mirror of
				https://github.com/privacyguides/privacyguides.org.git
				synced 2025-10-31 03:26:35 +00:00 
			
		
		
		
	Should I use encrypted DNS update (#926)
Signed-off-by: Daniel Gray <dng@disroot.org>
This commit is contained in:
		| @@ -109,22 +109,7 @@ We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmis | |||||||
|  |  | ||||||
| ## Why **shouldn't** I use encrypted DNS? | ## Why **shouldn't** I use encrypted DNS? | ||||||
|  |  | ||||||
| In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](/threat-modeling/). We do **not** suggest the use of encrypted DNS for this purpose. Use [Tor](https://torproject.org) or a [VPN](/providers/vpn/) instead. If you're using a VPN, you should use your VPN's DNS servers. When using a VPN, you are already trusting them with all your network activity. We made this flow chart to describe when you *should* use "encrypted DNS": | In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](/threat-modeling/). We do **not** suggest the use of encrypted DNS for this purpose. Use [Tor](https://torproject.org) or a [VPN](/providers/vpn/) instead. If you're using a VPN, you should use your VPN's DNS servers. When using a VPN, you are already trusting them with all your network activity. | ||||||
|  |  | ||||||
| ``` mermaid |  | ||||||
| graph TB |  | ||||||
|     Start[Start] --> anonymous{Trying to be anonymous?} |  | ||||||
|     anonymous--> | Yes | tor(Use Tor) |  | ||||||
|     anonymous --> | No | censorship{Avoiding censorship?} |  | ||||||
|     censorship --> | Yes | vpnOrTor(Use VPN or Tor) |  | ||||||
|     censorship --> | No | privacy{Want privacy from ISP?} |  | ||||||
|     privacy --> | Yes | vpnOrTor |  | ||||||
|     privacy --> | No | obnoxious{ISP makes obnoxious redirects?} |  | ||||||
|     obnoxious --> | Yes | encryptedDNS(Use encrypted DNS with 3rd party) |  | ||||||
|     obnoxious --> | No | ispDNS{Does ISP support encrypted DNS?} |  | ||||||
|     ispDNS --> | Yes | useISP(Use encrypted DNS with ISP) |  | ||||||
|     ispDNS --> | No | nothing(Do nothing) |  | ||||||
| ``` |  | ||||||
|  |  | ||||||
| When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS: | When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS: | ||||||
|  |  | ||||||
| @@ -211,14 +196,13 @@ We can simulate what a browser would do using the [`openssl`](https://en.wikiped | |||||||
|     openssl x509 -noout -ocsp_uri -in /tmp/pg_server.cert |     openssl x509 -noout -ocsp_uri -in /tmp/pg_server.cert | ||||||
|     ``` |     ``` | ||||||
|  |  | ||||||
|  |     Our certificate shows the Lets Encrypt certificate responder. | ||||||
|     If we want to see all the details of the certificate we can use: |     If we want to see all the details of the certificate we can use: | ||||||
|  |  | ||||||
|     ```bash |     ```bash | ||||||
|     openssl x509 -text -noout -in /tmp/pg_server.cert |     openssl x509 -text -noout -in /tmp/pg_server.cert | ||||||
|     ``` |     ``` | ||||||
|  |  | ||||||
|    Our certificate shows the Lets Encrypt certificate responder. |  | ||||||
|  |  | ||||||
| 5. Start the packet capture: | 5. Start the packet capture: | ||||||
|  |  | ||||||
|     ```bash |     ```bash | ||||||
| @@ -274,7 +258,24 @@ If the network observer has the public certificate, which is publicly available, | |||||||
|  |  | ||||||
| ## Should I use encrypted DNS? | ## Should I use encrypted DNS? | ||||||
|  |  | ||||||
| You should only use DNS if your [threat model](/threat-modeling/) doesn't require you to hide any of your browsing activity. Encrypted DNS should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. | We made this flow chart to describe when you *should* use encrypted DNS: | ||||||
|  |  | ||||||
|  | ``` mermaid | ||||||
|  | graph TB | ||||||
|  |     Start[Start] --> anonymous{Trying to be<br> anonymous?} | ||||||
|  |     anonymous--> | Yes | tor(Use Tor) | ||||||
|  |     anonymous --> | No | censorship{Avoiding<br> censorship?} | ||||||
|  |     censorship --> | Yes | vpnOrTor(Use<br> VPN or Tor) | ||||||
|  |     censorship --> | No | privacy{Want privacy<br> from ISP?} | ||||||
|  |     privacy --> | Yes | vpnOrTor | ||||||
|  |     privacy --> | No | obnoxious{ISP makes<br> obnoxious<br> redirects?} | ||||||
|  |     obnoxious --> | Yes | encryptedDNS(Use<br> encrypted DNS<br> with 3rd party) | ||||||
|  |     obnoxious --> | No | ispDNS{Does ISP support<br> encrypted DNS?} | ||||||
|  |     ispDNS --> | Yes | useISP(Use<br> encrypted DNS<br> with ISP) | ||||||
|  |     ispDNS --> | No | nothing(Do nothing) | ||||||
|  | ``` | ||||||
|  |  | ||||||
|  | Encrypted DNS with a 3rd party should only be used to get around redirects and basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences or you're interested in a provider that does some rudimentary filtering. | ||||||
|  |  | ||||||
| [List of recommended DNS servers](../dns.md){ .md-button } | [List of recommended DNS servers](../dns.md){ .md-button } | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Razac-elda
					Razac-elda