←back to thread

1895 points _l4jh | 1 comments | | HN request time: 0s | source
Show context
ebikelaw ◴[] No.16728503[source]
There’s more to dns performance than query time. Cloudflare doesn’t seem to be sending the EDNS client subnet to authoritative resolvers, which means those resolvers can’t give sensible nearest-to-client responses. This is a crucial feature of what makes the modern web fast.
replies(1): >>16728883 #
tssva ◴[] No.16728883[source]
It would be hard to claim to be a dns service which helps protect your privacy while also forwarding your subnet info on to other DNS servers.

Cloudflare has a large number of PoPs and are increasing them rapidly. If the service is distributed to them all than the authoritative server is likely to give a response that is similar to that it would have provided if the subnet had been explicitly provided since the Cloudflare PoP sending the request will be located network wise close to the client that originally made the request. This isn't always going to be true but the slightly higher odds that you will not connect to the optimal location for the service you are connecting to is probably worth the increase in privacy.

replies(1): >>16728968 #
ebikelaw ◴[] No.16728968[source]
What exactly is the privacy threat model in this situation? If you are about to connect to the resolved service it makes no difference that you hid your subnet from that service’s DNS server.
replies(1): >>16729038 #
jvolkman ◴[] No.16729038[source]
What if a client blackholes all traffic to some network due to some privacy-related reason? If cloudflare tells that provider (via name resolution) who's resolving names, some of that client's PII is possibly shared before the blackhole decision can even be made.
replies(1): >>16729073 #
1. ebikelaw ◴[] No.16729073[source]
That seems a bit contrived but just rolling with it, this hypothetical org with ultra-sensitive opsec should have also blacklisted the domain in question at their inside resolver.