Internet group brands Mozilla ‘internet villain’ for supporting DNS privacy feature

'An industry group of internet service providers has branded Firefox browser maker Mozilla an “internet villain” for supporting a DNS security standard. The U.K.’s Internet Services Providers’ Association (ISPA), the trade group for U.K. internet service providers, nominated the browser maker for its proposed effort to roll out the security feature, which they say will allow users to “bypass UK filtering obligations and parental controls, undermining internet safety standards in the UK.” Mozilla said late last year it was planning to test DNS-over-HTTPS to a small number of users.' -- source: https://techcrunch.com/2019/07/05/isp-group-mozilla-internet-villain-dns-pri... Cheers, Peter -- Peter Reutemann Dept. of Computer Science University of Waikato, NZ +64 (7) 858-5174 http://www.cms.waikato.ac.nz/~fracpete/ http://www.data-mining.co.nz/

On Sat, 6 Jul 2019 09:55:53 +1200, Peter Reutemann quoted:
'An industry group of internet service providers has branded Firefox browser maker Mozilla an “internet villain” for supporting a DNS security standard.'
Reading the user comments on this <https://www.theregister.co.uk/2019/07/06/mozilla_ukisp_vallain/>, I found a link to this <https://www.cloudflare.com/ssl/encrypted-sni/> interesting browser-security checker. You may be familiar with “virtual hosting”, where a bunch of different websites get to share the same public IP address (because the number of public websites long ago exceeded the number of available IPv4 addresses, at any rate). When the browser connects to the server, it sends a “Server Name Indication” (“SNI”, actually just a “Host:” HTTP header line) to indicate what website it is expecting to connect to. This line is sent unencrypted, even when connecting to an https:// URL, because you cannot negotiate a secure connection until you have contacted the actual site in question, since the encryption key comes from the certificate, which is tied to the domain name. The solution to this is called “Encrypted SNI” <https://blog.cloudflare.com/encrypted-sni/>, where an initial encryption key is published via the secure DNS, so it can be used right from the start of the TLS handshake. This way, no eavesdropper can tell what host name you are trying to connect to.

On Sat, 6 Jul 2019 09:55:53 +1200, Peter Reutemann quoted:
'An industry group of internet service providers has branded Firefox browser maker Mozilla an “internet villain” for supporting a DNS security standard.'
Cue furious backpedalling over the resultant furore, and attempts to claim it was really all a joke <https://www.theregister.co.uk/2019/07/10/ispa_clears_mozilla/>.
participants (2)
-
Lawrence D'Oliveiro
-
Peter Reutemann