

Of course, tor/vpn is better for this regard.

commented

Someone on Big Sur who uses DOH, please send a PR with your recommendation.