DNS-over-HTTPS (DoH) providers not classified as "Proxy & VPN" or similar
Forums › Service Issues › Categorization Issues › DNS-over-HTTPS (DoH) providers not classified as "Proxy & VPN" or similar
-
The CURL project has documented several DNS over HTTPS providers that could be used to circumvent CleanBrowsing’s DNS filtering:
Many of the listed providers have not been correctly classified by Categorify.org.
The following should all be classified as “Proxy & VPN” similar to how cloudflare-dns.com is already classified:
- https://dns.adguard.com/dns-query
- https://dns.google/dns-query
- https://dns.quad9.net/dns-query
- https://dns9.quad9.net/dns-query
- https://dns10.quad9.net/dns-query
- https://dns11.quad9.net/dns-query
- https://doh.opendns.com/dns-query
- https://dns.dnsoverhttps.net/dns-query
- https://doh.crypto.sx/dns-query
- https://doh-ch.blahdns.com/dns-query
- https://doh-jp.blahdns.com/dns-query
- https://doh-de.blahdns.com/dns-query
- https://dns.dns-over-https.com/dns-query
- https://doh.securedns.eu/dns-query
- https://dns.rubyfish.cn/dns-query
- https://doh-2.seby.io/dns-query
- https://doh.seby.io:8443/dns-query
- https://commons.host
- https://doh.dnswarden.com/adblock
- https://doh.dnswarden.com/uncensored
- https://dns-nyc.aaflalo.me/dns-query
- https://dns.aaflalo.me/dns-query
- https://doh.appliedprivacy.net/query
- https://doh.captnemo.in/dns-query
- https://doh.tiar.app/dns-query
- https://doh.tiarap.org/dns-query
- https://doh.dns.sb/dns-query
- https://rdns.faelix.net/
- https://doh.li/dns-query
- https://doh.armadillodns.net/dns-query
- https://doh.netweaver.uk/dns-query
- https://jp.tiar.app/dns-query
- https://jp.tiarap.org/dns-query
- https://doh.42l.fr/dns-query
- https://dns.aa.net.uk/dns-query
- https://adblock.mydns.network/dns-query
- https://ibksturm.synology.me/dns-query
- https://jcdns.fun/dns-query
- https://ibuki.cgnat.net/dns-query
The following websites should be classified “Proxy & VPN” but the domain is shared with other services that should be classified as “Clean Browsing”
- https://doh.cleanbrowsing.org/doh/security-filter/
While I was unable to test CleanBrowsing’s own DoH service, I suspect that the “Security-Filter” version could be used to bypass both the Adult and Family filters - https://dns.containerpi.com/dns-query
- https://dns.containerpi.com/doh/secure-filter/
- https://dns.nextdns.io/<config_id>
The following websites should be classified as “Clean Browsing” but the domain is shared with other services that should be classified as “Proxy & VPN”
- https://doh.cleanbrowsing.org/doh/family-filter/
- https://doh.cleanbrowsing.org/doh/adult-filter/
- https://dns.containerpi.com/doh/family-filter/
- https://dns.nextdns.io/<config_id>
The following can be classified as “Clean Browsing”
The following items from the list provided by the CURL project are classified correctly:
I should mention that I couldn’t test all of the above services using DoH in Mozilla Firefox, but for those that did work, they appear to bypass all the benefits of CleanBrowsing’s family filter.
Thanks for the heads up. Getting those fixed and pushed on our next update in a few hours.
thanks,
Thank you for getting these in there.
That being said, I noticed a couple of issues with the changes that were made:
The following was not correctly categorized as a “Proxy & VPN”. I suspect that the custom port number is causing some difficulty with the import.
You can still use the following settings in Mozilla Firefox’s about:config page to bypass the CleanBrowsing Family Filter
- “Setting”, “Value”
- “network.trr.mode”, 2
- “network.trr.uri”, “https://doh.cleanbrowsing.org/doh/security-filter/”
- “network.trr.custom_uri”, “https://doh.cleanbrowsing.org/doh/security-filter/”
- “browser.startup.homepage”, “http://www.exampleadultsite.com/|https://www.dnsleaktest.com/|https://www.google.com/”
- “browser.startup.page”, 1
You may have to refresh the page after starting up the browser, but the example adult site loads even when the host operating system has been configured to use CleanBrowsing’s Family Filter.
If CleanBrowsing were to move the DoH service for Security Filtering to a different domain, you should be able to correctly classify it as a “Proxy & VPN” without affecting the other DoH services that enforce adult-content filtering.
