Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Google of course wants people to continue to use their DNS resolvers. So it is in their interest to focus only on techniques to improve access to their resolvers.

One thing that happened in recent years is that a very nice library called 'getdns' has been developed. Getdns does local DNSSEC validation but also contains various ways of accessing DNS servers and resolvers ("Roadblock Avoidance")

I use getdns in ssh for SSHFP, to obtain SSH key fingerprints from DNS. If DNSSEC doesn't work then SSH fails (or complains about an insecure connection). So far my experience is that is works.

The problem with DNSSEC local validation is that it doesn't protect your privacy.

So there are two techniques under development to address that. One is to run DNS directly over TLS. The second is to run DNS over HTTPS.

Running DNS over TLS has to advantage that the semantics are clear (just DNS over TCP but then encrypted) but the downside that the port may be blocked.

DNS over HTTPS is unlikely to get blocked, but there are too many ways to transmit DNS over HTTPS, so it may take some time for that to get sorted out.

Of course, moving DNS from a lightweight UDP exchange to TLS or HTTPS requires quite a bit more resources on the server side.

So, local DNSSEC validation works. It is just matter of turning it on. Server side, if the admins are behind a DNSSEC validating resolver then they quickly figure how to avoid breaking it.

When it comes to privacy, if you send all your DNS queries to Google, who else do you care about who might be watching your DNS traffic?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: