Use DNSCrypt by default in Kicksecure? (not Whonix!)

DNSSEC seems more useful in theory. Under the assumption that DNSSEC cannot be stripped similar to sslstrip… [1] [2]

DNSSEC can transmit information signed/authenticated information. (DNSSEC root trust key… [3]) Some such information can be potentially very worthwhile.

  • CAA policy:
  • DANE TLSA [5] [6]
    • In short: use DNS (authenticated by DNSSEC) to authenticate the TLS certificate.
    • Not an option for browsers yet, or ever(?) but perhaps good for mail servers? Didn’t investigate that.
  • Other seemingly less important DNS entries such as SPF, DKIM, DMARC.

Can browsers such as Firefox, Chrome, Tor Browser verify DNSSSEC and can these be DNSSEC striped in their current default configuration? If yes, are fixes planned? I mean, if a domain was DNSSEC signed and the signature was stripped, would these browsers reject the connection?


[1] Let’s call that DNSSEC strip?
[2]

[3] Ignoring the issue of who is holding the highest hierarchy DNSSEC root signing key. At least it is a different key holder than the many trusted key holders in the TLS CA system.
[4] public key infrastructure - Why don't browsers check CAA records to help ensure a certificate is valid? - Information Security Stack Exchange
[5] Dev/About Infrastructure - Kicksecure
[6]

It’s in Debian.
https://packages.debian.org/search?keywords=dnscrypt
Kicksecure was previously enabling it by default. Considering an opt-in package to easily enable it.

3 Likes