Disable DNS over HTTPS
2020-02-26 23:39
by zlg

Mozilla recently changed Firefox so that all United States users are using
technology called DNS-over-HTTPS[1], which stuffs your DNS queries into an
HTTPS request, which then spits back the IP to connect to. On its surface it's
supposed to be "more secure", but the default DoH provider is Cloudflare. [2]
This should be alarming to anyone who considers centralization a threat. The
effect of this is that all Firefox traffic will be routed through Cloudflare.

Cloudflare uses Google captchas and other analytics. Mozilla has also been
gathering "anonymous browsing data" through their Studies platform. [3] The only
reason to gather this data is to sell it. As such, I do not recommend using any
of Mozilla's products.

If you're intent on staying with Firefox, you can disable DoH:

1. Open 'about:config';
2. Search for 'network.trr.mode', and set it to 5. If it doesn't exist, create
  it, so when you update Firefox the key will already be made. See [4] for a
  description of the magic numbers used here.
3. Restart your browser.

Be sure to do this for *all* Firefox installations.

Who knows how long they'll allow it. At present I cannot recommend any HTTP
browsers. The whole protocol is a mess, as are the attempts to secure it.

If you've been paying attention, it's become harder and harder to run your own
website, because corporations and browser vendors (one and the same here) keep
changing the requirements to be considered "secure". This is a repeat of what's
happened to the e-mail protocol, and apparently we'll need to fuck up HTTP to
relearn that lesson.

We need to have a serious conversation about trust and networking. Large,
powerful organizations are trying to steer what the public does online and we're
expected to just trust them. What have they done to deserve our trust? We read
about leak after leak of data; data that wouldn't leak if it wasn't gathered in
the first place. And their answer is to trust yet another entity, that we
*don't* have legal agreements with, to our most personal browsing information.
That's a trap, folks.

None of this makes me trust the Web. It highlights how broken TCP/IP itself is.
We need a networking stack that puts security and privacy first, not as a
half-baked, cat's-out-of-the-bag "solution" through corporate partnerships and
continuously changing the requirements for Web authorship.

There are solutions out there to sandbox your browser: Firejail, a chroot,
whatever "universal packaging solution" is hip on Linux these days, or just a
regular ol' VM.

If you have to use all of these things dressed up to the nines to browse the
Web, then it's time to realize that HTTP(S) Is Harmful.

-z

[1]: https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/
[2]: https://wiki.mozilla.org/Trusted_Recursive_Resolver#network.trr.resolvers
    (check this key in your browser and it will say Cloudflare unless you've
     changed it.)
[3]: https://groups.google.com/forum/#!topic/mozilla.governance/81gMQeMEL0w
[4]: https://wiki.mozilla.org/Trusted_Recursive_Resolver#network.trr.mode