-
-
Notifications
You must be signed in to change notification settings - Fork 214
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hide http user agent for DNS over HTTPS like what Firefox and iOS do? #446
Comments
Hi, so you would suggest to remove the user agent parameter from the header? Or to use some fake/specific value? |
Hi @0xERR0R, maybe simply removing it will be good enough for me ;) Fake it may not be too helpful when somebody trying to do some deep analysis about the behavior, the same thing on removing the user-agent header, but at least those https reverse proxies (in front of the DoH servers, some may be CDNs) will have one less thing to know about the users. That may be the reason why Apple and Mozilla is doing it. Just FYR, m13253/dns-over-https has an option to empty the user-agent, though they don't recommend it, maybe you'll also be interested in their opinion:
|
Could this be parameterized in the Currently blocky sends out a constant signature which as @PeterDaveHello mentioned could be profiled easily |
ok, so we can provide a configuration property to set the user agent string in the config.yaml (default empty, which means so user agent string will be sent). |
Just found that currently blocky is using the default HTTP user agent string:
Go-http-client/1.1
, though we know that there're tons of user profiling mechanisms to find out the tools and details about the users, but maybe it'll be great if we can give one less information, like user agent string? That's what Firefox and iOS doing, both known as privacy protected products, is this something blocky would like to do 😃The text was updated successfully, but these errors were encountered: