Should cloaked domains also cloak HTTPS records? #2215
Replies: 3 comments 4 replies
-
Looks like code changes may be needed: dnscrypt-proxy/dnscrypt-proxy/plugin_cloak.go Line 140 in df3fb0c
I don't think Firefox uses HTTPS/SVCB queries yet. Chrome and Safari do. |
Beta Was this translation helpful? Give feedback.
-
Yeah, that makes sense. In fact, when cloaking, we should probably return an empty response for anything that's not |
Beta Was this translation helpful? Give feedback.
-
When DoH is enabled, firefox also performs the lookup for HTTPS record. IPs2606:4700::6810:84e5 HTTP RRs1 cloudflare.com (alpn="h3,h3-29,h2" ipv4hint="104.16.132.229, 104.16.133.229" ipv6hint="2606:4700::6810:84e5, 2606:4700::6810:85e5" ) |
Beta Was this translation helpful? Give feedback.
-
I've observed an interesting behaviour when using Google Chrome for cloaked domain names. I use cloaking rules for hardcoding names on my LAN. Whenever a page for a cloaked domain is visited, an additional query for an HTTPS record is triggered.
For example, this is one of the entries in
cloaking-rules.txt
:192.168.6.3
is a machine that exposes a server with Docker using the imageassemblyline/ok
. When the query logs are checked after visiting the page, the following entries are present:The resolver will always return
NXDOMAIN
since the domain does not exist.Is this an expected behaviour? According to the documentation (https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Cloaking), no queries are send to the DNS resolver. Should the same thing also happen to HTTPS records?
Interestingly enough, if one uses Firefox to visit the same page, it does not perform the lookup for the HTTPS record.
dnscrypt-proxy version: 2.1.2
Google Chrome version: 106.0.5249.103
Firefox version: 105.0.2
Beta Was this translation helpful? Give feedback.
All reactions