-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement support for Oblivious DNS #116
Comments
Seems to work, didn't do extensive research/testing, and seems to be a tad slower then straight DoH to Cloudflare. Seems to retry a lot as well (not persistent?). But could be something external. Do see differences where queries comes phone between DOH and ODOH, you can test using this: Which would be in line of expected behaviour. |
What sort of retries are you seeing? It has to reload the target key every few minutes as they expire but that should be it. So far I haven't found a public (non-cloudflare) proxy to test with. |
Seems to work as expected, I recompiled everything from scratch and the retries are gone. I actually suspect something with my firewall wrong as I had some other issues as well (reboot fixed it, I think a state-table/memory problems was the cause, nothing related to RouteDNS). |
I was just trying the ODoH feature as well, but ran into a problem that I get no matter what the error My config looks like this.
I have tried other proxies as well, but error is always the same. ODoH works in general if I test for example via https://github.com/cloudflare/odoh-client-go All my steps are the following.
Full error after sending a query.
|
@mschirrmeister The issue seems to be that Anyway, you can see the issue with this.
It's asking odoh1.surfdomeinen.nl to get the public key for odoh.cloudflare-dns.com and not getting a response. Compare that to this which does get a key
|
Seems to be broken for a while, see here: cloudflare/odoh-client-go#16 (comment) |
@folbricht It is not my server. I did also try with your default config |
Oh right, the response from Cloudflare is missing the key, so it's broken upstream. Hmm, not sure I can do much. Options would be to find some other ODOH provider, or I could allow configuring the target key in the client config, not relying on getting the key via DNS. |
I did not find any other odoh server/proxy so far. Instead or in addition to specifying the key, maybe you could implement to pull the config like in the issue that @cbuijs mentioned? Http request to It seems |
The " |
I could add that, but it effectively defeats ODOH since the client would have to connect to the target directly. That allows the target to identify the target basically. It would have to be done by the proxy, but that's quite clunky. The proxy would have to receive a DNS query from the client, and convert it into an HTTPS call. The best solution would be for cloudflare to fix the target. |
Yeah makes sense. I guess in terms of identifying the target would at least know that this client is going to use the target, but will of course not be able to see actual future dns requests. |
In theory, a malicious target could hand out custom keys and map queries to source IPs that way. Not likely in this case, but getting the key via DNS is really the best way. |
Ok, understood. |
If you compare the output to the dig example in https://blog.cloudflare.com/oblivious-dns/, it's shorter now, the 4th long block is missing. |
I see. I did not compare the length. |
@folbricht I did reach out the Cloudflare team and I received the answer that they dropped support for TYPE65 and instead it should be fetched via the I guess there is a good reason for this and I assume future rfc drafts will be updated, if the design is indeed going into that direction. |
Seems ODOH has a bit more momentum nowadays. And the usage of HTTPS key/records returned and everyone is in consensus about it's usage (RFC as well). Looks like the usage of Issue: Tried to make it work merging #116 with the current version of RouteDNS and seems to be broken all over the place. Cannot get it working. Same errors as mentioned above by @mschirrmeister. Feature-Request: How about a ODOH Some relays: Some targets: |
Seems like it may be time to rebase the branch and bring it back to life. I can certainly try that. Thanks for the list of targets, that'll be useful for testing. |
The branch has been rebased on the latest master, but not actually tested it yet. I'll be travelling for a bit so can't implement the server-side of this for a little longer. |
As per https://tools.ietf.org/html/draft-pauly-dprive-oblivious-doh-03 and https://blog.cloudflare.com/oblivious-dns/
The text was updated successfully, but these errors were encountered: