Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Thursday October 26 2017, @04:28AM   Printer-friendly
from the DNS=Do-Not-Share dept.

Submitted via IRC for SoyGuest31999

Android, the world's most popular mobile operating system, will soon enable a security protocol that helps keep internet service providers (ISPs) from spying on users. "DNS over TLS" adds a level of encryption to your DNS requests that are (mostly) inaccessible by your ISP.

[...] Using current methods, the requests happen through UDP or TCP protocols, not the more secure TLS. When Android makes the switch, you'll get the same results, only now with HTTPS-level security. That is to say, snoops now know when you've connected to a website, but not which one. Pornhub, for example, is the same as Gmail. Or, it is for the person spying on you. You'll still have to live with the fact you're watching Pokemon Go porn (safe-ish for work).

Source: https://thenextweb.com/mobile/2017/10/23/android-to-add-dns-over-tls-to-keep-isps-from-spying-on-you/


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 4, Insightful) by Anonymous Coward on Thursday October 26 2017, @04:38AM (12 children)

    by Anonymous Coward on Thursday October 26 2017, @04:38AM (#587700)

    They've picked a method that prevents ISP-spying but requires Google-spying.

    • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @05:31AM (3 children)

      by Anonymous Coward on Thursday October 26 2017, @05:31AM (#587710)

      And Google will sell that information back to the ISP. They are frustrated that the ISP and not they control that aspect.

      Better secrecy could be had by running a local DNS server on the phone.

      • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @06:09AM (2 children)

        by Anonymous Coward on Thursday October 26 2017, @06:09AM (#587718)

        A local resolver on the phone would merely recurse to the root servers, and the traffic would not be any more obfuscated than simply using a public DNS server.

        • (Score: 2) by isostatic on Thursday October 26 2017, @01:16PM

          by isostatic (365) on Thursday October 26 2017, @01:16PM (#587785) Journal

          Better to run DNS over a VPN tunnel to a trusted end point. Or simply run all traffic over that VPN.

        • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @05:23PM

          by Anonymous Coward on Thursday October 26 2017, @05:23PM (#587889)

          But it would prevent Google from seeing the queries, and ISPs may be more cautious about editing the data in flight.

    • (Score: 5, Informative) by KiloByte on Thursday October 26 2017, @06:01AM (5 children)

      by KiloByte (375) on Thursday October 26 2017, @06:01AM (#587716)

      Nope, this method doesn't affect ISP-spying nearly at all. Even if you obtain the IP address, what will you do next? Connect to it!

      This can be done via a plain text protocol, a point-to-point encrypted protocol, a non-SSL tunnel, or, usually nowadays, over SSL. Plain text is obviously spy-able, most custom protocols either connect directly to the target system (ssh) or provide a VPN (which wasn't spyable (beside traffic timing) in the first place). This leaves SSL which covers the vast majority of uses these days (https and others).

      SSL may or may not use SNI. Without SNI, it's a point-to-point protocol like ssh thus knowing the target IP already gives you the metadata. So here we have SNI. Which is negotiated over plain text.

      Ie, for any non-fringe real-world usage, there's no benefit from this new protocol at all. So why implement it? Because it informs Google of every single TCP/IP connection you make, information they wouldn't otherwise have.

      --
      Ceterum censeo systemd esse delendam.
      • (Score: 1, Interesting) by Anonymous Coward on Thursday October 26 2017, @07:35AM

        by Anonymous Coward on Thursday October 26 2017, @07:35AM (#587736)

        Ding. This guy knows his stuff.

        So, unless you're using a VPN, your ISP can track you just as well as they can today - and a VPN will also prevent them from tracking you without needing to use DNS over TLS.

        The only thing this adds is thus that the owner of the TLS DNS server can track you as well. Which just happens to be... Google... because who else would waste time to set up a DNS server with a protocol that doesn't offer any improvements, and is only used by Google products anyway.

      • (Score: 2, Disagree) by c0lo on Thursday October 26 2017, @10:33AM (3 children)

        by c0lo (156) Subscriber Badge on Thursday October 26 2017, @10:33AM (#587750) Journal

        Nope, this method doesn't affect ISP-spying nearly at all. Even if you obtain the IP address, what will you do next? Connect to it!