For Example:- From:
https://doh.cleanbrowsing.org/doh/security-filter/ - To:
https://security-filter-doh.cleanbrowsing.org/doh/security-filter/
OR
https://security-filter-doh.cleanbrowsing.org/
While you are at it, “security-filter-dns.cleanbrowsing.org” should be classified as a “Proxy & VPN” as well.
The other DNS over TLS services are also lacking categorization, but at least they are on separate domains and block adult-content:
https://cleanbrowsing.org/guides/dnsovertls“b32fc45f9641“, thanks for your help, this will make our families more secure.
Daniel, about what he said, can this problem (DoH) be solved? That trick in Firefox scare me.
I expect that such a drastic change in service offerings is a tough move to make for CleanBrowsing. If I were them, I’d probably create custom block page to ensure users of the old DoH service (doh.cleanbrowsing.org) are informed of the pending service change. By monitoring the traffic flowing in, you can better decide whether to block/redirect more content categories (increasing the number of people who will get the message). By starting with the more technical categories, you can target the techies first. Quite frankly, all of the service offerings should be on different domains similar to what they did for the DNS over TLS service. Speaking of which…
I have since found several other sites that offer DNSCrypt, DNS over TLS, and DoH services. They should all be classified as “Proxy & VPN”
The following was sourced from: https://blog.cloudflare.com/welcome-hidden-resolver/
- tor.cloudflare-dns.com
The following were sourced from: https://download.dnscrypt.info/dnscrypt-resolvers/json/public-resolvers.json
- ads-doh.securedns.eu
- dns.twnic.tw
- dns2.developer.li
- doh-ipv6.crypto.sx
- ea-dns.rubyfish.cn
- edns.233py.com
- jp.gridns.xyz
- ndns.233py.com
- public.dns.iij.jp
- sdns.233py.com
- sg.gridns.xyz
- uw-dns.rubyfish.cn
- wdns.233py.com
The following was sourced directly from: https://blahdns.com/
- dot-ch.blahdns.com
The following was sourced from: https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers
- 2.dnscrypt-cert.oszx.co
- dns-tls.bitwiseshift.net
- dns.bitgeek.in
- dns.larsdebruin.net
- dns.neutopia.org
- dnsotls.lab.nic.cl
- dnsovertls.sinodun.com
- dnsovertls1.sinodun.com
- dnsovertls2.sinodun.com
- dnsovertls3.sinodun.com
- dot-de.blahdns.com
- dot-jp.blahdns.com
- dot.securedns.eu
- dot1.appliedprivacy.net
- dot1.dnswarden.com
- dot2.dnswarden.com
- getdnsapi.net
- iana.tenta.io
- kaitain.restena.lu
- ns1.dnsprivacy.at
- ns2.dnsprivacy.at
- opennic.tenta.io
- privacydns.go6lab.si
- tls-dns-u.odvr.dns-oarc.net
- unicast.censurfridns.dk
The following was sourced from: https://blog.uncensoreddns.org/dns-servers/
- bornfiber.anycast.censurfridns.dk
- deic-lgb.anycast.censurfridns.dk
- deic-ore.anycast.censurfridns.dk
- kracon.anycast.censurfridns.dk
- rgnet-iad.anycast.censurfridns.dk
- solido.anycast.censurfridns.dk
The following was sourced from: https://servers.opennic.org/
- 2.dnscrypt-cert.ns3.ca.luggs.co
- 2.dnscrypt-cert.ns4.ca.luggs.co
- 2.dnscrypt.cert.jolteon.boothlabs.me
- jolteon.boothlabs.me
- 2.dnscrypt-cert.ns2.developer.li
- 2.dnscrypt-cert.opennic.i2pd.xyz
- 2.dnscrypt-cert.ns1.developer.li
- 2.dnscrypt-cert.ns3.ca.luggs.co
- opennic.peer3.famicoman.phillymesh.net
- 2.dnscrypt-cert.opennic.peer3.famicoman.phillymesh.net
- nl.public-dns.lchimp.com
- dnscrypt.nl.public-dns.lchimp.com
The following are general web proxies sourced from: https://wiki.opennic.org/
- proxy.opennic.org
- proxy.dnslibre.com.mx
Daniel, sorry if i write this again, but that trick with firefox written by “b32fc45f9641” can be solved?
Yes, we are looking into it. The first one he mentions is dealt with already and properly classified. Looking into our own security filter and to separate that to another domain.
Most of the DNS over TLS domains I submitted earlier do not appear to have been re-classified yet.
