-
Notifications
You must be signed in to change notification settings - Fork 325
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS leak when browser is set to use DoH or a proxy #900
Comments
@Snawoot Thank you for filing this - confirming that it’s been received and seen. |
Thank you @Snawoot for the very thorough and clear report. Clarification: go-ipfs leaks, not CompanionWhen go-ipfs opens Just to be very clear, the "DNS leak" happens when:
It is a problem for mentioned setups, but for regular user with a browser that uses DNS resolver provided by the operating system there is no decrease of privacy (browser already does DNS leak for every visited website anyway). That being said, browser vendors start to experiment with enabling DoH, and when that is enabled, we would indeed decrease privacy for default setups, which is a significant concern. Why
|
I agree S1 is preferable. Apart from S2 downsides, there are additional reasons why it's better to have some sort of secure DNS precisely in go-ipfs:
|
Snawoot wrote:
Sorry for the off-topic. Correct me when I'm wrong, but: We also need a secure DNS to have a trusted anchor to mitigate any MITM-Attacks. Since signature verification on DNS queries is basically still in its infancy and only very few domain providers actually support DNSSEC anyway. If we use plain text DNS requests and don't do any signature verification OR the domain has no DNSSEC information stored, we don't have any security for the content similar to a page that gets loaded over HTTP. It would be nice if we could do at least secure DNS requests for any DNSLink request until DNSSEC validation is more feasible. I added a ticket for DNSSEC validations of DNSLinks: #970 |
grooming meeting notes: @SgtPooki to look at this and ensure labels/priority/etc are accurate. |
I've tried to reach authors via email provided in security policy for such reports, but I haven't received any response after two attempts. First attempts was made on 12 of June.
Description
Once enabled, IPFS Companion browser extension leaks some domain name requests via requests to local IPFS gateway on DNS resolve endpoint.
It violates user privacy in cases when direct DNS requests are unacceptable. Namely:
In fact, it breaks user's anonymity and confidentiality of some requests.
It's likely that such behavior violates Add-on Policies defined for Firefox extensions (see "compromises user privacy" in "Unexpected Behavior") and Google Chrome Web Store Developer Agreement
(4.3 - privacy statement and 4.4.1.3 - interference with other network services and browser extensions).
To Reproduce
Steps to reproduce the behavior:
Expected behavior
No DNS leaks.
Screenshots
Dump of requests to local IPFS gateway from browser extensions:
Excerpt from query log of DNS forwarder on local network:
Desktop:
Additional context
PCAP file:
ipfs-companion.pcap.gz
Excerpt from query log of DNS forwarder on local network:
query.log
The text was updated successfully, but these errors were encountered: