2019-07-11 13:42:50 +02:00
|
|
|
---
|
|
|
|
layout: post
|
|
|
|
comments: true
|
2024-06-19 07:19:44 +02:00
|
|
|
title:
|
|
|
|
"Android 9 Private DNS behaviour with 853 blocked & DoT server comparsion"
|
2019-07-11 13:42:50 +02:00
|
|
|
category: [english]
|
|
|
|
tags: [english, Android, DNS-over-TLS, DNS, security, privacy]
|
2019-07-11 18:42:56 +02:00
|
|
|
redirect_from:
|
|
|
|
- /dns.html
|
|
|
|
- /dot.html
|
2024-05-30 08:05:52 +02:00
|
|
|
lang: en
|
2024-05-31 05:29:21 +02:00
|
|
|
robots: noai
|
2019-07-11 13:42:50 +02:00
|
|
|
---
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
_Since I first heard of Android 9 Private DNS I wondered how it will work when
|
|
|
|
the port is blocked or there is a captive portal. I didn't find this information
|
|
|
|
anywhere and now that I have gotten the Android 9 Go update on my Nokia 1, I am
|
|
|
|
able to type my own blog post about it._
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2024-05-29 10:03:26 +02:00
|
|
|
<!-- editorconfig-checker-disable -->
|
|
|
|
<!-- prettier-ignore-start -->
|
|
|
|
|
|
|
|
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
|
|
|
|
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
|
2024-05-30 08:05:52 +02:00
|
|
|
<em lang="fi">Automaattinen sisällysluettelo</em> / <em lang="en">Automatically generated Table of Contents</em>
|
2024-05-29 10:03:26 +02:00
|
|
|
|
|
|
|
- [Notes/disclaimers:](#notesdisclaimers)
|
|
|
|
- [The tests](#the-tests)
|
|
|
|
- [Why I use Quad9?](#why-i-use-quad9)
|
|
|
|
|
|
|
|
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
|
|
|
|
|
|
|
|
<!-- prettier-ignore-end -->
|
|
|
|
<!-- editorconfig-checker-enable -->
|
|
|
|
|
|
|
|
## Notes/disclaimers:
|
2023-02-22 19:28:38 +01:00
|
|
|
|
|
|
|
- Phone: Nokia 1 (TA-1047) running Android 9 (Go Edition)
|
|
|
|
- I think I got the update on 9th of July
|
2024-06-19 07:19:44 +02:00
|
|
|
- Language: Finnish (and as I am typing in English I may accidentally invent
|
|
|
|
my own words)
|
2023-02-22 19:28:38 +01:00
|
|
|
- In all tests mobile data was disabled to not cause confusing results.
|
|
|
|
- As Private DNS is technically DNS over TLS, I am calling it as DoT.
|
2024-06-19 07:19:44 +02:00
|
|
|
- In Android 9 it's enabled from Settings, Network & Internet, Advanced
|
|
|
|
settings, Private DNS
|
2023-02-22 19:28:38 +01:00
|
|
|
- I am using [dns.quad9.net](https://quad9.net/) as hostname.
|
|
|
|
- Automatic mode connects to the DNS server port 853 without validating
|
2024-06-19 07:19:44 +02:00
|
|
|
certificate, "Hostname of private DNS provider" (which I call as the manual
|
|
|
|
mode) also validates the certificate and disallows downgrading.
|
2023-02-22 19:28:38 +01:00
|
|
|
- [Google's documentation](https://support.google.com/android/answer/9089903?hl=en).
|
2024-06-19 07:19:44 +02:00
|
|
|
- [Intra](https://getintra.org/) detects when private DNS is enabled and says
|
|
|
|
that it doesn't have to be enabled at those times. However it gets confused
|
|
|
|
easily as between the metro and DHCP offering Quad9 it claimed secure DNS was
|
|
|
|
disabled. Later before the captive portal test Intra again claimed DoT was
|
|
|
|
disabled when there was no connectivity to DoT server, so I guess it's only
|
|
|
|
able to detect when Android is actually connected to the DoT server.
|
2023-02-22 19:28:38 +01:00
|
|
|
- [My messy notes for making this post](https://github.com/Mikaela/mikaela.github.io/issues/149)
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2024-05-29 10:03:26 +02:00
|
|
|
## The tests
|
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
---
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
Test: _automatic mode without DoT capable server from DHCP_; the setting says
|
|
|
|
"automatic".
