|
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793 |
- <!doctype html><!-- This is a valid HTML5 document. -->
- <!-- Screen readers, SEO, extensions and so on. -->
- <html lang=fr>
- <!-- Has to be within the first 1024 bytes, hence before the <title>
- See: https://www.w3.org/TR/2012/CR-html5-20121217/document-metadata.html#charset -->
- <meta charset=utf-8>
- <!-- Why no `X-UA-Compatible` meta: https://stackoverflow.com/a/6771584 -->
- <!-- The viewport meta is quite crowded and we are responsible for that.
- See: https://codepen.io/tigt/post/meta-viewport-for-2015 -->
- <meta name=viewport content="width=device-width,minimum-scale=1,initial-scale=1,shrink-to-fit=no">
- <!-- Required to make a valid HTML5 document. -->
- <title>A cartoon intro to DNS over HTTPS (archive) — David Larlet</title>
- <!-- Generated from https://realfavicongenerator.net/ such a mess. -->
- <link rel="apple-touch-icon" sizes="180x180" href="/static/david/icons/apple-touch-icon.png">
- <link rel="icon" type="image/png" sizes="32x32" href="/static/david/icons/favicon-32x32.png">
- <link rel="icon" type="image/png" sizes="16x16" href="/static/david/icons/favicon-16x16.png">
- <link rel="manifest" href="/manifest.json">
- <link rel="mask-icon" href="/static/david/icons/safari-pinned-tab.svg" color="#5bbad5">
- <link rel="shortcut icon" href="/static/david/icons/favicon.ico">
- <meta name="apple-mobile-web-app-title" content="David Larlet">
- <meta name="application-name" content="David Larlet">
- <meta name="msapplication-TileColor" content="#da532c">
- <meta name="msapplication-config" content="/static/david/icons/browserconfig.xml">
- <meta name="theme-color" content="#f0f0ea">
- <!-- That good ol' feed, subscribe :p. -->
- <link rel=alternate type="application/atom+xml" title=Feed href="/david/log/">
-
- <meta name="robots" content="noindex, nofollow">
- <meta content="origin-when-cross-origin" name="referrer">
- <!-- Canonical URL for SEO purposes -->
- <link rel="canonical" href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/">
-
- <style>
- /* http://meyerweb.com/eric/tools/css/reset/ */
- html, body, div, span,
- h1, h2, h3, h4, h5, h6, p, blockquote, pre,
- a, abbr, address, big, cite, code,
- del, dfn, em, img, ins,
- small, strike, strong, tt, var,
- dl, dt, dd, ol, ul, li,
- fieldset, form, label, legend,
- table, caption, tbody, tfoot, thead, tr, th, td,
- article, aside, canvas, details, embed,
- figure, figcaption, footer, header, hgroup,
- menu, nav, output, ruby, section, summary,
- time, mark, audio, video {
- margin: 0;
- padding: 0;
- border: 0;
- font-size: 100%;
- font: inherit;
- vertical-align: baseline;
- }
- /* HTML5 display-role reset for older browsers */
- article, aside, details, figcaption, figure,
- footer, header, hgroup, menu, nav, section { display: block; }
- body { line-height: 1; }
- blockquote, q { quotes: none; }
- blockquote:before, blockquote:after,
- q:before, q:after {
- content: '';
- content: none;
- }
- table {
- border-collapse: collapse;
- border-spacing: 0;
- }
-
- /* http://practicaltypography.com/equity.html */
- /* https://calendar.perfplanet.com/2016/no-font-face-bulletproof-syntax/ */
- /* https://www.filamentgroup.com/lab/js-web-fonts.html */
- @font-face {
- font-family: 'EquityTextB';
- src: url('/static/david/css/fonts/Equity-Text-B-Regular-webfont.woff2') format('woff2'),
- url('/static/david/css/fonts/Equity-Text-B-Regular-webfont.woff') format('woff');
- font-weight: 300;
- font-style: normal;
- font-display: swap;
- }
- @font-face {
- font-family: 'EquityTextB';
- src: url('/static/david/css/fonts/Equity-Text-B-Italic-webfont.woff2') format('woff2'),
- url('/static/david/css/fonts/Equity-Text-B-Italic-webfont.woff') format('woff');
- font-weight: 300;
- font-style: italic;
- font-display: swap;
- }
- @font-face {
- font-family: 'EquityTextB';
- src: url('/static/david/css/fonts/Equity-Text-B-Bold-webfont.woff2') format('woff2'),
- url('/static/david/css/fonts/Equity-Text-B-Bold-webfont.woff') format('woff');
- font-weight: 700;
- font-style: normal;
- font-display: swap;
- }
-
- @font-face {
- font-family: 'ConcourseT3';
- src: url('/static/david/css/fonts/concourse_t3_regular-webfont-20190806.woff2') format('woff2'),
- url('/static/david/css/fonts/concourse_t3_regular-webfont-20190806.woff') format('woff');
- font-weight: 300;
- font-style: normal;
- font-display: swap;
- }
-
-
- /* http://practice.typekit.com/lesson/caring-about-opentype-features/ */
- body {
- /* http://www.cssfontstack.com/ Palatino 99% Win 86% Mac */
- font-family: "EquityTextB", Palatino, serif;
- background-color: #f0f0ea;
- color: #07486c;
- font-kerning: normal;
- -moz-osx-font-smoothing: grayscale;
- -webkit-font-smoothing: subpixel-antialiased;
- text-rendering: optimizeLegibility;
- font-variant-ligatures: common-ligatures contextual;
- font-feature-settings: "kern", "liga", "clig", "calt";
- }
- pre, code, kbd, samp, var, tt {
- font-family: 'TriplicateT4c', monospace;
- }
- em {
- font-style: italic;
- color: #323a45;
- }
- strong {
- font-weight: bold;
- color: black;
- }
- nav {
- background-color: #323a45;
- color: #f0f0ea;
- display: flex;
- justify-content: space-around;
- padding: 1rem .5rem;
- }
- nav:last-child {
- border-bottom: 1vh solid #2d7474;
- }
- nav a {
- color: #f0f0ea;
- }
- nav abbr {
- border-bottom: 1px dotted white;
- }
-
- h1 {
- border-top: 1vh solid #2d7474;
- border-bottom: .2vh dotted #2d7474;
- background-color: #e3e1e1;
- color: #323a45;
- text-align: center;
- padding: 5rem 0 4rem 0;
- width: 100%;
- font-family: 'ConcourseT3';
- display: flex;
- flex-direction: column;
- }
- h1.single {
- padding-bottom: 10rem;
- }
- h1 span {
- position: absolute;
- top: 1vh;
- left: 20%;
- line-height: 0;
- }
- h1 span a {
- line-height: 1.7;
- padding: 1rem 1.2rem .6rem 1.2rem;
- border-radius: 0 0 6% 6%;
- background: #2d7474;
- font-size: 1.3rem;
- color: white;
- text-decoration: none;
- }
- h2 {
- margin: 4rem 0 1rem;
- border-top: .2vh solid #2d7474;
- padding-top: 1vh;
- }
- h3 {
- text-align: center;
- margin: 3rem 0 .75em;
- }
- hr {
- height: .4rem;
- width: .4rem;
- border-radius: .4rem;
- background: #07486c;
- margin: 2.5rem auto;
- }
- time {
- display: bloc;
- margin-left: 0 !important;
- }
- ul, ol {
- margin: 2rem;
- }
- ul {
- list-style-type: square;
- }
- a {
- text-decoration-skip-ink: auto;
- text-decoration-thickness: 0.05em;
- text-underline-offset: 0.09em;
- }
- article {
- max-width: 50rem;
- display: flex;
- flex-direction: column;
- margin: 2rem auto;
- }
- article.single {
- border-top: .2vh dotted #2d7474;
- margin: -6rem auto 1rem auto;
- background: #f0f0ea;
- padding: 2rem;
- }
- article p:last-child {
- margin-bottom: 1rem;
- }
- p {
- padding: 0 .5rem;
- margin-left: 3rem;
- }
- p + p,
- figure + p {
- margin-top: 2rem;
- }
-
- blockquote {
- background-color: #e3e1e1;
- border-left: .5vw solid #2d7474;
- display: flex;
- flex-direction: column;
- align-items: center;
- padding: 1rem;
- margin: 1.5rem;
- }
- blockquote cite {
- font-style: italic;
- }
- blockquote p {
- margin-left: 0;
- }
-
- figure {
- border-top: .2vh solid #2d7474;
- background-color: #e3e1e1;
- text-align: center;
- padding: 1.5rem 0;
- margin: 1rem 0 0;
- font-size: 1.5rem;
- width: 100%;
- }
- figure img {
- max-width: 250px;
- max-height: 250px;
- border: .5vw solid #323a45;
- padding: 1px;
- }
- figcaption {
- padding: 1rem;
- line-height: 1.4;
- }
- aside {
- display: flex;
- flex-direction: column;
- background-color: #e3e1e1;
- padding: 1rem 0;
- border-bottom: .2vh solid #07486c;
- }
- aside p {
- max-width: 50rem;
- margin: 0 auto;
- }
-
- /* https://fvsch.com/code/css-locks/ */
- p, li, pre, code, kbd, samp, var, tt, time, details, figcaption {
- font-size: 1rem;
- line-height: calc( 1.5em + 0.2 * 1rem );
- }
- h1 {
- font-size: 1.9rem;
- line-height: calc( 1.2em + 0.2 * 1rem );
- }
- h2 {
- font-size: 1.6rem;
- line-height: calc( 1.3em + 0.2 * 1rem );
- }
- h3 {
- font-size: 1.35rem;
- line-height: calc( 1.4em + 0.2 * 1rem );
- }
- @media (min-width: 20em) {
- /* The (100vw - 20rem) / (50 - 20) part
- resolves to 0-1rem, depending on the
- viewport width (between 20em and 50em). */
- p, li, pre, code, kbd, samp, var, tt, time, details, figcaption {
- font-size: calc( 1rem + .6 * (100vw - 20rem) / (50 - 20) );
- line-height: calc( 1.5em + 0.2 * (100vw - 50rem) / (20 - 50) );
- margin-left: 0;
- }
- h1 {
- font-size: calc( 1.9rem + 1.5 * (100vw - 20rem) / (50 - 20) );
- line-height: calc( 1.2em + 0.2 * (100vw - 50rem) / (20 - 50) );
- }
- h2 {
- font-size: calc( 1.5rem + 1.5 * (100vw - 20rem) / (50 - 20) );
- line-height: calc( 1.3em + 0.2 * (100vw - 50rem) / (20 - 50) );
- }
- h3 {
- font-size: calc( 1.35rem + 1.5 * (100vw - 20rem) / (50 - 20) );
- line-height: calc( 1.4em + 0.2 * (100vw - 50rem) / (20 - 50) );
- }
- }
- @media (min-width: 50em) {
- /* The right part of the addition *must* be a
- rem value. In this example we *could* change
- the whole declaration to font-size:2.5rem,
- but if our baseline value was not expressed
- in rem we would have to use calc. */
- p, li, pre, code, kbd, samp, var, tt, time, details, figcaption {
- font-size: calc( 1rem + .6 * 1rem );
- line-height: 1.5em;
- }
- p, li, pre, details {
- margin-left: 3rem;
- }
- h1 {
- font-size: calc( 1.9rem + 1.5 * 1rem );
- line-height: 1.2em;
- }
- h2 {
- font-size: calc( 1.5rem + 1.5 * 1rem );
- line-height: 1.3em;
- }
- h3 {
- font-size: calc( 1.35rem + 1.5 * 1rem );
- line-height: 1.4em;
- }
- figure img {
- max-width: 500px;
- max-height: 500px;
- }
- }
-
- figure.unsquared {
- margin-bottom: 1.5rem;
- }
- figure.unsquared img {
- height: inherit;
- }
-
-
-
- @media print {
- body { font-size: 100%; }
- a:after { content: " (" attr(href) ")"; }
- a, a:link, a:visited, a:after {
- text-decoration: underline;
- text-shadow: none !important;
- background-image: none !important;
- background: white;
- color: black;
- }
- abbr[title] { border-bottom: 0; }
- abbr[title]:after { content: " (" attr(title) ")"; }
- img { page-break-inside: avoid; }
- @page { margin: 2cm .5cm; }
- h1, h2, h3 { page-break-after: avoid; }
- p3 { orphans: 3; widows: 3; }
- img {
- max-width: 250px !important;
- max-height: 250px !important;
- }
- nav, aside { display: none; }
- }
-
- ul.with_columns {
- column-count: 1;
- }
- @media (min-width: 20em) {
- ul.with_columns {
- column-count: 2;
- }
- }
- @media (min-width: 50em) {
- ul.with_columns {
- column-count: 3;
- }
- }
- ul.with_two_columns {
- column-count: 1;
- }
- @media (min-width: 20em) {
- ul.with_two_columns {
- column-count: 1;
- }
- }
- @media (min-width: 50em) {
- ul.with_two_columns {
- column-count: 2;
- }
- }
-
- .gallery {
- display: flex;
- flex-wrap: wrap;
- justify-content: space-around;
- }
- .gallery figure img {
- margin-left: 1rem;
- margin-right: 1rem;
- }
- .gallery figure figcaption {
- font-family: 'ConcourseT3'
- }
-
- footer {
- font-family: 'ConcourseT3';
- display: flex;
- flex-direction: column;
- border-top: 3px solid white;
- padding: 4rem 0;
- background-color: #07486c;
- color: white;
- }
- footer > * {
- max-width: 50rem;
- margin: 0 auto;
- }
- footer a {
- color: #f1c40f;
- }
- footer .avatar {
- width: 200px;
- height: 200px;
- border-radius: 50%;
- float: left;
- -webkit-shape-outside: circle();
- shape-outside: circle();
- margin-right: 2rem;
- padding: 2px 5px 5px 2px;
- background: white;
- border-left: 1px solid #f1c40f;
- border-top: 1px solid #f1c40f;
- border-right: 5px solid #f1c40f;
- border-bottom: 5px solid #f1c40f;
- }
- </style>
-
- <h1>
- <span><a id="jumper" href="#jumpto" title="Un peu perdu ?">?</a></span>
- A cartoon intro to DNS over HTTPS (archive)
- <time>Pour la pérennité des contenus liés. Non-indexé, retrait sur simple email.</time>
- </h1>
- <section>
- <article>
- <h3><a href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/">Source originale du contenu</a></h3>
- <p>Threats to users’ privacy and security are growing. At Mozilla, we closely track these threats. We believe we have a duty to do everything we can to protect Firefox users and their data.</p>
-
- <p>We’re taking on the companies and organizations that want to secretly collect and sell user data. This is why we added <a href="https://blog.mozilla.org/firefox/tracking-protection-always-on/">tracking protection</a> and created the <a href="https://blog.mozilla.org/firefox/facebook-container-extension/" data-href="https://blog.mozilla.org/firefox/facebook-container-extension/">Facebook container extension</a>. And you’ll be seeing us do more things to protect our users over the coming months.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/00_01.png"><img class="alignnone size-large wp-image-32291" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/00_01-500x174.png" alt="Icons for security projects that we’ve introduced" srcset="https://hacks.mozilla.org/files/2018/05/00_01-500x174.png 500w, https://hacks.mozilla.org/files/2018/05/00_01-250x87.png 250w, https://hacks.mozilla.org/files/2018/05/00_01-768x267.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>Two more protections we’re adding to that list are:</p>
-
- <ul>
- <li>DNS over HTTPS, a new IETF standards effort that we’ve championed</li>
- <li>Trusted Recursive Resolver, a new secure way to resolve DNS that we’ve partnered with <a href="https://www.cloudflare.com/">Cloudflare</a> to provide</li>
- </ul>
-
- <p>With these two initiatives, we’re closing data leaks that have been part of the domain name system since it was created 35 years ago. And we’d like your help in testing them. So let’s look at how DNS over HTTPS and Trusted Recursive Resolver protect our users.</p>
-
- <p>But first, let’s look at how web pages move around the Internet.</p>
-
- <p><em class="markup--em markup--p-em">If you already know how DNS and HTTPS work, you can skip to <a href="#trr-and-doh">how DNS over HTTPS helps</a>.</em></p>
-
- <h3>A brief HTTP crash course</h3>
-
- <p>When people explain how a browser downloads a web page, they usually explain it this way:</p>
-
- <ol class="postList">
- <li id="6004" class="graf graf--li graf-after--p">Your browser makes a GET request to a server.</li>
- <li id="b8c9" class="graf graf--li graf-after--li">The server sends a response, which is a file containing HTML.</li>
- </ol>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_01.png"><img class="alignnone size-large wp-image-32292" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_01-500x260.png" alt="browser GET request + response" srcset="https://hacks.mozilla.org/files/2018/05/01_01-500x260.png 500w, https://hacks.mozilla.org/files/2018/05/01_01-250x130.png 250w, https://hacks.mozilla.org/files/2018/05/01_01-768x399.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>This system is called HTTP.</p>
-
- <p>But this diagram is a little oversimplified. Your browser doesn’t talk directly to the server. That’s because they probably aren’t close to each other.</p>
-
- <p>Instead, the server could be thousands of miles away. And there’s likely no direct link between your computer and the server.</p>
-
- <p><b><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_02.png"><img class="alignnone size-large wp-image-32293" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_02-500x282.png" alt="image of client and server on opposite ends of the network" srcset="https://hacks.mozilla.org/files/2018/05/01_02-500x282.png 500w, https://hacks.mozilla.org/files/2018/05/01_02-220x125.png 220w, https://hacks.mozilla.org/files/2018/05/01_02-250x141.png 250w, https://hacks.mozilla.org/files/2018/05/01_02-768x433.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></b></p>
-
- <p>So this request needs to get from the browser to that server, and it will go through multiple hands before it gets there. And the same is true for the response coming back from the server.</p>
-
- <p>I think of this like kids passing notes to each other in class. On the outside, the note will say who it’s supposed to go to. The kid who wrote the note will pass it to their neighbor. Then that next kid passes it to one of their neighbors — probably not the eventual recipient, but someone who’s in that direction.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_03.png"><img class="alignnone size-large wp-image-32294" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_03-500x199.png" alt="kids passing notes" srcset="https://hacks.mozilla.org/files/2018/05/01_03-500x199.png 500w, https://hacks.mozilla.org/files/2018/05/01_03-250x99.png 250w, https://hacks.mozilla.org/files/2018/05/01_03-768x305.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>The problem with this is that anyone along the path can open up the note and read it. And there’s no way to know in advance which path the note is going to take, so there’s no telling what kind of people will have access to it.</p>
-
- <p>It could end up in the hands of people who do harmful things…</p>
-
