You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right now go-ipfs uses DNS provided by the operating system.
It brings serious downsides:
DNS-based surveillance and censorship at ISP level (context)
Browsing DNSLink websites in coffee shops is risky: We are unable to tell if the DNS query was resolved over unencrypted connection. Most of the DNS servers provided by public WiFis are plaintext. This means someone could do MITM on and inject malicious response, changing DNSLink etc. (feat: allow /ipns/webui.ipfs.io on api port #6530)
Make it possible for users to override default DNS resolver via DNS.* config
Ideally, we should support plaintext DNS (only on localhost), DNS over TLS and DNS over HTTPS.
If we want to minimize the scope: focus on DNS over HTTPS (DoH). It works in browser, and we want to use it in js-ipfs (Support DNS over HTTPS helia-ipns#53) as replacement for calling https://ipfs.io/api/v0/dns all the time.
There should be a way to configure custom resolver per TLD or domain
Context
Right now go-ipfs uses DNS provided by the operating system.
It brings serious downsides:
Hardening DNS in go-ipfs
There are multiple steps to improve the situation, the basic ones would be:
(see https://wiki.mozilla.org/Trusted_Recursive_Resolver for prior art)
DNS.*
confighttps://ipfs.io/api/v0/dns
all the time.Ongoing work
add DNS interface interface-go-ipfs-core#69The text was updated successfully, but these errors were encountered: