zlacker

[return to "Tell HN: Archive.is inaccessible via Cloudflare DNS (1.1.1.1)"]
1. eastda+d6[view] [source] 2019-05-04 19:31:43
>>ikeboy+(OP)
We don’t block archive.is or any other domain via 1.1.1.1. Doing so, we believe, would violate the integrity of DNS and the privacy and security promises we made to our users when we launched the service.

Archive.is’s authoritative DNS servers return bad results to 1.1.1.1 when we query them. I’ve proposed we just fix it on our end but our team, quite rightly, said that too would violate the integrity of DNS and the privacy and security promises we made to our users when we launched the service.

The archive.is owner has explained that he returns bad results to us because we don’t pass along the EDNS subnet information. This information leaks information about a requester’s IP and, in turn, sacrifices the privacy of users. This is especially problematic as we work to encrypt more DNS traffic since the request from Resolver to Authoritative DNS is typically unencrypted. We’re aware of real world examples where nationstate actors have monitored EDNS subnet information to track individuals, which was part of the motivation for the privacy and security policies of 1.1.1.1.

EDNS IP subsets can be used to better geolocate responses for services that use DNS-based load balancing. However, 1.1.1.1 is delivered across Cloudflare’s entire network that today spans 180 cities. We publish the geolocation information of the IPs that we query from. That allows any network with less density than we have to properly return DNS-targeted results. For a relatively small operator like archive.is, there would be no loss in geo load balancing fidelity relying on the location of the Cloudflare PoP in lieu of EDNS IP subnets.

We are working with the small number of networks with a higher network/ISP density than Cloudflare (e.g., Netflix, Facebook, Google/YouTube) to come up with an EDNS IP Subnet alternative that gets them the information they need for geolocation targeting without risking user privacy and security. Those conversations have been productive and are ongoing. If archive.is has suggestions along these lines, we’d be happy to consider them.

◧◩
2. codexo+s8[view] [source] 2019-05-04 19:49:30
>>eastda+d6
Why not just send the subnet of the machine at cloudflare doing the querying?
◧◩◪
3. akerl_+e9[view] [source] 2019-05-04 19:54:49
>>codexo+s8
The full IP of the Cloudflare resolver doing the recursive resolution is already provided to the authoritative server, as the source IP for the DNS query traffic.
◧◩◪◨
4. shawnz+Z9[view] [source] 2019-05-04 20:01:25
>>akerl_+e9
I think the parent is saying, why not spoof the EDNS client subnet information?
◧◩◪◨⬒
5. akerl_+Re[view] [source] 2019-05-04 20:39:47
>>shawnz+Z9
True. Copying the information would be possible, but given they’re working on other efforts to replace the functionality of EDNS ECS in a standard way, it seems like a hacky bandaid.
◧◩◪◨⬒⬓
6. zamada+Sl[view] [source] 2019-05-04 22:04:52
>>akerl_+Re
Is there anywhere I can learn about these ongoing efforts to replace EDNS?
[go to top]