Hacker News new | past | comments | ask | show | jobs | submit login
Show HN: dingo - a Google DNS-over-HTTPS caching proxy in Go (github.com/pforemski)
75 points by pjf on Sept 16, 2016 | hide | past | favorite | 31 comments



DNSCrypt (https://dnscrypt.org/) would be more elegant here (DTLS also okay) and is in-band wrapper for DNS. It's what TLS is for HTTP but for DNS and keeps things UDP.

Worth pointing out, this is not a google project, it just uses Google's DNS over HTTP endpoint.

We have one we made at https://www.openresolve.com/


Thanks for all your comments. Below I put quick replies to some of them:

1/ I hope to update the project to use QUIC soon, so it will use encrypted UDP to fetch DNS data from Google Public DNS. It is somehow similar to the DNS over DTLS idea, developed under IETF dprive WG.

2/ dingo does not need to resolve dns.google.com. Providing the server IP address is enough (IPv4 or IPv6, make sure it is close to your location). dingo verifies the server certificate to make sure we talk to Google. It can even "spoof" the TLS SNI string to avoid HTTPS firewalls, too (by default it asks for www.google.com, which is pretty benign).

3/ Last but not least, it's just my first non-trivial Golang project - thanks for all your suggestions! :)


It seems like this includes up to 500 bytes of padding in a request. Is there a reason for that?


Yes, the random padding (which is optional) is to counter-measure possible side-channel privacy attacks that could infer the domain name from the packet sizes.

The Google documentation explains that (look for "random_padding") at https://developers.google.com/speed/public-dns/docs/dns-over...


"It can even \"spoof\" the TLS SNI string to avoid HTTPS firewalls..."

Are you confirming SNI is being used for censorship?


Plenty of content blockers support blocking domains based on SNI. Here's just a couple of examples from a quick google search.

https://wiki.untangle.com/index.php/Web_Filter#HTTPS_Options

http://www.watchguard.com/help/docs/wsm/xtm_11/en-us/content...


If someone is doing DPI their best bet to know where are you connecting to is to look at the host in SNI, but if you're in a corporate environment with an explicit proxy, your computer would be sending a "CONNECT hostname.tld" in plain text anyway :)


The use of `go run` here makes adopting this very hard. The benefit of using Go for projects (in my experience) is that you can build for multiple OS/Arch super, super easy. I'd thin that having uploaded artefacts would be the first thing most people do when releasing Go code into the wild that is meant to be consumed by someone just wanting to run the program.




It's also quite easy to set up Travis-CI to build your project and push binaries to github releases on tagged pushes. Pretty much the first thing I do with every go project.


go get github.com/pforemski/dingo


I think the point wyattjoh was making is that having to install the go toolchain is hindering adoption and that giving downloadable binaries that you could run directly, like `./dingo` would be nicer.


Thats a great point. As a Go developer I always try to make sure that there's a linux and binary for my small projects released on github. I'm surprised more Go devs don't do this. The toolchain makes it very easy to update releases. You can also use ldflags to set the current git revision and branch into the project.

Here's an example release.sh I have in most of my projects https://github.com/micromdm/scep/blob/master/cmd/scepclient/...


The literal only selling point for Go, from my perspective--as a software developer, platform engineer, and someone willing to put up with others' Go applications but under no circumstances could be paid enough to write it or fight with its ecosystem--is a statically linked binary deployable. It's not an unmitigated good, of course, for obvious and dependency-related reasons. But it's the only reason to consider a Go tool at all. Otherwise, I might as well be using a Python dependency. Or Ruby or Java.


But then you would have to rely on supposedly authentic binaries to run a supposedly secure service.


Oh I get it. You finished auditing the linux kernel and can now comment on hn?


Cryptographic signatures exist.


Encryption is nice, but does it have to be the overhead of HTTP? What would be a sensible alternative protocol?


DNSCrypt or RFC7858 (dprive) are probably closest equivalents.


I suppose it could also be implemented with DTLS [0] over UDP [1]. (Checking Wikipedia...) A 2013 paper [2] published some vulnerabilities; mostly implementation flaws, but it raised some questions about the core spec as well.

However you implement it, encrypting DNS probably has it's place, but it doesn't make a whole lot of sense for most applications.

[0] https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Secur...

[1] https://tools.ietf.org/html/rfc6347

[2] http://www.isg.rhul.ac.uk/~kp/dtls.pdf



Am I the only one who took a quick look at this and went "How can this DNS be 'secure' if it has to use normal DNS to look up dns.google.com?"


Because you validate the certificate presented so that you know the endpoint is really Google.


This is very cool. If you compile it into a go executable and run it with the -dbg 3 option it shows all the lookup information for the clients.


My friend also wrote a similar tool in Go. This tool uses Taobao's API to detect your external IP address so edns will not be fixed string.

https://github.com/ayanamist/gdns-go


What problem does this project solve?

It's not immediately obvious what the thing does from the description.


When you are out and about with your laptop you are usually making your DNS calls to the local router which many view as a big privacy concern. Even if you use something like google's 8.8.8.8 and 8.8.4.4 public DNS servers as your defaults the traffic is easily sniffable.


When you connect to any site, your browser sends the domain in clear-text (even for HTTPS - see SNI). The only way to avoid this is to use a VPN, but then you can route regular DNS over that too.


The description sounds pretty clear to me.

"A caching DNS proxy for the Google DNS-over-HTTPS. It effectively encrypts all your DNS traffic."

https://developers.google.com/speed/public-dns/docs/dns-over...


This code needs a pass through gofmt, among many of the other Go linting technologies.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: