mirror of
				https://github.com/privacyguides/privacyguides.org.git
				synced 2025-10-31 19:46:34 +00:00 
			
		
		
		
	dns: document enabling Firefox TRR (#1220)
* dns: document enabling Firefox TRR * browser-tweaks: rm/note that TRR/DoH/ESNI have moved * dns: fix formatting * browser-tweaks: fix embarassing typo * browser-tweaks & dns: apply @nitrohorse's suggestions (and fix link)
This commit is contained in:
		 Mikaela Suomalainen
					Mikaela Suomalainen
				
			
				
					committed by
					
						 GitHub
						GitHub
					
				
			
			
				
	
			
			
			 GitHub
						GitHub
					
				
			
						parent
						
							b28b103d4f
						
					
				
				
					commit
					229b205897
				
			| @@ -115,23 +115,8 @@ | |||||||
|   </ul> |   </ul> | ||||||
|   </dd> |   </dd> | ||||||
|  |  | ||||||
|   <dt>network.trr.mode = 2</dt> |   <dt>Looking for TRR, DoH or ESNI?</dt> | ||||||
|   <dd> |   <dd>They have moved to <a href="/providers/dns/#icanndns">our DNS page</a>.</dd> | ||||||
|   Use Trusted Recursive Resolver (DNS-over-HTTPS) first and if it fails, use the system resolver <a href="https://wiki.mozilla.org/Trusted_Recursive_Resolver">Source</a> |  | ||||||
|   <ul> |  | ||||||
|     <li>0 = disabled by default, may change in the future</li> |  | ||||||
|     <li>1 = use the faster resolver</li> |  | ||||||
|     <li>2 = use DoH first, fallback to system resolver</li> |  | ||||||
|     <li>3 = only use DoH. This may require <code>network.trr.bootstrapAddress</code> or using an IP address in <code>network.trr.uri</code>.</li> |  | ||||||
|     <li>5 = explicitly disable DoH</li> |  | ||||||
|   </ul> |  | ||||||
|   </dd> |  | ||||||
|  |  | ||||||
|   <dt>network.trr.uri = CHANGEME</dt> |  | ||||||
|   <dd>The address of your DNS-over-HTTPS provider, if you don't have one, <a href="/providers/dns/#icanndns">check our encrypted DNS recommendations</a>. It can also be changed in <em>Settings, Network Settings, Enable DNS over HTTPS, Use Provider, Custom</em>.</dd> |  | ||||||
|  |  | ||||||
|   <dt>network.security.esni.enabled = true</dt> |  | ||||||
|   <dd>Hide the address which you are requesting SSL certificate for if the server supports it. This <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1500289">requires DoH/TRR to be enabled</a> even <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1542754">on Android 9+ when Private DNS is enabled</a>.</dd> |  | ||||||
|  |  | ||||||
|   <dt>webgl.disabled = true</dt> |   <dt>webgl.disabled = true</dt> | ||||||
|   <dd>WebGL is a potential security risk. <a href="https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern">Source</a></dd> |   <dd>WebGL is a potential security risk. <a href="https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern">Source</a></dd> | ||||||
|   | |||||||
| @@ -307,6 +307,10 @@ github="https://github.com/jedisct1/dnscrypt-proxy" | |||||||
|     <li><strong>Encrypted DNS clients for desktop:</strong> |     <li><strong>Encrypted DNS clients for desktop:</strong> | ||||||
|       <ul> |       <ul> | ||||||
|         <li><em>Firefox</em> comes with built-in DoH support with Cloudflare set as the default resolver, but can be configured to use any DoH resolver. <span class="badge badge-warning" data-toggle="tooltip" data-placement="bottom" data-original-title='"Cloudflare has agreed to collect only a limited amount of data about the DNS requests that are sent to the Cloudflare Resolver for Firefox via the Firefox browser."'><a href="https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/"><i class="fas fa-exclamation-triangle"></i></a></span> Currently Mozilla is <a href="https://blog.mozilla.org/futurereleases/2019/07/31/dns-over-https-doh-update-detecting-managed-networks-and-user-choice/">conducting studies</a> before enabling DoH by default for all US-based Firefox users.</li> |         <li><em>Firefox</em> comes with built-in DoH support with Cloudflare set as the default resolver, but can be configured to use any DoH resolver. <span class="badge badge-warning" data-toggle="tooltip" data-placement="bottom" data-original-title='"Cloudflare has agreed to collect only a limited amount of data about the DNS requests that are sent to the Cloudflare Resolver for Firefox via the Firefox browser."'><a href="https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/"><i class="fas fa-exclamation-triangle"></i></a></span> Currently Mozilla is <a href="https://blog.mozilla.org/futurereleases/2019/07/31/dns-over-https-doh-update-detecting-managed-networks-and-user-choice/">conducting studies</a> before enabling DoH by default for all US-based Firefox users.</li> | ||||||
|  |             <ul> | ||||||
|  |                 <li>DNS over HTTPS can be enabled in Menu -> Preferences (<code>about:preferences</code>) -> Network Settings -> Enable DNS over HTTPS. Set "Use Provider" to "Custom," and enter your DoH provider's address.</li> | ||||||
|  |                 <li>Advanced users may enable it in <code>about:config</code> by setting <code>network.trr.custom_uri</code> and <code>network.trr.uri</code> as the address you find from the documentation of your DoH provider and <code>network.trr.mode</code> as <code>2</code>. It may also be desirable to set <code>network.esni.enabled</code> to <code>True</code> in order to enable encrypted SNI and make sites supporting ESNI a bit more difficult to track.</li> | ||||||
|  |             </ul> | ||||||
|       </ul> |       </ul> | ||||||
|     </li> |     </li> | ||||||
|     <li><strong>Encrypted DNS clients for mobile:</strong> |     <li><strong>Encrypted DNS clients for mobile:</strong> | ||||||
| @@ -330,6 +334,13 @@ github="https://github.com/jedisct1/dnscrypt-proxy" | |||||||
|     </li> |     </li> | ||||||
|     <li><strong>Further reading:</strong> |     <li><strong>Further reading:</strong> | ||||||
|       <ul> |       <ul> | ||||||
|  |         <li>On Firefox, DoH and ESNI</li> | ||||||
|  |             <ul> | ||||||
|  |                 <li><a href="https://wiki.mozilla.org/Trusted_Recursive_Resolver">Trusted Recursive Resolver (DoH) on MozillaWiki</a></li> | ||||||
|  |                 <li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1500289">Firefox bug report requesting the ability to use ESNI without DoH</a></li> | ||||||
|  |                 <li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1542754">Firefox bug report requesting the ability to use Android 9+'s Private DNS (DoT) and benefit from encrypted SNI without having to enable DoH</a></li> | ||||||
|  |                 <li><a href="https://blog.cloudflare.com/encrypted-sni/">Encrypt it or lose it: how encrypted SNI works on Cloudflare blog</a></li> | ||||||
|  |             </ul> | ||||||
|         <li><a href="https://www.isc.org/blogs/qname-minimization-and-privacy/">QNAME Minimization and Your Privacy</a> by the Internet Systems Consortium (ISC)</li> |         <li><a href="https://www.isc.org/blogs/qname-minimization-and-privacy/">QNAME Minimization and Your Privacy</a> by the Internet Systems Consortium (ISC)</li> | ||||||
|         <li><a href="https://www.isc.org/dnssec/">DNSSEC and BIND 9</a> by the ISC</li> |         <li><a href="https://www.isc.org/dnssec/">DNSSEC and BIND 9</a> by the ISC</li> | ||||||
|       </ul> |       </ul> | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user