DoH enabled ignores local dns overrides
Categories
(Core :: Networking: DNS, defect, P3)
Tracking
()
People
(Reporter: mvv, Unassigned)
References
Details
(Whiteboard: [necko-triaged][trr])
Updated•6 years ago
|
Updated•6 years ago
|
Comment 1•6 years ago
|
||
Comment 3•6 years ago
|
||
Comment 5•6 years ago
|
||
Comment 6•6 years ago
|
||
Comment 7•5 years ago
|
||
I work with various companies that use DNS Views so that if you are external to the companies network you resolve to externally accessible addresses where if you are coming from an internal network you are resolved to different IP addresses. These addresses may or may not be RFC1918 addresses. In one situation these just resolve to different public addresses that are only accessible over encrypted internal links.
One of the reasons that they do it this way is to allow both Corporate and BYOD devices to access special resources on the internal network with less authentication overhead than if they are coming over the Internet.
So some solution needs to be made available for situations like this where pushing firefox custom configurations to devices is not an option and where deactivation of DoH inside a corporate network is required.
Comment 8•5 years ago
|
||
(In reply to oliver.shane from comment #7)
I work with various companies that use DNS Views so that if you are external to the companies network you
We are currently working towards supporting split horizon in bug 1512255.
I encourage you to add your thoughts there - the more technical details you have the better - and it would be helpful if you could point us towards any system APIs that might be useful in detecting such cases. Thanks!
Comment 9•5 years ago
|
||
Also, as briefly mentioned earlier bug 1450893 added a pref where you can explicitly exclude domains from TRR so they will continue to use the local DNS (if split horizon doesn't cover your case).
In an enterprise case, network admins can blackhole use-application-dns.net
to prevent use of DoH and therefore use local network policies. https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet
Description
•