搜索 | 用户支持

防范以用户支持为名的诈骗。我们绝对不会要求您拨打电话或发送短信,及提供任何个人信息。请使用“举报滥用”选项报告涉及违规的行为。

详细了解

DNS over https not working properly

  • 4 个回答
  • 1 人有此问题
  • 4 次查看
  • 最后回复者为 Andrew P

more options

My UK ISP has a 'Site Safe' feature that is set at the ISP end, to block malicious websites. When I

enable this setting, and specifically enable DoH under Options, a DNS leak test shows that my ISP is my DNS provider. disable this setting, and specifically enable DoH under Options, a DNS leak test shows that Cloudflare is my DNS provider.

Shouldn't DoH work all the time, if I specifically enable DoH under Options? Otherwise bad actor sites could do the same thing as my ISP, and I would think I'm protected, but in reality, I'm not and exposing my DNS traffic?

My UK ISP has a 'Site Safe' feature that is set at the ISP end, to block malicious websites. When I enable this setting, and specifically enable DoH under Options, a DNS leak test shows that my ISP is my DNS provider. disable this setting, and specifically enable DoH under Options, a DNS leak test shows that Cloudflare is my DNS provider. Shouldn't DoH work all the time, if I specifically enable DoH under Options? Otherwise bad actor sites could do the same thing as my ISP, and I would think I'm protected, but in reality, I'm not and exposing my DNS traffic?

所有回复 (4)

more options

You can enable or disable DoH in your Firefox connection settings:

  *Click the menu button Fx57Menu and select Options.
  *In the General panel, scroll down to Network Settings and click the Settings… button.
  *In the dialog box that opens, scroll down to Enable DNS over HTTPS.
       On: Select the Enable DNS over HTTPS checkbox. Select a provider or set up a custom provider.
       Off: Deselect the Enable DNS over HTTPS checkbox. 
  *Click OK to save your changes and close the window.
more options

This is not what I'm asking. Feel free to re-read the original.

more options

Andrew P said

My UK ISP has a 'Site Safe' feature that is set at the ISP end, to block malicious websites. Shouldn't DoH work all the time, if I specifically enable DoH under Options? Otherwise bad actor sites could do the same thing as my ISP, and I would think I'm protected, but in reality, I'm not and exposing my DNS traffic?

In my private opinion, you're right. But DoH is breaking this 'Site Safe' feature, all UK ISPs have named Mozilla the Villain Of The Year (you know, our children are no longer safe), so Moz has decided to change the way it works.

For domains that are excluded from TRR or when parental control is enabled, we fallback to NativeLookup. This happens even in MODE_TRRONLY. By default localhost and local are excluded (so we cover *.local hosts).

To change it back, go to about:config and set network.dns.skipTRR-when-parental-control-enabled = false. See also the network.trr.excluded-domains pref.

See:

more options

Thanks for your reply. Very helpful.

I did try to set the value to 'false' and it didn't work (DNS still shows resolver is set to ISP's resolver) but I'm guessing this setting only refers to Mozilla's implementation of parental controls (about:safe)?

I didn't change any other value and for ref: network.trr.mode showed as 2.

As such, it would be useful to have some sort to indicator on the UI, so that if DoH is set by the user, a graphic shows whether a users DNS traffic is being directed properly.