Most active commenters
  • tialaramex(7)
  • bogomipz(5)
  • (4)
  • wtmt(3)
  • ocdtrekkie(3)

←back to thread

1895 points _l4jh | 73 comments | | HN request time: 0.205s | source | bottom
1. ajross ◴[] No.16727942[source]
This is the Cloudflare resolver, right? What's the "privacy-first" part about? It's just another third party DNS host. They haven't changed the protocol to be uninspectable and AFAIK haven't made any guarantees about logging or whatnot that would enhance privacy vs. using whatever you are now. This just means you're trusting Cloudflare instead of Comcast or Google or whoever.
replies(8): >>16727953 #>>16727957 #>>16727960 #>>16727965 #>>16727968 #>>16727969 #>>16727975 #>>16727978 #
2. ◴[] No.16727953[source]
3. shimms ◴[] No.16727957[source]
Yes they have:

"Privacy First: Guaranteed. We will never sell your data or use it to target ads. Period. We will never log your IP address (the way other companies identify you). And we’re not just saying that. We’ve retained KPMG to audit our systems annually to ensure that we're doing what we say.

Frankly, we don’t want to know what you do on the Internet—it’s none of our business—and we’ve taken the technical steps to ensure we can’t."

replies(2): >>16728044 #>>16728461 #
4. ◴[] No.16727960[source]
5. vimda ◴[] No.16727965[source]
Did you read the page? They're supporting DNS over TLS and DNS over HTTPS - both changes to the protocol to make in uninspectable. They've also said they're not logging IP info and they're getting independent auditors in to confirm what they're saying. Sounds trustworthy to me
replies(2): >>16728018 #>>16729162 #
6. yjftsjthsd-h ◴[] No.16727968[source]
On the contrary, they've taken 2 big steps that are better than ISPs (not sure about Google):

* no logging

* DNS over HTTPS

replies(2): >>16728011 #>>16728249 #
7. otoburb ◴[] No.16727969[source]
Cloudflare is making a public pronouncement that they're not going to sell your DNS data nor track your IP address, with the implication that they will also not use the usage data to upsell you services. That's about the only additional "privacy" edge they offer.

In the same breath, they insinuate that Google both sells and uses DNS usage from their 8.8.8.8 and 8.8.4.4 resolvers.

replies(2): >>16728030 #>>16729060 #
8. tialaramex ◴[] No.16727975[source]
"We will never log your IP address (the way other companies identify you). And we’re not just saying that. We’ve retained KPMG to audit our systems annually to ensure that we're doing what we say."

Now, audits are generally not worth very much (even, perhaps even especially, from a Big Four group like KPMG), but for this type of thing (verifying that a company isn't doing something they promised they would not do) they're about the best we have.

replies(5): >>16728151 #>>16728245 #>>16728729 #>>16728817 #>>16732561 #
9. cornholio ◴[] No.16727978[source]
I think the whole point for such free services is to log that data and extract statistical meaning out of it - in this case, they pledge to use an anonymized format. On the other hand CloudFlare's mission (ensure secure, solid end to end connectivity) is much better aligned with the user's needs than Google's mission (sell more ads).
10. therealmarv ◴[] No.16728011[source]
Google is one of the first ones using DNS over HTTPS.

BTW if you want to use DNS over HTTPS on Linux/Mac I strongly recommend dnscrypt proxy V2 (golang rewrite) https://github.com/jedisct1/dnscrypt-proxy and put e.g. cloudflare in their config toml file to make use of it.

replies(2): >>16728137 #>>16733185 #
11. dingaling ◴[] No.16728018[source]
Both encrypted extensions are of course inspectable at the end-point, which is the privacy model being discussed.

What is intriguing to me is why Cloudflare are offering this. Perhaps it is to provide data on traffic that is 'invisible' to them, as in it doesn't currently touch their networks. Possibly as a sales-lead generator.

Or is the plan to become dominant and then use DNS blackholing to shutdown malware that is a threat to their systems?

replies(2): >>16728038 #>>16728336 #
12. heisenbit ◴[] No.16728030[source]
They are NOT saying Google is lying and collecting the data. They are saying the business model of Google inherently provides such incentive.

Cloudflare is somewhat right: Means, Motive and Opportunity - but for a conviction you have to prove someone acted on the Opportunity. The Motive of Google is tampered with severe risk for loosing trust.

Cloudflare can make an argument they are fundamentally better positioned and that is all they do. As with all US based operations the NSA may cook up some convincing counterarguments and we may never know.

replies(2): >>16728041 #>>16728416 #
13. vimda ◴[] No.16728038{3}[source]
Im probably being naive, but maybe altruism? At least if you buy into their making the internet better rhetoric
replies(1): >>16728412 #
14. Twisol ◴[] No.16728041{3}[source]
It's clear what you meant, but for whatever it's worth, I think the word you wanted was "tempered", not "tampered".
replies(1): >>16728362 #
15. dictum ◴[] No.16728044[source]
> Frankly, we don’t want to know what you do on the Internet—it’s none of our business

In the DNS resolver space, what is their business?

replies(4): >>16728103 #>>16728205 #>>16728209 #>>16729210 #
16. hrunt ◴[] No.16728103{3}[source]
They want fast resolution of names that point to websites hosted by Cloudflare. Cloudflare makes their money selling their network to businesses that use it, and anything that makes that service better for the end-user increases customer stickiness.
17. cptskippy ◴[] No.16728137{3}[source]
The whole point of encrypting DNS traffic is to hide it from the likes of Google.
replies(1): >>16728286 #
18. runningmike ◴[] No.16728151[source]
Where is the technical audit report published? Open access url please.
replies(1): >>16729235 #
19. distantsounds ◴[] No.16728205{3}[source]
Making the internet fast and reliable, and arguably DNS resolution plays into that.
20. tbyehl ◴[] No.16728209{3}[source]
Could be a precursor to launching an OpenDNS competitor.
replies(1): >>16728386 #
21. bogomipz ◴[] No.16728245[source]
>"Now, audits are generally not worth very much (even, perhaps even especially, from a Big Four group like KPMG)"

Indeed, see the recent KPMG scandal:

https://www.marketwatch.com/story/kpmg-indictment-suggests-m...

replies(2): >>16728397 #>>16728905 #
22. pnutjam ◴[] No.16728249[source]
I've switched to cloudflare and none of the dns leak tests are showing my DNS, which I find interesting. They always showed google.
23. akquise ◴[] No.16728286{4}[source]
For me personally it is much more important to hide my DNS traffic from my ISP instead of Google, etc., even though I don't live in the US.

I pay them to access the internet, every further information they gather about my internet activity does not mean any benefit for me.

replies(2): >>16728551 #>>16728649 #
24. zackbloom ◴[] No.16728336{3}[source]
The goal is to make the sites that use Cloudflare ridiculously fast by putting the authoritative and recursive DNS on the same machine (for clients who use 1.1.1.1).
25. wtmt ◴[] No.16728362{4}[source]
For what it’s worth, you missed to point out “loosing” vs. “losing” in that comment (where it talks about “loosing trust”). :)
replies(1): >>16730812 #
26. wtmt ◴[] No.16728386{4}[source]
Is OpenDNS even as relevant as it was earlier, before Google DNS appeared (and then OpenDNS was bought by Cisco)?
replies(1): >>16728574 #
27. anonnyj ◴[] No.16728397{3}[source]
Seems we need an auditor auditor.
replies(1): >>16728712 #
28. wtmt ◴[] No.16728412{4}[source]
Cloudflare is already a significant enough player in handling Internet traffic. Maybe the company does want to do good for the sake of doing good, but I’m wary of companies taking over in this manner and making the Internet more like a monolith than a distributed system.
29. bogomipz ◴[] No.16728416{3}[source]
>"They are NOT saying Google is lying and collecting the data."

The OP did not say that cloudflare is "saying" that. The OP very clearly said they are "insinuating" it. And yes under the heading "DNS's Privacy Problem" the post mentions:

"With all the concern over the data that companies like Facebook and Google are collecting on you,..."

I think that juxtaposition of this statement under a bolded heading of "DNS's Privacy Problem" is very much insinuating that.

replies(1): >>16728696 #
30. ajross ◴[] No.16728461[source]
Serious question: where is that quote from? The link above is just to the resolver address.
replies(1): >>16728577 #
31. opencl ◴[] No.16728551{5}[source]
Hiding DNS traffic from your ISP is pointless when you have to give them the IP that gets resolved anyway for them to route your traffic.
replies(1): >>16728671 #
32. tialaramex ◴[] No.16728574{5}[source]
Maybe not _as_ relevant, but still a considerable number of clients are configured to trust OpenDNS, and their far more ambiguous stance on what exactly this is for is appealing to some people. For example, OpenDNS says yes, absolutely it is their business what you're looking up, and maybe you are a Concerned Parent™ who wants to ensure their children don't access RedTube, so that feels like a good idea.
replies(1): >>16729128 #
33. brantonb ◴[] No.16728577{3}[source]
Quote is at: https://1.1.1.1
replies(1): >>16732001 #
34. throw2016 ◴[] No.16728649{5}[source]
This does not make sense. Either people are not concerned about hiding their traffic or if they are it follows they would be equally if not much more concerned about Google that can track them across devices and build far more indepth invasive profiles than the ISP.

Aside it's strange https everywhere has been pushed aggressively by many here under the bogeyman of ISP adware and spying while completely ignoring the much larger adware and privacy threats posed by the stalking of Google, Facebook and others. It is disingenuous and insincere.

replies(1): >>16728705 #
35. markonen ◴[] No.16728671{6}[source]
Not really. Typically the query includes much more information (the site you want to visit) than the response (an IP potentially shared by thousands or millions of sites).
replies(2): >>16728750 #>>16728762 #
36. ocdtrekkie ◴[] No.16728696{4}[source]
Bear in mind, Google's changed its mind before and can again at any time. For instance, when they bought DoubleClick they promised not to connect it with the Google account data they had. Then they changed that policy later.
replies(1): >>16729257 #
37. ocdtrekkie ◴[] No.16728705{6}[source]
Most fears of ISPs have been stoked primarily by tech companies, who invest a lot more money into marketing than the ISPs do.
replies(1): >>16730700 #
38. ritinkar ◴[] No.16728712{4}[source]
Quis custodiet ipsos custodes?
39. aquis ◴[] No.16728729[source]
Worth noting they have already edited the article (less than 2hours later) and taken out the "We will never log your IP" bit...

"We committed to never writing the querying IP addresses to disk and wiping all logs within 24 hours."

"While we need some logging to prevent abuse and debug issues, we couldn't imagine any situation where we'd need that information longer than 24 hours. And we wanted to put our money where our mouth was, so we committed to retaining KPMG, the well-respected auditing firm, to audit our code and practices annually and publish a public report confirming we're doing what we said we would."

replies(3): >>16729840 #>>16729982 #>>16730094 #
40. pfg ◴[] No.16728750{7}[source]
You're still leaking that information due to SNI.
41. xioxox ◴[] No.16728762{7}[source]
Even with https, the name of the site is sent in clear when the connection to the site is established (this is SNI).
replies(1): >>16728892 #
42. Bromskloss ◴[] No.16728817[source]
Does KPMG employ technology people? I thought they did only financial audits.
replies(1): >>16728980 #
43. markonen ◴[] No.16728892{8}[source]
Back when they chose this design for SNI, I’m sure someone argued that it was fine because DNS had already leaked the hostname anyway :)
replies(2): >>16729048 #>>16731895 #
44. auxym ◴[] No.16728905{3}[source]
They were also implicated in tax evasion schemes in Canada.

http://www.cbc.ca/news/business/canada-revenue-kpmg-secret-a...

replies(1): >>16729843 #
45. tialaramex ◴[] No.16728980{3}[source]
First of all, KPMG is the name of a group. All the Big Four are arranged as group companies, a single financial entity owns the name (e.g "KPMG", "EY") from some friendly place, (London in all but one case) and licenses out the right to operate a member company to professional services companies in various jurisdictions around the world. The group has the famous name, and sets some rules about training and compliance, but the employees will (almost all) work for the local member companies even though reporting for lay people will say the group name, as they do here.

Secondly, the idea in audit is not really about digging into the engineering. So although they will need people who have some idea what DNS is, they don't need experts - this isn't code review. The auditors tend to spend most of their time looking at paperwork and at policy - so e.g. we don't expect auditors to discover a Raspberry Pi configured for packet logging hidden in a patchbay, but we do expect them to find if "Delete logs every morning" is an ambition and it's not anybody's job to actually do that, nor is it anybody's job to check it got done.

replies(1): >>16729314 #
46. tialaramex ◴[] No.16729048{9}[source]
It's really hard to fix this. https://datatracker.ietf.org/doc/draft-ietf-tls-sni-encrypti... is the state of the art -- note that's a Draft, and really, really not finished, help is doubtless welcome.

