On Mon, Sep 9, 2019 at 3:04 PM Michael Torrie <[email protected]> wrote:
>
> As many of you know recent releases of Firefox have implemented DNS over
> HTTPS (their own idea as opposed to the standard DNS over TLS), which
> bypasses your local DNS and uses cloudfare's DNS server on port 443.
> Ostensibly this is to protect users from bad actors who might alter the
> DNS responses and redirect unsuspecting users to bogus sites for
> nefarious purposes.  Mozilla has or will soon enable this by default.
> However in many organizations this is going to cause a lot of problems,
> particularly if you have host names that resolve differently if you're
> inside or outside of the organization, or if you're trying to implement
> family-friendly DNS filtering on your network.

Good info, thanks.  I've been wondering about how to block this as well.

-- 
Chris Wood
-=-=-=-=-=-=-

/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to