DNSSEC のレビュー
DNSSEC 作成者: Antoine POPINEAU
Antoine POPINEAU による応答
開発者の返信
投稿日時: 8年前Firstly, we do not use unencrypted connections, everything is done through HTTPS.
Then, the developers of the former DNSSEC-Validator said themselves they would not port their extension because of missing APIs in Firefox 57+. As mentionned in another comment, as far as we know, there is no way of crafting and executing a raw UDP or TCP packet in Firefox 57+. We are therefore forced to use HTTPS to perform all DNS queries through HTTP resolvers.
That being said, I agree using Google by default is not a good choice, and a choice that was made as a proof of concept. I am in the process of forking OpenDNS HTTP resolver to support reporting DNSSEC status, so you can self-host your resolver and use it with this extension instead of Google's.
But that self-hosted resolver will always be an option. The extension has to work on first run, for non-technical people, and must use a publicly-hosted HTTP-based DNS resolver. If you have any service that does that outside Google, I'll be happy to integrate it.
Then, the developers of the former DNSSEC-Validator said themselves they would not port their extension because of missing APIs in Firefox 57+. As mentionned in another comment, as far as we know, there is no way of crafting and executing a raw UDP or TCP packet in Firefox 57+. We are therefore forced to use HTTPS to perform all DNS queries through HTTP resolvers.
That being said, I agree using Google by default is not a good choice, and a choice that was made as a proof of concept. I am in the process of forking OpenDNS HTTP resolver to support reporting DNSSEC status, so you can self-host your resolver and use it with this extension instead of Google's.
But that self-hosted resolver will always be an option. The extension has to work on first run, for non-technical people, and must use a publicly-hosted HTTP-based DNS resolver. If you have any service that does that outside Google, I'll be happy to integrate it.
合計レビュー数: 40
- While cloudflare.com/ssl/encrypted-sni/#results tells me that "DNSSEC. Attackers cannot trick you into visiting a fake website by manipulating DNS responses for domains that are outside their control," this extension claims that "cloudflare.com not secure by DNSSEC. Domain www.cloudflare.com is not secure through DNSSEC. Your connection is prone to man-in-the-middle attacks."
- 5 段階中 3 の評価Firefox ユーザー 18361289 によるレビュー (2年前)Can hopefully be made even better with https://bugzilla.mozilla.org/show_bug.cgi?id=1852752
- 5 段階中 1 の評価PSYCHOPATHiO によるレビュー (2年前)this is only a choice of 1.1.1.1 or 8.8.8.8 that i can manually enter in settings, poitless i guess
- 5 段階中 5 の評価Firefox ユーザー 7035052 によるレビュー (3年前)Wow! A DNSSEC extension that works! And no extra steps to install either.
- 5 段階中 2 の評価CognitiveFeline によるレビュー (4年前)used to display info and change but now it just always stays at NOPE doubt it's nope and 99% sure it's not me causing it.
- 5 段階中 1 の評価Firefox ユーザー 13662450 によるレビュー (5年前)No longer works. Was good in the past, but these days say 100% of websites are not secured by DNSSEC, which is outright wrong.
- 5 段階中 5 の評価Boris Volkov によるレビュー (6年前)
- 5 段階中 4 の評価Firefox ユーザー 15136226 によるレビュー (6年前)This add on works well, however there are some issues as pointed out by other reviewers. I would like to note that ECDSAP256SHA256 works for me. It would also be nice if the add on verified https sites with DANE pinned certificates.
- 5 段階中 4 の評価Firefox ユーザー 14672905 によるレビュー (6年前)It's great! And yes, would be even better once we have custom DNS, over TLS or not.
But this is a feature I have been waiting for so long, so I'm not going to hide my current feeling about this extension, it's awesome!! - 5 段階中 3 の評価Firefox ユーザー 13680056 によるレビュー (6年前)It will be nice to choose a custom DNSSec, I don't trust on google, and some ISP redirect the 1.1.1.1 to his own DNS.
- 5 段階中 5 の評価Firefox ユーザー 15299958 によるレビュー (7年前)
- 5 段階中 1 の評価Renaud Allard によるレビュー (7年前)Using Cloudflare and Google for validation is not a good idea.
But also, validation fails for some kind of signatures, exemple: those using ECDSAP256SHA256. - 5 段階中 5 の評価Firefox ユーザー 14754691 によるレビュー (7年前)
- 5 段階中 2 の評価Firefox ユーザー 14514156 によるレビュー (7年前)I would give at least 4 stars, if it would use my local resolver instead of using google/cloudflare for DNS lookups.
Reason behind the downgrade:
1. it introduces a single point of failure:
if either of those sites can't answer, _ALL_ users of this extension (who have configured that site) can't use it, if it would use the local resolver and that failed it would be just the users of the local machine who experience that problem.
2. it is a privacy hazard:
a hacker needs to crack only a single (ok: two) machine(s) to get a complete log of who on this world tried to communicate with which web server....
if it would use the local configured resolver that _might_ still be a problem, depending on the configuration of said resolver, but mostly (I hope) those will contact multiple authoritative servers to walk from the root to the leaf containing the desired information and only the _last_ server will know which site I wanted to contact, but there it's irrelevant, since _that_ site knows it anyway.... (btw.: _THIS_ is the reason why I disabled this extension)
3. it can't verify local domains
according to 'dig' my own domains are DNSSEC enabled and working correctly, still your extension reports them as unsigned because there is no global glue record, as such while it is reachable from the world (via dyndns), the world doesn't see the DNSSEC information stored on my local dns-server.