On 9/15/17 14:25, Ted Hardie wrote:
In the scenario I'm describing, it's the _javascript_.
Given that (in this scenario), the browser wouldn't know this query from any _other_ HTTPS request, it applies the same way as it does to all other HTTPS requests.
You didn't say what the origin of the calling page was. If it's the same origin, then it's the same origin (modulo CORS behavior).
The scenario I'm posting above assumes no special browser behavior.
This is a fine point. I do wonder how the resolvers at 8.8.8.8 and 8.8.4.4 handle it. I suppose the API deployed at https://developers.google.com/speed/public-dns/docs/dns-over-https is probably closer to the use case we're contemplating, though. To be clear, I'm not saying that these situations you describe aren't _bad_; I'm pointing out that they already exist with or without the mechanism under discussion. I would think the standard here is "don't make it worse," rather than "first, drain the swamp." I'll also point out that this use case (the _javascript_-based one) is nice in that it allows applications to communicate with a known trusted site (e.g., their own origin) to prevent this kind of unintentional exfiltration of information. Of course, this is already possible today using proprietary mechanisms, but it would be nice if such apps could use standard libraries.
I chose that example because it's easy to reason about without knowing the internal implementation architecture of browsers. If we instead turn to the *other* use case that you describe in which the browser (absent any special _javascript_ handling) chooses to use DNS-over-HTTPS, then a congruent problem arises. While it's not an area I've worked in closely, what I've seen of Firefox's network layer implementation leads me to believe that precluding a mechanism like this from working across all supported variations of HTTP would require additional code; and that the role of that code, in its entirety, would be to prevent from working that which otherwise would. Unless there are, say, security implications to doing so, I'd think we need better rationale for preventing it than "we don't want to think about it." /a |