NHacker Next
  • new
  • past
  • show
  • ask
  • show
  • jobs
  • submit
Quad9 Enables DNS over HTTP/3 and DNS over QUIC (quad9.net)
esbranson 9 hours ago [-]
Excellent. Since privacy and cybersecurity are goals, TLS Encrypted Client Hello (RFC 9849, ECH) and its DNS service bindings (RFC 9848) were finalized last month.
b3lvedere 2 days ago [-]
I used the Quad9 resolvers in the past, but i've been using the DNS4EU for a while now [1]

[1] https://joindns4.eu/

crote 2 days ago [-]
What made you switch?
b3lvedere 1 days ago [-]
It seems faster for me and it has multiple choices of protection.
itchingsphynx 2 days ago [-]
Quad9 has enabled DNS over HTTP/3 (DoH3) and DNS over QUIC (DoQ) across its global resolver network.
ZeroCool2u 1 days ago [-]
Does quad9 have a resolver that includes ad blocking?
itchingsphynx 1 days ago [-]
"Does Quad9 offer content filtering? No. Quad9 has no plans to provide content filtering. Quad9 is dedicated solely to internet security and the blocking of malicious domains, such as phishing, malware, and exploit kits." https://quad9.net/support/faq/#dns_crypt
justinclift 1 days ago [-]
That's a shame, because ad blocking would seem to fit in:

> blocking of malicious domains

2 days ago [-]
lofaszvanitt 17 hours ago [-]
Quad9 is quite unreliable. Lots of outages and the like.
wpm 15 hours ago [-]
I've been using Quad9 at home for years as my only upstream DNS resolver and your comment does not track at all with my experience. My ISP goes out more often.
MORPHOICES 2 days ago [-]
[dead]
ape4 2 days ago [-]
So many more layers than the original simple DNS protocol.
crote 2 days ago [-]
"Simple" doesn't always mean "better". A car without seatbelts is less complicated than one with, but it definitely doesn't make it a better car.

Similarly, The original DNS protocol doesn't have any form of verification: it is is trivially easy for a MitM attacker to alter the responses - or even for a non-MitM one to send spoofed responses "in the blind". It also doesn't have any form of confidentiality: it is trivially easy for a MitM attacker to log all the requests you make, which essentially means your entire browser history.

It takes an awful lot of hacking to turn classic DNS into something even remotely representing a mature and well-designed protocol. By the time you are done bolting on all the other stuff it really isn't all that simple anymore.

pixl97 2 days ago [-]
Too bad ISPs are real dicks and capture all your DNS requests for tracking and resale.
UqWBcuFx6NV4r 2 days ago [-]
OK. It is still there, and you are welcome to use it.
Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
Rendered at 04:28:39 GMT+0000 (Coordinated Universal Time) with Vercel.