Hosts: Firefox DNS over HTTPS bypasses the local hosts file

Created on 5 Mar 2020  Â·  13Comments  Â·  Source: StevenBlack/hosts

Just leaving this here. Heads up!

Firefox' DNS over HTTPS feature is potentially really great.

One problem: this evidently bypasses the local hosts file. So if this is enabled, you get the full advertising/tracking browsing experience.

Anybody have any ideas?

2020-03-05_11-32-39

question wontfix ¯\_(ツ)¯

Most helpful comment

@StevenBlack DoH hijacks control of DNS away from network operators (like me) who use the DNS to block malicious content and protect small networks. A much saner option was DoT(rfc7858). DoH now raises the costs for everyone using DNS as a layer of defense. To summarise, the fantastic blocking lists that you folks curate and maintain will now need a solution at the OS packet layer to glue and make blocking work.

All 13 comments

@StevenBlack Add the following into your network configuration ? https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet

Thanks Nissar @funilrys. I'd like to nominate this mozilla support page for a prize, as the worst. Just awful.

Just putting this as a concern that needs to be still looked at, if the user manually enables DOH in Firefox, it bypasses everything (hosts file, recursive resolver configured in the OS) i.e the canary domain workaround doesn't work.

Yes Swapneel @swapneelp I agree. I don't understand why this feature works this way.

I understand the browser encrypts the DNS request. That has to happen somewhere, in a way that doesn't "leak" anything about the request.

Maybe this is the only way this could work. It just seems like, there must be a better way.

@StevenBlack DoH hijacks control of DNS away from network operators (like me) who use the DNS to block malicious content and protect small networks. A much saner option was DoT(rfc7858). DoH now raises the costs for everyone using DNS as a layer of defense. To summarise, the fantastic blocking lists that you folks curate and maintain will now need a solution at the OS packet layer to glue and make blocking work.

The best way to prevent users from enabling this option is described here: https://github.com/mozilla/policy-templates#dnsoverhttps

The best way to prevent users from enabling this option is described here: https://github.com/mozilla/policy-templates#dnsoverhttps

Agree.
Also except locking, disabling and ... they added ability to exclude domains from being resolved using DoH in FF75.

@StevenBlack isn't this the same as #968 which has more info and is older? 🙂

@XhmikosR same basic issue, yes. Chrome (#968) and Firefox here.

Why not just use uMatrix or uBlock origin? You can even host local files if you have something like xampp. Or for system wide use best is Acrylic DNS. Maybe YogaDNS too. I use uMatrix as hosts blocker and media type (scripts, images, videos, css) blocker in Chrome and Firefox. You can quickly include or exclude any blocked host or media type, without restarting anything.

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 14 days if no further activity occurs. Thank you for your contributions.

Closing.

Was this page helpful?
0 / 5 - 0 ratings

Related issues

mitchellkrogza picture mitchellkrogza  Â·  55Comments

mrjackyliang picture mrjackyliang  Â·  26Comments

ScriptTiger picture ScriptTiger  Â·  20Comments

ghost picture ghost  Â·  23Comments

dcramer picture dcramer  Â·  26Comments