<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Tue, 13 Jul 2021 at 23:27, Bill Woodcock <<a href="mailto:woody@pch.net">woody@pch.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex">>> On Tue, Jul 13, 2021 at 8:49 PM Laban Mwangi <<a href="mailto:lmwangi@gmail.com" target="_blank">lmwangi@gmail.com</a>> wrote:<br>
>> Hi All,<br>
>> I'm a customer of a large ISP that seems to be doing fishy things with DNS. They occasionally block port 53 UDP forcing customers to use their DNS servers.<br>
>> <br>
>> I'd like to switch to something tamper proof; and based on my research, DOH seems to fit the bill. However, I'd prefer not to give my DNS data to Google / Cloudflare. The next best thing in my opinion would be the RIRs since"<br>
>> a) They are not for profit.<br>
>> b) Are large enough to manage a regional DOH service.<br>
>> c) Are already handling reverse DNS.<br>
>> <br>
>> What do folks think?<br>
<br>
<br>
> On Jul 13, 2021, at 1:05 PM, Amreesh Phokeer <<a href="mailto:amreesh.phokeer@gmail.com" target="_blank">amreesh.phokeer@gmail.com</a>> wrote:<br>
> Hi Laban,<br>
> Long time :)<br>
> a friend will tell you that you can use the quad9 doh service...but same problem, heh!<br>
> how about you setup your own DoH server? or you could ask your community-led IXP to do that for you, will save you a little RTT<br>
> <a href="https://github.com/DNSCrypt/dnscrypt-proxy" rel="noreferrer" target="_blank">https://github.com/DNSCrypt/dnscrypt-proxy</a><br>
<br>
Just to add a little to what Amreesh said, your concerns are very real, and exactly why we set up Quad9 in the first place. It’s not-for-profit, and we only use open-source, so we’re happy to show you what we’ve done. Or, if you want to use the servers we’ve been setting up, they’re back-to-back with the RIR authoritative servers, so give very good performance (and no intervening MITM attack surface) for those domains, as well as the 130 ccTLDs that PCH hosts, again back-to-back with the Quad9 servers. And if you’d like PCH/Quad9 servers at your local IXP, and they’re not already there, just let Sara or Nishal or me know, and we’ll get that in queue.<br>
<br>
There’s also ODoH, if you want to go one step further… Apple’s implementation will work at least on MacOS, iOS, and Windows, though I don’t know if there’s a Linux/Unix client available. Note, though, that ODoH uses ingress and egress nodes, like Tor, and Apple supplies the ingress nodes, and there are a fixed set of egress providers, so you’d want to make sure to specify an egress provider you trust… ODoH provides _no_ anonymity if the egress provider is also a CDN that sees any of your authenticated/unencrypted traffic.<br>
<br>
-Bill<br>
<br></blockquote><div>Thanks Bill/Amreesh,</div><div><br></div><div> Will give this a shot and see how it works out.</div><div><br></div><div>Cheers,</div><div>Laban </div></div></div>