If it was easy, it would have been done during the TLS 1.3 process, but after a lot of discussion we're down to basically "Here is what people expect 'SNI encryption' would do for them, here's why all the obvious stuff can't achieve that, and here are some ugly, slow things that could work, now what?"

replies(1): >>16731123 #
47. kentonv ◴[] No.16729060[source]
> they insinuate that Google both sells and uses DNS

I don't think it's intended to say anything about Google specifically. Keep in mind that there are many other DNS services out there, and some of them are known for being pretty scummy, e.g. replacing NXDOMAIN results with "smart search" / ad pages.

replies(1): >>16729313 #
48. tbyehl ◴[] No.16729128{6}[source]
I was thinking more along the lines of their SME offering. DNS filtering is an important layer in network security and CloudFlare’s position of being in the middle of a large portion of Internet traffic, alongside now trying to attract a chunk of general DNS queries, potentially gives them a great deal of insight into who the bad actors are.
49. kzrdude ◴[] No.16729162[source]
It seems like bait-and-switch though? They tell about DNS over https and dns without logging, and then direct to an installation instruction where you can learn to start to use, "DNS without logging", but nothing that's encrypted? What am I missing?
50. jhanschoo ◴[] No.16729210{3}[source]
Traffic from heavily censored regimes to its big customers, which often end up being censored due to user contributions, I suppose.
51. bostik ◴[] No.16729235{3}[source]
Having dealt with KPMG recently (which I do at least once a year...), I would not expect to see the report.

KPMG's risk department - the lawyers' lawyers - appears to be violently allergic to their customers disclosing any report to outside parties. Based on my experience you can get a copy, but first you and the primary customer need to submit some paperwork. And among the conditions you need to agree with is that you don't redistribute the report or its contents.

Disclosure: I deal with security audits and technical aspects of compliance.

replies(1): >>16730000 #
52. bogomipz ◴[] No.16729257{5}[source]
That does not change the the fact that Cloudflare is insinuating something something about Google's DNS.
replies(1): >>16729390 #
53. bogomipz ◴[] No.16729313{3}[source]
>"I don't think it's intended to say anything about Google specifically"

Google is mentioned 13 times in this post and their resolvers 3. That's 16 total mentions of Google in their post.

replies(1): >>16730955 #
54. thinkloop ◴[] No.16729314{4}[source]
I think it's somewhere in between, the article itself states:

"to audit our code and practices annually and publish a public report confirming we're doing what we said we would."

I run an investment fund (hedge fund) and we are completing our required annual audit (not by KPMG). It is quite thorough, they manually check balances in our bank accounts directly with the bank, they verify balances directly off blockchain (it's a crypto fund) and have us prove ownership of keys by signing messages, etc. And they do do a due diligence (lots of doodoo there) that we are not doing scammy things like the equivalent of having a raspberry pi attached to the network. Now this is extremely tough of course, and they are limited in what they can accomplish there, but the thought does cross their mind. All firms are different, but from what we've seen most auditors do decent good jobs most of the time. Their reputation can only be hit so many times before their name is no longer valuable to be an auditor.

55. ocdtrekkie ◴[] No.16729390{6}[source]
Is the suggestion that a company whose main business is targeting ads based on collecting data about you might be collecting data about you an unfair insinuation?
replies(1): >>16729761 #
56. bogomipz ◴[] No.16729761{7}[source]
Please follow the thread - the question of whether an insinuation if "fair" is not what's being discussed. What's being discussed is whether or not Cloudflare said or insinuated that there were privacy concerns with using 8.8.8.8.
57. forapurpose ◴[] No.16729840{3}[source]
> Worth noting they have already edited the article (less than 2hours later) and taken out the "We will never log your IP" bit...

> "We committed to never writing the querying IP addresses to disk ..."

A DNS resolver does need to record the querying IP for at least a few moments because, you know, they have to respond to your query.

However, I don't know why they changed that sentence; it could be for other reasons too.

58. ◴[] No.16729843{4}[source]
59. staticassertion ◴[] No.16729982{3}[source]
Seems like they're just trying to be clear.

It's not uncommon to retain logs like that for debugging purposes, abuse prevention purposes, etc, but then to go back later and wipe them or anonymize them.

60. jlgaddis ◴[] No.16730000{4}[source]
> KPMG's risk department - the lawyers' lawyers - appears to be violently allergic to their customers disclosing any report to outside parties.