        Not quite the same in all cases.
        E.g. many web sites share the same IP address, but if you can't see the content of the payload, you'll never know with of the sites was contacted.

        --
        https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
        • (Score: 3, Informative) by KiloByte on Thursday October 26 2017, @11:59AM (2 children)

          by KiloByte (375) on Thursday October 26 2017, @11:59AM (#587769)

          Not quite the same in all cases.
          E.g. many web sites share the same IP address, but if you can't see the content of the payload, you'll never know with of the sites was contacted.

          Which is exactly the main case I'm talking about! The way SSL is implemented, target hostname is sent in open.

          Just run tcpdump and connect to a https site, to see it yourself.

          --
          Ceterum censeo systemd esse delendam.
          • (Score: 2) by c0lo on Thursday October 26 2017, @12:12PM

            by c0lo (156) Subscriber Badge on Thursday October 26 2017, @12:12PM (#587773) Journal

            Ah, yes, right.

            --
            https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
          • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @04:29PM

            by Anonymous Coward on Thursday October 26 2017, @04:29PM (#587869)

            One of the suggested improvements for TLS 1.3 was to also encrypt the SNI portion of the exchange or at least hash. Based on the last time I checked, that was ultimately rejected because most of the suggested techniques (not all) required increasing the number of packets exchanged. Of course, the techniques that didn't were rejected as "unfeasible" because there is no possible way for all servers to know the domain names or SLDs that they will be serving in advance, or because it would require reordering some packets, or because exchanging a hashed+salted SLD isn't secure due to bruting concerns or CDN certs with 100 SANs, etc.

    • (Score: 2) by maxwell demon on Thursday October 26 2017, @06:10AM (1 child)

      by maxwell demon (1608) on Thursday October 26 2017, @06:10AM (#587720) Journal

      They've picked a method that prevents ISP-spying but requires Google-spying.

      Source? Because the TFA indicates the opposite:

      It’s not fool-proof. ISPs can, for example, see your browsing history if your DNS doesn’t support TLS.

      So unless you have indication that Google is the only DNS provider supporting TLS, there's absolutely no evidence that you are restricted to Google DNS by this.

      Of course it could be that Android devices only ever send their queries to Google DNS servers (it's something I could imagine Google to do), but then, this TLS support doesn't change anything about it: Google gets your information with or without TLS.

      --
      The Tao of math: The numbers you can count are not the real numbers.
      • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @05:19PM

        by Anonymous Coward on Thursday October 26 2017, @05:19PM (#587886)

        Apparently DNS over TLD is not a google only thing, with http://dnsprivacy.org/ [dnsprivacy.org] as the most visible center. They have a page with publicly accessible test servers, at https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers [dnsprivacy.org] though they are only test servers. But it looks good for not tying you to google's DNS in theory (the implementation in android ...)

  • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @04:42AM (8 children)

    by Anonymous Coward on Thursday October 26 2017, @04:42AM (#587702)

    Encrypting DNS query doesn't hide you from your ISP. And chances are, you are using the ISP's DNS servers.

    SN editors should know better.

    • (Score: 5, Insightful) by coolgopher on Thursday October 26 2017, @04:48AM (2 children)

      by coolgopher (1157) on Thursday October 26 2017, @04:48AM (#587706)

      In the grand tradition of not RTFA'ing before I comment:

      No, you'd only hit the ISP's DNS server with the request for the VPN endpoint, if that. After that, all your DNS would happily be encrypted all the way to 8.8.8.8 or 8.8.4.4 so the ISP can't spy on you, and Google gets credit for preventing the ISP from doing so, all the while seeing eeeeeverything you do.

      Great feature.

      Hopefully the VPN and remote DNS would be configurable, but I would not be surprised if they aren't.

      • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @05:05AM (1 child)

        by Anonymous Coward on Thursday October 26 2017, @05:05AM (#587708)

        If you are already using VPN, additional encryption would be even more pointless. It's simply replacing ISP with VPN provider for snooper.

        • (Score: 1, Insightful) by Anonymous Coward on Thursday October 26 2017, @07:17AM

          by Anonymous Coward on Thursday October 26 2017, @07:17AM (#587733)

          Then pick a better VPN provider. Your choice of ISP is more limited and they have shown themselves to be more likely to snoop.

    • (Score: 2, Troll) by aristarchus on Thursday October 26 2017, @05:36AM

      by aristarchus (2645) on Thursday October 26 2017, @05:36AM (#587712) Journal

      SN editors should know better.

      Except, they don't. We have one that is a self-confessed Windows user! Ewww! And they seem to listen to the janitorial staff, namely The Mightly Buzzard, because he seems to know some coding more better than they do. Oh, Lordy! Will SoylentNews survive this Fine Article?

      [Pro-tip:

      Pornhub, for example, is the same as Gmail.

      Pornhub has always been the same a Gmail. And Google knows this? Your point being? OK, more of a "pro-question."]

    • (Score: 2) by MichaelDavidCrawford on Thursday October 26 2017, @06:09AM (3 children)

      by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Thursday October 26 2017, @06:09AM (#587719) Homepage Journal

      4.2.2.4
      8.8.8.8

      I plan to set up my own DNS cache so I won't need to send so many queries.

      --
      Yes I Have No Bananas. [gofundme.com]
      • (Score: 1, Funny) by Anonymous Coward on Thursday October 26 2017, @06:34AM (1 child)

        by Anonymous Coward on Thursday October 26 2017, @06:34AM (#587727)

        Level 3 and Google impose onerous rate limits on their public DNS.

        In contrast, Sprint demonstrates dedication to providing consistent query execution time.

        The Cache Only servers can be used by customer host machines to perform general DNS. You can put the IP addresses in the client machines on your network if you do not have your own Internet nameserver. These servers are replicated around the world and your connection will be taken to the closest server.

        CACHE-ONLY SERVERS - IPv4
        NS1.SPRINTLINK.NET 204.117.214.10 USA, Europe, Asia
        NS2.SPRINTLINK.NET 199.2.252.10 USA, Europe, Asia

        CACHE-ONLY SERVERS - IPv6
        NS1.SPRINTLINK.NET 2600::1 USA, Europe, Asia
        NS2.SPRINTLINK.NET 2600::2 USA, Europe, Asia

        • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @04:46PM

          by Anonymous Coward on Thursday October 26 2017, @04:46PM (#587874)

          I don't get how this is "Funny" at all.

          From where I sit, 8.8.8.8 is throttled to about 25 answers per second.

          About the only advantage 8.8.8.8 has is a memorable IP address which is only useful to lookup the IP address of a better DNS server.

          In fact I would say 4.2.2.4 is pretty much the same deal except 4.2.2.4 is still popular among old people.

          NS3.SPRINTLINK.NET is also a thing.

      • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @07:54PM

        by Anonymous Coward on Thursday October 26 2017, @07:54PM (#587971)

        i tell everyone not to use 8.8.8.8 considering its uh Evil and all that

        i even block it at the edge. 8.8.4.4, too. if you dont want to be spied on like that, don't just send it willingly to google. cmon

  • (Score: 3, Interesting) by MichaelDavidCrawford on Thursday October 26 2017, @06:07AM (1 child)

    by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Thursday October 26 2017, @06:07AM (#587717) Homepage Journal

    Safari once had a really useful Activity window that displayed the size of each resource that went into each web page.

    It's not hard to figure out that 43 bytes must be the size of a single-pixel gif. Ah I've been so neglectful as of late:

    127.0.0.1 hosted-pixel.com. # I Am Absolutely Serious

    There are dozens of analytics "services". Most of them are free of charge for web developers to use in their sites. I once saw a photo of the data center that was used by a mobile analytics vendor.

    Data centers cost a great deal of money. Someone had to be paying for all those violations of my privacy.

    I'm completely cool with advertising. But to know I'm being tracked sometimes makes me floridly paranoid. When that happens my only defense is to stop the tracking. That once resulted in my building a hosts file with hundreds of entries.