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
---
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
Test: _DoT with port 853 blocked_; Android reports that the WLAN network has no
|
|
|
|
internet connectivity until I disable private DNS and toggle WLAN. I tested this
|
|
|
|
in Helsinki metro.
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
---
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
Test: _automatic mode with DoT capable server from DHCP_; Android says that DoT
|
|
|
|
is "enabled". For this test I configured a WLAN AP to use
|
|
|
|
[Quad9](https://quad9.net/) DNS servers `149.112.112.112` and `9.9.9.9`.
|
|
|
|
|
|
|
|
I would also have configured the IPv6 addresses `2620:fe::9` and `2620:fe::fe`
|
|
|
|
as the network was dualstack, but naturally the router was missing ability to
|
|
|
|
configure IPv6 DNS servers and forced using the ISP ones. At least the Android 9
|
|
|
|
was happy with the IPv4 servers.
|
|
|
|
|
|
|
|
I didn't do this at home as my main network connectivity is a MiFi "box" that
|
|
|
|
doesn't allow me to specify a DNS server and I tend to avoid it anyway by using
|
|
|
|
[dnscrypt-proxy](https://github.com/jedisct1/dnscrypt-proxy/) with
|
|
|
|
[this config](https://github.com/Mikaela/shell-things/blob/master/etc/dnscrypt-proxy/dnscrypt-proxy.toml)
|
|
|
|
and Intra. Sadly I have some little used devices that have no way to encrypt DNS
|
|
|
|
and they either use the ISP DNS or in case of Chromecasts I am under impression
|
|
|
|
that they are hardcoded to use Google DNS. I don't use them much though.
|
|
|
|
|
|
|
|
Why do I care about encrypted DNS so much? Encrypt everything! And to quote my
|
|
|
|
index:
|
|
|
|
|
|
|
|
> The only traffic I am not encrypting is probably my WLAN. For some reason my
|
|
|
|
> router requires a reboot once per hour with WPA2 encryption while on open
|
|
|
|
> network I only have to reboot it once per day (I have asked about this
|
|
|
|
> confusing behaviour from wiser people on IRC and they weren't able to explain
|
|
|
|
> it either). I support the <a href="https://openwireless.org/">Open Wireless
|
|
|
|
> Movement</a> and think that if someone really wanted to cause me harm, they
|
|
|
|
> could break into the network anyway and that would be more difficult to prove
|
|
|
|
> on consumer grade device than the network being open. There are firewalls on
|
|
|
|
> all networks and while a passerby would be able to observe unencrypted SNIs,
|
|
|
|
> isn't that also
|
|
|
|
> <a href="https://en.wikipedia.org/wiki/Global_surveillance">being done by
|
|
|
|
> international security agencies already</a> while even
|
|
|
|
> <a href="https://fi.wikipedia.org/wiki/Suomen_tiedustelulains%C3%A4%C3%A4d%C3%A4nt%C3%B6">Finland
|
|
|
|
> has given permission to monitor traffic crossing our borders</a> ((TODO:
|
|
|
|
> better link in English as the situation develops)and how much of traffic
|
|
|
|
> doesn't do that?). I also don't like being somewhere where the only available
|
|
|
|
> WLANs are printers and smart thermostats :)
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
---
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
Bonus test: _DoT + DoH via the [Intra app](https://getintra.org/)_ configured to
|
|
|
|
use server `https://149.112.112.112/dns-query` in Helsinki metro; Android claims
|
|
|
|
that the network has no connectivity and shows the x on the WLAN symbol in the
|
|
|
|
statusbar, but everything works regardless. My hypothesis that I am not enough
|
|
|
|
interested in confirming is that if I was using
|
|
|
|
`https://dns.quad9.net/dns-query` nothing would work as the Intra app would have
|
|
|
|
been unable to resolve that name due to DoT being blocked.
