Ник | Пост | Дата |
---|---|---|
tango | I don’t think this fact is well known yet, so I will document it here. If you configure DoH and ESNI in Firefox according to Mozilla’s instructions, you will still leak some destination domains because of OCSP (Online Certificate Status Protocol) requests, which are often plaintext HTTP and contain a certificate serial number, which can be looked up in Certificate Transparency logs. There are only a few places online where this is mentioned, so I suspect that many people who try to enable DoH or ESNI according to an online guide will be vulnerable. I don’t know of any workaround, in Firefox, other than setting 2019-01-05: http://blog.seanmcelroy.com/2019/01/05/ocsp-web-activity-is-not-private/
2019-03-13: https://bugzilla.mozilla.org/show_bug.cgi?id=1535235
2019-03-29: Use ESNI via Firefox HTTPS helper (#28168) · Issues · Legacy / Trac · GitLab
2019-08-13: https://www.usenix.org/system/files/foci19-paper_chai_update.pdf (Section 5.2)
2019-09-25: Centralised DoH is bad for privacy, in 2019 and beyond | PowerDNS Blog
| 2019-09-26T15:49:13.999Z |
tango | The bugzilla bug has been closed, with Mozilla opting not to do anything about OCSP leaks, other than improve the documentation. These are their recommendations for preventing OCSP leaks with ECH: On the server side: implement OCSP stapling (as Cloudflare reportedly already does) or use short-lived certificates (I don’t know exactly how short the validity has to be to disable OCSP checks). On the client side: disable OSCP checking the preferences.
| 2023-10-07T16:44:08.057Z |