Skip to content

Commit 731d40f

Browse files
authored
Merge pull request #2784 from darkexplosiveqwx/blockesni_description
Clarify `dns.blockESNI` wording
2 parents 2a88e27 + fd43c4b commit 731d40f

2 files changed

Lines changed: 16 additions & 11 deletions

File tree

src/config/config.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -419,7 +419,7 @@ void initConfig(struct config *conf)
419419
conf->dns.CNAMEdeepInspect.c = validate_stub; // Only type-based checking
420420

421421
conf->dns.blockESNI.k = "dns.blockESNI";
422-
conf->dns.blockESNI.h = "Should _esni. subdomains be blocked by default? Encrypted Server Name Indication (ESNI) is certainly a good step into the right direction to enhance privacy on the web. It prevents on-path observers, including ISPs, coffee shop owners and firewalls, from intercepting the TLS Server Name Indication (SNI) extension by encrypting it. This prevents the SNI from being used to determine which websites users are visiting.\n\n ESNI will obviously cause issues for pixelserv-tls which will be unable to generate matching certificates on-the-fly when it cannot read the SNI. Cloudflare and Firefox are already enabling ESNI. According to the IETF draft (link above), we can easily restore pixelserv-tls's operation by replying NXDOMAIN to _esni. subdomains of blocked domains as this mimics a \"not configured for this domain\" behavior.";
422+
conf->dns.blockESNI.h = "Should _esni. subdomains of blocked domains also be blocked by default? Encrypted Server Name Indication (ESNI) is certainly a good step into the right direction to enhance privacy on the web. It prevents on-path observers, including ISPs, coffee shop owners and firewalls, from intercepting the TLS Server Name Indication (SNI) extension by encrypting it. This prevents the SNI from being used to determine which websites users are visiting.\n\n ESNI will obviously cause issues for pixelserv-tls which will be unable to generate matching certificates on-the-fly when it cannot read the SNI. According to the IETF draft (link above), we can easily restore pixelserv-tls's operation by replying NXDOMAIN to _esni. subdomains of blocked domains as this mimics a \"not configured for this domain\" behavior.\n\n ESNI is mostly obsolete. It was previously rolled out by Cloudflare and Firefox, but they, as well as almost every client and server, are now using Encrypted Client Hello (ECH) instead of ESNI. ECH is served via the HTTPS record on the same RRname, so it will automatically be blocked.";
423423
conf->dns.blockESNI.t = CONF_BOOL;
424424
conf->dns.blockESNI.d.b = true;
425425
conf->dns.blockESNI.c = validate_stub; // Only type-based checking

test/pihole.toml

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -22,18 +22,23 @@
2222
# true or false
2323
CNAMEdeepInspect = true
2424

25-
# Should _esni. subdomains be blocked by default? Encrypted Server Name Indication
26-
# (ESNI) is certainly a good step into the right direction to enhance privacy on the
27-
# web. It prevents on-path observers, including ISPs, coffee shop owners and
28-
# firewalls, from intercepting the TLS Server Name Indication (SNI) extension by
29-
# encrypting it. This prevents the SNI from being used to determine which websites
30-
# users are visiting.
25+
# Should _esni. subdomains of blocked domains also be blocked by default? Encrypted
26+
# Server Name Indication (ESNI) is certainly a good step into the right direction to
27+
# enhance privacy on the web. It prevents on-path observers, including ISPs, coffee
28+
# shop owners and firewalls, from intercepting the TLS Server Name Indication (SNI)
29+
# extension by encrypting it. This prevents the SNI from being used to determine which
30+
# websites users are visiting.
3131
#
3232
# ESNI will obviously cause issues for pixelserv-tls which will be unable to generate
33-
# matching certificates on-the-fly when it cannot read the SNI. Cloudflare and Firefox
34-
# are already enabling ESNI. According to the IETF draft (link above), we can easily
35-
# restore pixelserv-tls's operation by replying NXDOMAIN to _esni. subdomains of
36-
# blocked domains as this mimics a "not configured for this domain" behavior.
33+
# matching certificates on-the-fly when it cannot read the SNI. According to the IETF
34+
# draft (link above), we can easily restore pixelserv-tls's operation by replying
35+
# NXDOMAIN to _esni. subdomains of blocked domains as this mimics a "not configured
36+
# for this domain" behavior.
37+
#
38+
# ESNI is mostly obsolete. It was previously rolled out by Cloudflare and Firefox, but
39+
# they, as well as almost every client and server, are now using Encrypted Client
40+
# Hello (ECH) instead of ESNI. ECH is served via the HTTPS record on the same RRname,
41+
# so it will automatically be blocked.
3742
#
3843
# Allowed values are:
3944
# true or false

0 commit comments

Comments
 (0)