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
---
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
Test: _DoT + Captive Portal_; I get the captive portal prompt asking me to login
|
|
|
|
to the network as usual, so I guess Android handles captive portal separately
|
|
|
|
from DoT which is a good thing in my opinion as otherwise that feature would
|
|
|
|
likely be too confusing or difficult for many people to use.
|
2019-07-11 13:42:50 +02:00
|
|
|
|
|
|
|
I performed this test next to a closed Espresso House, which luckily hadn't
|
|
|
|
turned off their WLAN AP, but I treat SSIDs as free advertising anyway.
|
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
---
|
2019-07-11 13:42:50 +02:00
|
|
|
|
|
|
|
## Why I use Quad9?
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
I had an idea of blogging about this separately long before I got Android 9 and
|
|
|
|
was able to perform this testing, but as I mention it so much I guess it's
|
|
|
|
better to merge the posts.
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
What I wish from a DNS server is privacy/security (including DoT), [DNSSEC],
|
2024-06-19 07:19:44 +02:00
|
|
|
being stable (or unlikely to go away without warning in near future) and thus
|
|
|
|
being able to recommend it to my family members (read as: configure it on their
|
|
|
|
routers while being tech support).
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
[dnssec]: https://www.dnssec.net/
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
The options
|
|
|
|
[judging by DNSPrivacy.org](<https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Public+Resolvers#DNSPrivacyPublicResolvers-DNS-over-TLS(DoT)>)
|
|
|
|
are the following:
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
- Quad9 (I am only talking about the secure variant as the insecure disables
|
2019-07-11 13:42:50 +02:00
|
|
|
DNSSEC)
|
2023-02-22 19:28:38 +01:00
|
|
|
- non-profit
|
|
|
|
- [privacy policy](https://quad9.net/privacy/) (I seem to have too much
|
2019-07-11 13:42:50 +02:00
|
|
|
problems with the others to even look at their policies)
|
2024-06-19 07:19:44 +02:00
|
|
|
- same malicious domain filtering for everyone (I was going to compare it to
|
|
|
|
Cisco/OpenDNS without realizing that the DoT requirement dropped them out
|
2019-07-11 13:42:50 +02:00
|
|
|
already) that I haven't yet encountered
|
2023-02-22 19:28:38 +01:00
|
|
|
- [FAQ](https://quad9.net/faq/)
|
2024-06-19 07:19:44 +02:00
|
|
|
- supports DNS over HTTPS (I need it for Firefox which at the time of typing
|
|
|
|
requires DoH for ESNI support)
|
2023-02-22 19:28:38 +01:00
|
|
|
- has a node in Finland (see TREX under regional providers)
|
2024-06-19 07:19:44 +02:00
|
|
|
- I have heard that they plan a network map (Adguard on the bottom has it) and
|
|
|
|
I hope to see it soon, because I would have no idea they have a node in
|
|
|
|
Finland without knowing about TREX and having performed DNS leak test (see
|
|
|
|
TREX under regional providers for more details on both).
|
2023-02-22 19:28:38 +01:00
|
|
|
- Cloudflare
|
|
|
|
- for-profit company
|
|
|
|
- too big for my taste and possibly getting even bigger if Firefox starts
|
2019-07-11 13:42:50 +02:00
|
|
|
sending DNS over HTTPS queries to them by default
|
2023-02-22 19:28:38 +01:00
|
|
|
- Google Public DNS
|
|
|
|
- same as Cloudflare, they are on my phone and many say Google to know you
|
2019-07-11 13:42:50 +02:00
|
|
|
better than you know yourself, so they areally don't need to know my DNS
|
|
|
|
queries too.
|
2023-02-22 19:28:38 +01:00
|
|
|
- CleanBrowsing
|
|
|
|
- I never looked it before, but it appears to be for-profit
|
2024-06-19 07:19:44 +02:00
|
|
|
- allows custom filters? What prevents filters from another user from being
|
|
|
|
applied to me? This was a problem with Cisco OpenDNS.
|
2023-02-22 19:28:38 +01:00
|
|
|
- Adguard
|
2024-06-19 07:19:44 +02:00
|
|
|
- I never looked at them before either, but they look surprisingly good and I
|
|
|
|
could consider using them with the short reading I did for this post.
|
2023-02-22 19:28:38 +01:00
|
|
|
- for-profit (even though they claim to make money by their other products
|
2019-07-11 13:42:50 +02:00
|
|
|
than DNS, but so do Cloudflare and Google?)
|
2023-02-22 19:28:38 +01:00
|
|
|
- I worry they could block something more than ads/malware by accident
|
2024-06-19 07:19:44 +02:00
|
|
|
- and I think they are more likely to do that than Quad9 due to blocking so
|
|
|
|
much more.
|
|
|
|
- and this could be painful to start troubleshooting over the phone with
|
|
|
|
family members.
|
2023-02-22 19:28:38 +01:00
|
|
|
- [privacy policy](https://adguard.com/en/privacy.html)
|
|
|
|
- based in Cyprus (EU)
|
|
|
|
- [Adguard DNS page including FAQ](https://adguard.com/en/adguard-dns/overview.html)
|
|
|
|
- no server in Finland
|
|
|
|
- appears to be using Cloudflare, which is a minus point.
|
2019-07-11 13:42:50 +02:00
|
|
|
|
|
|
|
Then there are regional providers like:
|
|
|
|
|
2024-06-19 07:19:44 +02:00
|
|
|
- [TREX recursive name service](http://www.trex.fi/service/resolvers.html) for
|
|
|
|
Finnish users
|
|
|
|
- "Our resolvers do not support DNS over TLS, DNS over HTTPS or dnscrypt. But
|
|
|
|
TREX hosts a Quad9 node, which offers a secure service with those features."
|
|
|
|
- this can be confirmed by running a
|
|
|
|
[DNS leak test](https://dnsleaktest.com/) which in Finland replies "TREX
|
|
|
|
Regional Exchanges Oy" and being hosted by TREX is a plus for Quad9 in my
|
|
|
|
eyes as it's
|
|
|
|
- often recommended for Finnish users instead of Google DNS by people in my
|
|
|
|
circles
|
|
|
|
- [CZ.NIC Open DNSSEC Validating Resolvers](https://www.nic.cz/odvr/) for Czech
|
|
|
|
users (English readers: enable cookies and click "English")
|
2023-02-22 19:28:38 +01:00
|
|
|
- has DNSSEC, DoT & DoH
|
2024-06-19 07:19:44 +02:00
|
|
|
- probably wouldn't make much sense to use from Finland (or anywhere else far
|
|
|
|
from Czech Republic, I imagine all the neighbouring countries would also
|
|
|
|
have their own equivalent regardless of CZ.NIC being so big name (you have
|
|
|
|
heard of e.g. [Turris Omnia](https://en.wikipedia.org/wiki/Turris_Omnia)?))
|
|
|
|
- (thus I promote centralization, but) a regional not-anycasted DNS server may
|
|
|
|
be impractical while traveling as your DNS would always go through home and
|
|
|
|
possibly be slower than it could be. As a counter argument it wouldn't hurt
|
|
|
|
that much or be difficult to change, but would you remember to do it while
|
|
|
|
traveling (I guess I would) and would your family members remember that?
|
|
|
|
|
|
|
|
And the golden option of hosting your own DNS. (It's actually easy with Unbound,
|
|
|
|
I haven't tried DoH/DoT hosting though!)
|
2019-07-11 13:42:50 +02:00
|
|
|
|
2023-02-22 19:28:38 +01:00
|
|
|
- Hosting where?
|
|
|
|
- Hosting with what money?
|
|
|
|
- On my laptop? What about when it goes down?
|
2024-06-19 07:19:44 +02:00
|
|
|
- On three of my active devices separately? I don't think the root nameserver
|
|
|
|
admins would be very happy if everyone did that.
|
|
|
|
- On my VPS? What if it went down due to being so cheap? What to say when my
|
|
|
|
family called that "the internet is broken"? How to provide the additional
|
|
|
|
line of defence against malware and phishing as well as Quad9 does it with all
|
|
|
|
their information sources and partners?
|
2019-07-11 13:42:50 +02:00
|
|
|
|
|
|
|
To me Quad9 seems the least bad (or the least scary?) option with all these
|
|
|
|
things considered, but some other provider may seem better to you.
|