FF60+: TRR mode (DNS over HTTPS)
See original GitHub issueI have a feeling the discussion might get long winded, so I’m doing it in a new issue (instead of in #383 )
FF59-60 diffs
- [] pref(“network.trr.mode”, 0); 1434852
not to mention all of this
pref("network.trr.allow-rfc1918", false);
pref("network.trr.blacklist-duration", 259200);
pref("network.trr.bootstrapAddress", "");
pref("network.trr.confirmationNS", "example.com");
pref("network.trr.credentials", "");
pref("network.trr.early-AAAA", false);
pref("network.trr.request-timeout", 3000);
pref("network.trr.uri", "");
pref("network.trr.useGET", false);
pref("network.trr.wait-for-portal", true);
My gut feeling is I think I want to include it/them in the user.js (under section 0700) to let users know this is a bad idea (this is debatable)
What I think I know
- at this stage it’s not turned on by default (at least not in stable)… something something nightly something shield study mumble mumble was only discussed not implemented as a study blah mumble something
- it bypasses hosts
- its just moving the data collection from a small player (local ISP, yes some ISPs can be big players) to f$^%king cloudflare
- mozilla has agreements in place to preserve privacy (I assume) and the data is only kept for 24 hours, and its just the request not the IP it came from (I think) blah blah, not sure
- IDK what other settings are required to make it work besides the main one (hence I dumped the lot in that code snippet)
Just the fact it bypasses hosts and gives more power to cloudflare is reason enough for me to warn people away. BUT, it is an effective tool. BUT you could do the same with a VPN (to hide from your ISP). BUT not everyone can afford a VPN and too many VPNs are shady bastards
Class, discuss.
Issue Analytics
- State:
- Created 5 years ago
- Reactions:3
- Comments:22 (13 by maintainers)
Top Results From Across the Web
DNS over HTTPS (Trusted Recursive Resolver)
When enabled TRR may work in two modes, TRR-first (2) and TRR-only (3). These are controlled by the network.trr.mode or doh-rollout.mode prefs. The...
Read more >This once held TRR prefs. Now it has moved.
To use Mozilla's TRR you have to use https://mozilla.cloudflare-dns.com/dns-query - this activates Mozilla's strong privacy agreement on servers operated by ...
Read more >Is there a reason why the Arkenfox user.js doesn't enable ...
16 votes, 15 comments. Going through my settings after adding the user.js, I was surprised to see that "DNS over HTTPS" wasn't enabled....
Read more >Mozilla plans to roll out DNS over HTTPS to US users in ...
trr.mode is currently set to “0”, which is identified as “default”… on the other hand, in my Mac's Network (system-level) preferences, my DNS...
Read more >Mozilla Firefox and a bit better Privacy - TRR - DNS Over ...
Firefox Nightly users may want to monitor the preference network.trr.mode for changes. Users may set the preference to 0 to disable TRR and...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
hows this for the extra line, sandwiched into earthlng’s draft? (note: will add DoH acronym to first line)
I think that covers it. “another party” seems a good fit, since your ISP (or VPN) will see the website requested anyway (and I got in the evil name of cloudflare)
nits?
For what it’s worth, I’m against ignoring this. I’m all for informing users, or at least giving them (us) hints, of all the known questionable aspects of existing privacy-protecting features/practices.
As an user, I find the ghacks user.js valuable not only as a tool in the practical sense, but also as a well-organised and up-to-date source of information (even if most of it comes in the form of links).