    The very worst are political campaign websites. Sometimes they use a dozen or more different analytics services - quite likely some are the kind that charge money.

    Today I read in the news that the Trump campaign made extensive use of a particular analytics service. Someone from that service dropped a dime to Julian Assange and tried to convince him to boost some Democratic Party email. Assange did the right thing: he refused.

    While Wikileaks is heavily into leaking, I expect they don't do so for the specific benefit of any particular person or organization.

    --
    Yes I Have No Bananas. [gofundme.com]
    • (Score: 2) by Freeman on Thursday October 26 2017, @05:29PM

      by Freeman (732) on Thursday October 26 2017, @05:29PM (#587895) Journal

      NoScript, Flashblock, and uBlock the anti-ad trifecta.

      --
      Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
  • (Score: 3, Interesting) by MichaelDavidCrawford on Thursday October 26 2017, @06:11AM (7 children)

    by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Thursday October 26 2017, @06:11AM (#587721) Homepage Journal

    I've been visiting a lot of corporate sites while building http://soggy.jobs/computer [soggy.jobs]

    The reason I'm now host-binning web bugs again is that within hours of my visits, Facebook shows me advertisements for those exact same companies.

    I thought I was protecting myself by not listing my favorite books or movies, but now I'm profiled as some guy who spends a lot of time and energy looking for a coding job.

    --
    Yes I Have No Bananas. [gofundme.com]
    • (Score: 3, Touché) by takyon on Thursday October 26 2017, @06:13AM (6 children)

      by takyon (881) <takyonNO@SPAMsoylentnews.org> on Thursday October 26 2017, @06:13AM (#587722) Journal

      but now I'm profiled as some guy who spends a lot of time and energy looking for a coding job.

      Oh God, that's horrible. I hope no recruiters catch wind of this.

      --
      [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
      • (Score: -1, Troll) by Anonymous Coward on Thursday October 26 2017, @06:22AM (1 child)

        by Anonymous Coward on Thursday October 26 2017, @06:22AM (#587725)

        I know, right? Recruiters are the best. Always calling every day to offer you money for jobs that do not even exist because managers neglected to budget for headcount when posting fake jobs. You might even make it to a fake interview. You sure as shit will not get a fucking job. But those recruiters, man, they tell you the job market is great right now so submit your right to represent form right away.

        There is no spoon.

        There are no jobs.

        Fuck MDC.

      • (Score: 3, Interesting) by MichaelDavidCrawford on Thursday October 26 2017, @06:22AM (3 children)

        by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Thursday October 26 2017, @06:22AM (#587726) Homepage Journal

        If the position isn't in the region that the C-TRAN and TriMet public transport serves, I mark them as spam.

        This turned out to work remarkable well. I do still receive some inquiries, which now are mostly located in places I can get to on the bus and light rail.

        --
        Yes I Have No Bananas. [gofundme.com]
        • (Score: 1, Funny) by Anonymous Coward on Thursday October 26 2017, @06:49AM (2 children)

          by Anonymous Coward on Thursday October 26 2017, @06:49AM (#587729)

          Perfect! Now fix the problem of jobs being posted "in" the location from which candidates are sought instead of where the job actually is. Also fix the problem of "no travel required, no relocation required" but "by the way the company has an office halfway across the country and you will be expected to fly there on demand."

          I await your genius solution to blatant dishonesty.

          • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @10:56AM

            by Anonymous Coward on Thursday October 26 2017, @10:56AM (#587754)

            I await your genius solution to blatant dishonesty.

            Get them a piece of twine and ask them to bind it to that office halfway across the country, then drag it closer. That will teach them, the bastards.

          • (Score: 2) by MichaelDavidCrawford on Friday October 27 2017, @05:08AM

            by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Friday October 27 2017, @05:08AM (#588124) Homepage Journal

            The links are woefully out of date but the text explains my thinking.

            tl;dr: I expect The Global Computer Employer index to render all the recruiters unemployable. I first publish the SC page in 1997. There are far fewer recruiters in Santa Cruz County than there were back then. I expect that I have some responsibility for that, but it's not easy to know for certain.

            http://soggy.jobs/computer/united-states/california/santa-cruz/ [soggy.jobs]

            --
            Yes I Have No Bananas. [gofundme.com]
  • (Score: 5, Insightful) by darkfeline on Thursday October 26 2017, @07:34AM (4 children)

    by darkfeline (1030) on Thursday October 26 2017, @07:34AM (#587735) Homepage

    Can we forget privacy for a moment?

    The real win here is security, not privacy. DNS by default is completely insecure. Plaintext UDP packets. Anyone can MITM your DNS queries.

    There's stuff like DNSSEC, but a simple hack like DNS over TLS is the kind of thing DNS needs to gain wide adoption of basic security features in the current decade.

    Here's the RFC: https://tools.ietf.org/html/rfc7858 [ietf.org]

    I haven't read it yet, but it will probably be a lot more useful than TFA.

    --
    Join the SDF Public Access UNIX System today!
    • (Score: 3, Informative) by TheRaven on Thursday October 26 2017, @10:06AM (3 children)

      by TheRaven (270) on Thursday October 26 2017, @10:06AM (#587746) Journal
      DNSSEC protects you against MITM, but I'm unsure how this is expected to. TLS protects a channel in two ways. It provides encryption, which protects you against passive snooping, but not active tampering. It also provides an out-of-band mechanism associating a host name with a connection, protecting you against active MITM, but that requires DNS to be working first. How do you bootstrap it for DNS? Scanning the RFC, it appears that there are two proposals: don't bother, or rely on some unspecified out-of-band mechanism to deliver the certificate. With the opportunistic profile, this gives you placebo security at best: MITM is trivial, and unless you have DNSSEC as well then you have no idea if the DNS resolver that you're talking to is tampering with the DNS results.
      --
      sudo mod me up
      • (Score: 2) by tibman on Thursday October 26 2017, @02:43PM (1 child)

        by tibman (134) Subscriber Badge on Thursday October 26 2017, @02:43PM (#587829)

        Out of band cert delivery most likely. Just like how it's done in your web browser today. You get certs for cert signing authorities when you install.

        --
        SN won't survive on lurkers alone. Write comments.
        • (Score: 2) by TheRaven on Thursday October 26 2017, @03:21PM

          by TheRaven (270) on Thursday October 26 2017, @03:21PM (#587839) Journal
          Web browsers contain signing certs. This is a small number[1] of certs in comparison to the number of signing certs. In contrast, the number of DNS caches that you might connect to is large and, worse, for a lot of users they're not on publicly routable IPs so you can't distribute sensible certs for them. If you're on a consumer WiFi network, the odds are that your device talks to a DNS cache that is on the 192.168/16 subnet, which then talks to an ISP-run DNS cache (which may not be on a public IP for the customer-facing side).

          You could potentially provide the cert in the DHCP response (though there's no standard for this yet), which at least means that you'd need to spoof DHCP, but that's not actually hard...

          [1] Okay, it's a large number (and a much larger number than I'm entirely comfortable with) of certs.

          --
          sudo mod me up
      • (Score: 2) by darkfeline on Thursday October 26 2017, @05:24PM

        by darkfeline (1030) on Thursday October 26 2017, @05:24PM (#587891) Homepage

        Presumably the DNS server you're using is trusted, and you have the trusted cert for that server.

        That doesn't provide end-to-end security, but let's say your trusted DNS server itself has trusted certs for other servers, and those servers have trusted certs.

        Again, it's a hack compared to DNSSEC, but it's the kind of hack that I can see getting rolled out and adopted much faster than DNSSEC has. It would be a huge improvement over the current state of affairs.

        --
        Join the SDF Public Access UNIX System today!
  • (Score: 0) by Anonymous Coward on Thursday October 26 2017, @02:05PM

    by Anonymous Coward on Thursday October 26 2017, @02:05PM (#587803)

    Perhaps this pervasive snooping on the Intertubes will spawn a resurgence in the popularity of the great British nudey book.

(1)