Firefox won't use DNS-over-HTTPS in UK due to blocking claims

Mozilla Company not planning enable DNS-over-HTTPS support by default for UK users due to pressure from the UK Providers Association (UK ISPA) and organizations Internet Watch Foundation (IWF). However, Mozilla works on the search for potential partners for the wider use of DNS-over-HTTPS technology in other European countries. A few days ago the UK ISPA organization nominated Mozilla as "Villain of the Internet" for its work on implementing DNS-over-HTTPS.

Mozilla considers DNS-over-HTTPS (DoH) as a tool to ensure user privacy and security, which eliminates the leakage of information about the requested host names through the DNS servers of providers, allows you to fight MITM attacks and DNS traffic spoofing, resists blocking at the DNS level and will allow it to work if it is impossible to directly access DNS servers (for example, when working through a proxy). If in a normal situation DNS requests are directly sent to the DNS servers defined in the system configuration, then in the case of DoH, the request to determine the host IP address is encapsulated in HTTPS traffic and sent in encrypted form to one of the centralized DoH servers, bypassing the DNS servers provider.

From the perspective of UK ISPA, the DNS-over-HTTPS protocol, on the contrary, threatens the security of users and destroys the standards adopted in the UK for Internet security, as it makes it easier to bypass blocking and filters installed by providers in accordance with the requirements of UK regulators or when organizing parental control systems. In many cases, such blocking is done through DNS query filtering, and the use of DNS-over-HTTP negates the effectiveness of these systems.

Source: opennet.ru

Add a comment