Isn't that the entire point of such an audit? To be able to present it to outside third-parties?

For examples, Mozilla (CA/B) requires audits for root CAs. The CA must provide a link to the audit on the auditor's public web site -- forwarding a copy or hosting it on their own isn't sufficient.

replies(2): >>16730626 #>>16742460 #
61. iwalsh ◴[] No.16730094{3}[source]
Not sure if they edited anything. Your quote is from the blog post[1] but the aforementioned quote by tialaramex is from the 1.1.1.1 site itself[2].

[1] https://blog.cloudflare.com/announcing-1111/ [2] https://1.1.1.1

62. tialaramex ◴[] No.16730626{5}[source]
You'd think, but it's surprisingly difficult to get the real full audit report. Mozilla's root policy _does_ require that they be shown the report, and has a bunch of extra requirements in there to ensure they're more detail, rather than some summary or overview document the auditors were persuaded to produce for this purpose. But the CA/B rules would allow just an audit letter which basically almost always says "Yes, we did an audit, and everything is fine" unless the auditors weren't comfortable writing "everything is fine". And almost always they feel that a footnote on a sub-paragraph buried in a detailed report is enough to leave "everything is fine" as the headline in the letter...

If you've ever been audited for some other reason, you'll know they find lots of things, and then you fix them, and that's "fine". But well, is it fine? Or, should we acknowledge that they found lots of things and what those things were, even if you subsequently fixed them? The CA/B says you have several months to hand over your letter after the audit period. Guess what those months are spent doing...

63. tialaramex ◴[] No.16730700{7}[source]
I can only really discuss the UK, since that's the only place where I've bought home ISP service.

Only a handful of small specialist firms actually just move bits in the UK. Every single UK ISP big enough to advertise on television is signed up to filter traffic and block things for being "illegal" or maybe if Hollywood doesn't like them, or if they have "naughty" words mentioned, or just because somebody slipped. If you're thinking "Not mine" and it runs TV adverts then, oops, nope, you're wrong about that and have had your Internet censored without realising it. I wonder how ISPs got their bad reputation...

64. Twisol ◴[] No.16730812{5}[source]
That looked more like a garden-variety typo than a bona fide eggcorn, so I gave it a pass ;)

https://en.wikipedia.org/wiki/Eggcorn

65. kentonv ◴[] No.16730955{4}[source]
I was specifically referring to the statement that Cloudflare won't sell your DNS history.
66. dfox ◴[] No.16731123{10}[source]
It is hard because of the TLS's pre-PFS legacy and to some extent also because of (very meaningful) intention to reduce roundtrips. The way to do SNI-like stuff is obvious: negotiate unauthenticated encrypted channel (by means of some EDH variant, you need one roundtrip for that) and perform any endpoint authentication steps inside that channel. This is what SSH2 does and AFAIK Microsoft's implementation of encrypted ISO-on-TCP (eg. rdesktop) does something similar.

Edit: in SSH2 the server authentication happens in the first cryptographic message from server (for the obvious efficiency reasons), and thus for doing SNI-style certificate selection there would have to be some plaintext server-ID in first clients message, but the security of the protocol does not require that as long as the in-tunnel authentication is mutual (it is for things like kerberos).

replies(1): >>16733572 #
67. gsich ◴[] No.16731895{9}[source]
A load balancer can chose the correct backend by using the SNI. So there is a use for being unencrypted.
68. dingo_bat ◴[] No.16732001{4}[source]
Not opening for me.
replies(1): >>16732564 #
69. badsectoracula ◴[] No.16732561[source]
How do we know they are not lying (or forced to lie, they are a US company after all)?
70. lugg ◴[] No.16732564{5}[source]
Try https://1.0.0.1/
71. ◴[] No.16733185{3}[source]
72. tialaramex ◴[] No.16733572{11}[source]
So, it feels like you're saying this is how SSH2 and rdesktop work, and then you caveat that by saying well, no, they actually don't offer this capability at all it turns out.

You are correct that you can do this if you spend one round trip first to set up the channel, and both the proposals for how we might encrypt SNI in that Draft do pay a round trip. Which is why I said they're slow and ugly. And as you noticed, SSH2 and rdesktop do not, in fact, spend an extra round trip to buy this capability they just go without.

73. dx034 ◴[] No.16742460{5}[source]
Auditors will confirm the result of the audit but usually not disclose the content of the audit report.