Bcc: chromium-dev@
Hi all,
This is a heads up about our short term plans for DNS over HTTPS in Chrome (design doc).
DNS over HTTPS is, as the name implies, a protocol to perform Domain Name System resolution over HTTPS, i.e. converting a site name into an IP address over an encrypted channel.
Motivation
Most DNS resolution today occurs over an unencrypted channel. This is bad for privacy and for security reasons. Anyone who is on-path can eavesdrop on your browsing habits or even tamper with the resolution to have you navigate to a phishing website or an “access blocked” page for censored sites (see https://tools.ietf.org/html/rfc7626#section-3 for examples).
This is a complex space and our short term plans won’t necessarily solve or mitigate all these issues but are nevertheless steps in the right direction.
Tentative plan
For the first milestone, we are considering an auto-upgrade approach. At a high level, here is how this would work:
Chrome will have a small (i.e. non-exhaustive) table to map non-DoH DNS servers to their equivalent DoH DNS servers. Note: this table is not finalized yet.
Per this table, if the system’s recursive resolver is known to support DoH, Chrome will upgrade to the DoH version of that resolver. On some platforms, this may mean that where Chrome previously used the OS DNS resolution APIs, it now uses its own DNS implementation in order to implement DoH.
A group policy will be available so that Administrators can disable the feature as needed.
Ability to opt-out of the experiment via chrome://flags.
In other words, this would upgrade the protocol used for DNS resolution while keeping the user’s DNS provider unchanged. It’s also important to note that DNS over HTTPS does not preclude its operator from offering features such as family-safe filtering.
Tentative timeline
We are aiming for an experiment in Chrome 78 (branch cut: Sept 5th; estimated Stable: Oct 22nd) followed by a launch if everything goes well.
Best regards,
--
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CADWWn7U%3DnjSD9vJm5Ggpw4gGGdAGOJV5UZvxSpJEN%3DEJxWe8LA%40mail.gmail.com.
Upgrading from regular DNS servers to DoH seems like a great path forward, at least for initial experimentation!
I don't know if you intended for this to go through the intent process (pun not intended...). But, as far as I can tell, this is not web exposed (developers will not be aware of the underlying protocol that was used for DNS queries), so from my perspective no LGTMs are required here.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CACj%3DBEixWaRket29oBLhhVPGJEfSNh2OkXEC1OhcbT%2BPngRpEQ%40mail.gmail.com.
The problem with such an approach is that it's happening over an insecure channel (plain DNS) so the client can't really trust the response. Even if the insecure channel concern went away, a client has no way to know on its own if a given resolver is trustworthy. Hence, the need to inject a notion of trust, e.g. a list in the simplest form, which is really the expression of a belief (client's owners).
In short, I think it's an approach that ends up into the opportunistic security/privacy realm (https://tools.ietf.org/html/rfc7435). So, there could be some value but we won't be able to know for sure, making any sort of UX signalling impossible. And, I guess that we will have similar uncertainty with users who are running their own DNS resolver.