Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"This only works for the subset of devices which use the local DNS. If they use any of the well-known techniques to avoid that filtering it's completely ineffective."

If you also block all port 53 after allowing your own resolver ... you may have some headaches with devices that refuse to use the DHCP provided resolvers but you know they aren't going to other resolvers.

That kind of control is what DoH breaks and I'd love to find an elegant (non-MITM proxy) solution for it ...



There isn’t an effective solution for a device which ignores local network policy other than returning it so the manufacturer pays the cost of designing a bad system.


With the side effect of your local vendor refusing to do further business with you, "the problem customer", with your "unreasonable demands" and technobable.


DNS over HTTPS has been a thing since before IETF standardized it, the technique was just in the form of a non-standardized API running on some benign domain.


I use iptables on an openwrt router to redirect all traffic on port 53 to my own DNS




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: