TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Warning: DNS encryption in Little Snitch 6.1 may occasionally fail

535 点作者 HelenePhisher8 个月前

30 条评论

kelnos8 个月前
It&#x27;s a little weird to me that getaddrinfo() is considered a &quot;low-level legacy API&quot;. Maybe things are drastically different on macOS, but getaddrinfo() is <i>the</i> way to resolve names on Linux and I suspect the *BSDs.<p>Sure, I expect most macOS apps will use something in Foundation or some other NetworkKit-type framework to do DNS queries, but it&#x27;s odd to me that the code there wouldn&#x27;t then call down to getaddrinfo() or the like to do the dirty work. I guess GAI is blocking, so presumably there&#x27;s some other low-level non-blocking call?
评论 #41572770 未加载
评论 #41572882 未加载
评论 #41574441 未加载
评论 #41576046 未加载
评论 #41573614 未加载
评论 #41574996 未加载
评论 #41577339 未加载
评论 #41572477 未加载
评论 #41579808 未加载
评论 #41576374 未加载
评论 #41574398 未加载
评论 #41574350 未加载
评论 #41572756 未加载
dwighttk8 个月前
&gt;UPDATE: Spoke too soon… The problem discussed here turned out to be specific to Little Snitch 6.1 and not a general issue in macOS. It will be fixed in an update of Little Snitch later today.
评论 #41579036 未加载
asplake8 个月前
&gt; Update 2024-09-17, 7:10 p.m.<p>&gt; After further investigation, we found that this bug has already existed at least since macOS 14.5 Sonoma (maybe even earlier, but we currently don’t have access to an older 14.x system for testing).
评论 #41573255 未加载
评论 #41574293 未加载
评论 #41573241 未加载
unluckier8 个月前
Sequoia also breaks an application&#x27;s ability to use DNS (or presumably anything UDP-based) if the macOS firewall is enabled, and an app is listed as &quot;Block incoming connections&quot;. <a href="https:&#x2F;&#x2F;waclaw.blog&#x2F;macos-firewall-blocking-web-browsing-after-upgrading-to-sequoia&#x2F;" rel="nofollow">https:&#x2F;&#x2F;waclaw.blog&#x2F;macos-firewall-blocking-web-browsing-aft...</a>
评论 #41573439 未加载
评论 #41572823 未加载
评论 #41572774 未加载
评论 #41572530 未加载
skrrtww8 个月前
The title sort of implies this is intentional or privileged to Apple, while it rather seems more like just a bug.<p>I also wish people would post the FB numbers and the details of their report when they say they&#x27;ve reported things like this.
评论 #41572513 未加载
评论 #41572295 未加载
elashri8 个月前
I maybe imagining but I feel like deja vu that there will be a problem with DNS that would affect Little snitch., Mullvad and others with new releases of iOS and Mac. If true I would really question what apple is doing during their months long developer and beta testing.
OJFord8 个月前
I was confused at the Little Snitch mention, and then reading further it just seems like a LS bug, that it only works in certain cases.<p>Well, seems this is the LS blog, so only confusion is why this is portrayed as a macOS bug? I&#x27;m not saying it&#x27;s wrong, it&#x27;s their domain not mine after all, it just doesn&#x27;t seem to be justified in TFA?
评论 #41576090 未加载
xyst8 个月前
If I recall, Apple deprecated use of certain network apis for third party developers. But Apple’s own apps (App Store) do not have these same restrictions. Thus, when trying to filter network traffic via app firewall via new APIs. It would fail since App Store uses legacy APIs.<p>Maybe part of this old bug (that I thought was fixed)
评论 #41572590 未加载
Legion8 个月前
I always love the announcements of, &quot;Bug found in new OS release! EDIT: Actually it&#x27;s been there for a while!&quot;
tankenmate8 个月前
I use routedns [0] as my local stub resolver so that I can pick and choose which requests go to where and also what transport they use. It can also blocklist, re-write, cache, load balance, and&#x2F;or handle fall back requests; so it give you lots of control.<p>I use a stub listener on localhost:53 for local requests and then forward them via UDP QUIC (TLS 0-RTT) requests to Cloudflare (1.1.1.1) with caching for most requests. Fast and reasonably secure.<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;folbricht&#x2F;routedns">https:&#x2F;&#x2F;github.com&#x2F;folbricht&#x2F;routedns</a>
hypeatei8 个月前
&gt; After further investigation, we found that this bug has already existed at least since macOS 14.5 Sonoma<p>Isn&#x27;t this an inherent risk when attempting to do network stuff in userspace? You&#x27;re at a very high level so hoping that lower level things comply seems risky if DNS encryption is critical to your use case.
评论 #41572645 未加载
lapcat8 个月前
Dupe: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41568128">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41568128</a>
ggm8 个月前
&quot;Mac OSX has complex paths into name-to-address translation and a single entrypoint is not well enforced.&quot;<p>this is not &quot;bypass encryption&quot; this is &quot;uses a range of ABI&#x2F;API bindings in code which don&#x27;t expose well into a single control point&quot;
egberts18 个月前
The battle of DNS resolving ownership rages on: who has the rights to set the DNS nameservers&#x2F;resolver.<p>As a long-time DNS security researcher, the ultimate and final end means would be to mirror the root servers, but I assert, for now, popping in your own `resolv.conf` should suffice, … again, for now.<p><a href="https:&#x2F;&#x2F;tailscale.com&#x2F;blog&#x2F;sisyphean-dns-client-linux" rel="nofollow">https:&#x2F;&#x2F;tailscale.com&#x2F;blog&#x2F;sisyphean-dns-client-linux</a>
jms7038 个月前
I wonder how little snitch sets the dns encryption up. In macOS, you need to setup encrypted dns via a profile System (Settings =&gt; General =&gt; VPN, DNS &amp; Device Management) and then in the browser. However, I think terminal and appstore still use whatever server is obtained via DHCP and is not encrypted.
Reason0778 个月前
&gt; <i>&quot;To protect (DNS lookups) from prying eyes, Little Snitch 6 offers a new feature: DNS encryption.&quot;</i><p>Browsers such as Firefox have offered this directly for a while. Of course, that only covers DNS lookups made from the web browser, but it doesn&#x27;t rely on OS-level hooks that (at least in Apple&#x27;s case) can break.
评论 #41573206 未加载
spr-alex8 个月前
Plugging <a href="https:&#x2F;&#x2F;www.supernetworks.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.supernetworks.org&#x2F;</a> -- when on wifi&#x2F;vpn all DNS will go up over DNS over HTTPS as plaintext DNS is DNAT&#x27;d to CoreDNS which is by default configured to use DoH.
Avamander8 个月前
Deploying DNS encryption on macOS is in general really tedious. Applying it as a system or user profile has different results. Switching between providers or temporarily disabling DNS encryption is painful.<p>I also still haven&#x27;t figured out how to get SSID-based switching to work, does it even?
bradgessler8 个月前
I’ve had issues using the Resolv library in Ruby when I’m connecting to the internet via a tethered iPhone. Never ran into that until Sequoia. I wonder if that’s related?<p>TBH I’m too lazy to dig in and find out. Has anybody else run into this issue?
评论 #41572255 未加载
pkilgore8 个月前
My read of this is that it shouldn&#x27;t affect pi.hole given the system&#x27;s default nameserver would still received by DDNS and thus be the pi.hole? Or do these requests go somewhere that&#x27;s hard-coded?
评论 #41573731 未加载
theonealtair8 个月前
This is why I firewall egress port 53 at the router level.
zjp8 个月前
Am I susceptible to this if I redirect all DNS traffic on my network to a pihole, which is the only device I let make external DNS requests?
评论 #41573862 未加载
jedisct18 个月前
The standard way to use dnscrypt-proxy is to set the resolver to 127.0.0.1.<p>Does Little Snitch do things differently?
mzs8 个月前
the (complicated) rules:<p><pre><code> man 5 resolver </code></pre> also try with a domain that exists
PaulDavisThe1st8 个月前
Can some ELI5 why you&#x27;d use a proxy rather than reset the server name?
gsich8 个月前
Why is a DNS proxy needed? My assumption is that you configure DoT or DoH (which I interpret as DNS encryption) somewhere in the settings of the OS.
gigatexal8 个月前
I wonder if this affects iOS, too
评论 #41576867 未加载
Jemm8 个月前
Apple ignoring standards again.
评论 #41578710 未加载
sleepybrett8 个月前
macos may bypass LITTLE SNITCH&#x27;S encrypted dns proxy, more like it.
system7rocks8 个月前
Hmm. I use NextDNS for this feature. I think. May have to do some testing to see whether or not it is operational at all.