Quad9 Enables DNS over HTTP/3 and DNS over QUIC

68 points
1/21/1970
4 days ago
by itchingsphynx

Comments


b3lvedere

I used the Quad9 resolvers in the past, but i've been using the DNS4EU for a while now [1]

[1] https://joindns4.eu/

4 days ago

crote

What made you switch?

4 days ago

b3lvedere

It seems faster for me and it has multiple choices of protection.

3 days ago

esbranson

Excellent. Since privacy and cybersecurity are goals, TLS Encrypted Client Hello (RFC 9849, ECH) and its DNS service bindings (RFC 9848) were finalized last month.

2 days ago

itchingsphynx

Quad9 has enabled DNS over HTTP/3 (DoH3) and DNS over QUIC (DoQ) across its global resolver network.

4 days ago

lofaszvanitt

Quad9 is quite unreliable. Lots of outages and the like.

3 days ago

wpm

I've been using Quad9 at home for years as my only upstream DNS resolver and your comment does not track at all with my experience. My ISP goes out more often.

3 days ago

ZeroCool2u

Does quad9 have a resolver that includes ad blocking?

3 days ago

itchingsphynx

"Does Quad9 offer content filtering? No. Quad9 has no plans to provide content filtering. Quad9 is dedicated solely to internet security and the blocking of malicious domains, such as phishing, malware, and exploit kits." https://quad9.net/support/faq/#dns_crypt

3 days ago

justinclift

That's a shame, because ad blocking would seem to fit in:

> blocking of malicious domains

3 days ago

MrDrMcCoy

I expect Mullvad will implement all this soon enough, and they do have adblocking with public endpoints.

a day ago

[deleted]
4 days ago

MORPHOICES

[dead]

4 days ago

ape4

So many more layers than the original simple DNS protocol.

4 days ago

crote

"Simple" doesn't always mean "better". A car without seatbelts is less complicated than one with, but it definitely doesn't make it a better car.

Similarly, The original DNS protocol doesn't have any form of verification: it is is trivially easy for a MitM attacker to alter the responses - or even for a non-MitM one to send spoofed responses "in the blind". It also doesn't have any form of confidentiality: it is trivially easy for a MitM attacker to log all the requests you make, which essentially means your entire browser history.

It takes an awful lot of hacking to turn classic DNS into something even remotely representing a mature and well-designed protocol. By the time you are done bolting on all the other stuff it really isn't all that simple anymore.

4 days ago

pixl97

Too bad ISPs are real dicks and capture all your DNS requests for tracking and resale.

4 days ago

UqWBcuFx6NV4r

OK. It is still there, and you are welcome to use it.

4 days ago