I suspect this is because the protocol runs over a different port. By default, the port is 853. (https://tools.ietf.org/html/rfc7858#section-3.1)There are a few new DoH providers that should be re-classified as proxy/VPNs:
- https://doh.xfinity.com/dns-query
- https://dohdot.coxlab.net/dns-query
- https://doh-fi.blahdns.com
- https://doh.applied-privacy.net/query
- https://dns.twnic.tw/dns-query
- https://example.doh.blockerdns.com/dns-query
I recommend monitoring the Curl project’s WIKI (https://github.com/curl/curl/wiki/DNS-over-HTTPS/) for changes using GitHub’s revision comparison feature:
Most of the DNS over TLS domains I submitted earlier (#post-2062) do not appear to have been re-classified yet.
I suspect this is because the protocol runs over a different port. By default, the port is 853. (https://tools.ietf.org/html/rfc7858#section-3.1)
While this protocol is easily blocked via egress filtering, most home users would probably not be comfortable setting this up.
There are a few new DoH providers that should be re-classified as “Proxy & VPN”:- https://doh.xfinity.com/dns-query
- https://dohdot.coxlab.net/dns-query
- https://doh-fi.blahdns.com
- https://doh.applied-privacy.net/query
- https://dns.twnic.tw/dns-query
- https://example.doh.blockerdns.com/dns-query
I recommend monitoring the Curl project’s WIKI (https://github.com/curl/curl/wiki/DNS-over-HTTPS/) for changes using GitHub’s revision comparison feature:
Sadly, no. The following DoH and DoT providers are still not blocked:
- 2.dnscrypt-cert.ns1.developer.li
- 2.dnscrypt-cert.ns2.developer.li
- 2.dnscrypt-cert.ns3.ca.luggs.co
- 2.dnscrypt-cert.ns4.ca.luggs.co
- 2.dnscrypt-cert.opennic.i2pd.xyz
- 2.dnscrypt-cert.opennic.peer3.famicoman.phillymesh.net
- 2.dnscrypt-cert.oszx.co
- 2.dnscrypt.cert.jolteon.boothlabs.me
- ads-doh.securedns.eu
- bornfiber.anycast.censurfridns.dk
- deic-lgb.anycast.censurfridns.dk
- deic-ore.anycast.censurfridns.dk
- dns-tls.bitwiseshift.net
- dns.bitgeek.in
- dns.flatuslifir.is
- dns.larsdebruin.net
- dns.neutopia.org
- dns.twnic.tw
- dns2.developer.li
- dnscrypt.nl.public-dns.lchimp.com
- dnsotls.lab.nic.cl
- dnsovertls.sinodun.com
- dnsovertls1.sinodun.com
- dnsovertls2.sinodun.com
- dnsovertls3.sinodun.com
- doh-fi.blahdns.com
- doh-ipv6.crypto.sx
- doh.applied-privacy.net
- doh.blockerdns.com
- doh.dnslify.com
- doh.xfinity.com
- dohdot.coxlab.net
- dot-ch.blahdns.com
- dot-de.blahdns.com
- dot-jp.blahdns.com
- dot.securedns.eu
- dot1.appliedprivacy.net
- dot1.dnswarden.com
- dot2.dnswarden.com
- ea-dns.rubyfish.cn
- edns.233py.com
- getdnsapi.net
- iana.tenta.io
- jolteon.boothlabs.me
- jp.gridns.xyz
- kaitain.restena.lu
- kracon.anycast.censurfridns.dk
- mozilla.cloudflare-dns.com
- ndns.233py.com
- nl.public-dns.lchimp.com
- ns1.dnsprivacy.at
- ns2.dnsprivacy.at
- odvr.nic.cz
- opennic.peer3.famicoman.phillymesh.net
- opennic.tenta.io
- privacydns.go6lab.si
- private.canadianshield.cira.ca
- protected.canadianshield.cira.ca
- public.dns.iij.jp
- rgnet-iad.anycast.censurfridns.dk
- sdns.233py.com
- security.cloudflare-dns.com
- sg.gridns.xyz
- solido.anycast.censurfridns.dk
- tls-dns-u.odvr.dns-oarc.net
- unicast.censurfridns.dk
- uw-dns.rubyfish.cn
- wdns.233py.com
- <i>security-filter-dns.cleanbrowsing.org</i>
Additionally, the previously mentioned Firefox settings illustrate the fact that the DoH services offered by CleanBrowsing for basic security filtering can be used to circumvent the Family Filter DNS service offered by CleanBrowsing over the regular DNS protocol. Solving this issue would require adjustments to the domain names used to offer the DoH service and classifying them accordingly. While separate domains were correctly used for DNS over TLS, the Security Filter is not yet classified as a VPN or Proxy.
Daniel, please, check this:
https://community.cleanbrowsing.org/topic/huge-websites-list-to-block/
it’s not present in the ” Categorization Issues” and i don’t know why….
Thanks.
You must be logged in to reply to this topic.