QUOTE(BenYeeHua @ Sep 11 2024, 03:54 PM)
Another solution is, you sign cert with IP address as well, so you can be.
https://[2606:4700:4700::1111]/dns-query
But the problem is, which custom DNS allow to do this la.
Years ago; yes.
Now; no more.
No well-known SSL vendor will issue IP-based certificate.
because in the era of anyone can buy shared hosting and VPS, issuing an IP certificate will also end up validating rogue tenants sharing the same "building" with you.
--
at least not without the requester jumping through hoops and loops to establish identity and demonstrate unrivalled ownership of the IP involved.
Google issued SSL for its own 8.8.8.8 using its own CA. 😅
--
self-signed CA;
import once to trust in each devices.
that's a potential solution for working around android's restriction.
putting DoH hostnames into the box requires looking up their IP addresses, but how to lookup their IP addresses if they themselves now-became the DNS resolver. catch-22.
i guess that Google and Cloudflare had their IP addresses hardcoded so their DoH can immediately be used without needing to look up IP in the first place.
(eh, but then how can it resolves DoT hostnames!? aaaaaarrrrgggghhhhhh)
QUOTE(kwss @ Sep 11 2024, 08:32 PM)
In your DNS server set record type HTTPS:
1 . alpn="h3,h2"
Thank you.
I didn't have this yet.
And after checking, my current DNS provider does not support HTTPS-type yet.
(i don't have the capacity maintain uptime if i operate own nameservers.)
QUOTE(JohnLai @ Sep 11 2024, 08:36 PM)
You do know this method is useless since they hijacked the IP address?
They reversed the hijacking after a day or two.

as yourself mentioned, the regular public DNS was subjected to TM hijacking in the first hours of their blockade.
so the intent is to set up a private DoH that is on publicly-accessible internet.
publicly-accessible means i can use it over any network, be it my Unifi fibre, Maxis fibre, and any mobile internet. Not landlocked to "only on wifi, at home".
using regular web server software to implement; i want to hide tell-tale signatures of a DoH to avoid it geing blocked or hijacked. of course there are more ways to eventually determine it's DoH traffic, but you'll need to be network admin with massive packet samples in order to come to that conclusion.
if caught, it would be easy to duplicate the set up to a new public IP.
--
i'm looking at changing DoH at system-level, not having to custom configure in every browser.
i already have no issue with windows, linux, iOS platforms using my DoH. only Android is refusing.
it's not that i reject using vpn and app-based altogether.
it's just that i want to avoid "cheat code" of going to that route. been thre, done that, it wasn't ideal as vpn and app will get interrupted and my work - and research purposes - gets disconnected and spill out on plain internet.
using vpn and app would be easy, but not challenging.
as it is, i had to reread DNS protocol and BIND that i had not touched for nearly a decade, and learn of DoH and QUIC. it wasn't a loss building this.
This post has been edited by Oltromen Ripot: Sep 12 2024, 11:53 AM