- <p>Like sharing the contents of the note with everyone.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_04.png"><img class="alignnone size-large wp-image-32295" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_04-500x256.png" alt="kid saying “Ooo, hey everybody… Danny loves Sandy!”" srcset="https://hacks.mozilla.org/files/2018/05/01_04-500x256.png 500w, https://hacks.mozilla.org/files/2018/05/01_04-250x128.png 250w, https://hacks.mozilla.org/files/2018/05/01_04-768x393.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>Or changing the response.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_05.png"><img class="alignnone size-large wp-image-32296" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_05-500x214.png" alt="kid saying “Do you like me? Y/N… Heh, I’m going to prank him and put no here”" srcset="https://hacks.mozilla.org/files/2018/05/01_05-500x214.png 500w, https://hacks.mozilla.org/files/2018/05/01_05-250x107.png 250w, https://hacks.mozilla.org/files/2018/05/01_05-768x328.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>To fix these issues, a new, secure version of HTTP was created. This is called HTTPS. With HTTPS, it’s kind of like each message has a lock on it.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_06.png"><img class="alignnone size-large wp-image-32315" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/01_06-500x160.png" alt="open envelope next to locked envelope" srcset="https://hacks.mozilla.org/files/2018/05/01_06-500x160.png 500w, https://hacks.mozilla.org/files/2018/05/01_06-250x80.png 250w, https://hacks.mozilla.org/files/2018/05/01_06-768x246.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>Both the browser and the server know the combination to that lock, but no one in between does.</p>
-
- <p>With this, even if the messages go through multiple routers in between, only you and the web site will actually be able to read the contents.</p>
-
- <p>This solves a lot of the security issues. But there are still some messages going between your browser and the server that aren’t encrypted. This means people along the way can still pry into what you’re doing.</p>
-
- <p>One place where data is still exposed is in setting up the connection to the server. When you send your initial message to the server, you send the server name as well (in a field called “Server Name Indication”). This lets server operators run multiple sites on the same machine while still knowing who you are trying to talk to. This initial request is part of setting up encryption, but the initial request itself isn’t encrypted.</p>
-
- <p>The other place where data is exposed is in DNS. But what is DNS?</p>
-
- <h3>DNS: the Domain Name System</h3>
-
- <p>In the passing notes metaphor above, I said that the name of the recipient had to be on the outside of the note. This is true for HTTP requests too… they need to say who they are going to.</p>
-
- <p>But you can’t use a name for them. None of the routers would know who you were talking about. Instead, you have to use an IP address. That’s how the routers in between know which server you want to send your request to.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_01.png"><img class="alignnone size-large wp-image-32299" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_01-500x295.png" alt="network with IP addresses" srcset="https://hacks.mozilla.org/files/2018/05/02_01-500x295.png 500w, https://hacks.mozilla.org/files/2018/05/02_01-250x148.png 250w, https://hacks.mozilla.org/files/2018/05/02_01-768x454.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>This causes a problem. You don’t want users to have to remember your site’s IP address. Instead, you want to be able to give your site a catchy name… something that users can remember.</p>
-
- <p>This is why we have the domain name system (DNS). Your browser uses DNS to convert the site name to an IP address. This process — converting the domain name to an IP address — is called domain name resolution.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_02.png"><img class="alignnone size-large wp-image-32300" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_02-500x37.png" alt="domain and address equivalence" srcset="https://hacks.mozilla.org/files/2018/05/02_02-500x37.png 500w, https://hacks.mozilla.org/files/2018/05/02_02-250x18.png 250w, https://hacks.mozilla.org/files/2018/05/02_02-768x57.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>How does the browser know how to do this?</p>
-
- <p>One option would be to have a big list, like a phone book in the browser. But as new web sites came online, or as sites moved to new servers, it would be hard to keep that list up-to-date.</p>
-
- <p>So instead of having one list which keeps track of all of the domain names, there are lots of smaller lists that are linked to each other. This allows them to be managed independently.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_03.png"><img class="alignnone size-large wp-image-32301" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_03-500x222.png" alt="one list, vs lots of smaller lists" srcset="https://hacks.mozilla.org/files/2018/05/02_03-500x222.png 500w, https://hacks.mozilla.org/files/2018/05/02_03-250x111.png 250w, https://hacks.mozilla.org/files/2018/05/02_03-768x341.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>In order to get the IP address that corresponds to a domain name, you have to find the list that contains that domain name. Doing this is kind of like a treasure hunt.</p>
-
- <p>What would this treasure hunt look like for a site like the English version of wikipedia, <code>en.wikipedia.org</code>?</p>
-
- <p>We can split this domain into parts.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_04.png"><img class="alignnone size-large wp-image-32302" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_04-500x127.png" alt="domain split into top level, second level, and subdomain." srcset="https://hacks.mozilla.org/files/2018/05/02_04-500x127.png 500w, https://hacks.mozilla.org/files/2018/05/02_04-250x64.png 250w, https://hacks.mozilla.org/files/2018/05/02_04-768x195.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>With these parts, we can hunt for the list that contains the IP address for the site. We need some help in our quest, though. The tool that will go on this hunt for us and find the IP address is called a resolver.</p>
-
- <p>First, the resolver talks to a server called the Root DNS. It knows of a few different Root DNS servers, so it sends the request to one of them. The resolver asks the Root DNS where it can find more info about addresses in the <code>.org</code> top-level domain.</p>
-
- <p>The Root DNS will give the resolver an address for a server that knows about <code>.org</code> addresses.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_05.png"><img class="alignnone size-large wp-image-32303" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_05-500x438.png" alt="resolver talking to Root DNS" srcset="https://hacks.mozilla.org/files/2018/05/02_05-500x438.png 500w, https://hacks.mozilla.org/files/2018/05/02_05-250x219.png 250w, https://hacks.mozilla.org/files/2018/05/02_05-768x673.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>This next server is called a top-level domain (TLD) name server. The TLD server knows about all of the second-level domains that end with <code>.org</code>.</p>
-
- <p>It doesn’t know anything about the subdomains under <code>wikipedia.org</code>, though, so it doesn’t know the IP address for <code>en.wikipedia.org</code>.</p>
-
- <p>The TLD name server will tell the resolver to ask Wikipedia’s name server.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_06.png"><img class="alignnone size-large wp-image-32304" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_06-500x373.png" alt="resolver talking to TLD DNS" srcset="https://hacks.mozilla.org/files/2018/05/02_06-500x373.png 500w, https://hacks.mozilla.org/files/2018/05/02_06-250x187.png 250w, https://hacks.mozilla.org/files/2018/05/02_06-768x573.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>The resolver is almost done now. Wikipedia’s name server is what’s called the authoritative server. It knows about all of the domains under <code>wikipedia.org</code>. So this server knows about <code>en.wikipedia.org</code>, and other subdomains like the German version, <code>de.wikipedia.org</code>. The authoritative server tells the resolver which IP address has the HTML files for the site.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_07.png"><img class="alignnone size-large wp-image-32305" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_07-500x371.png" alt="resolver talking to authoritative DNS" srcset="https://hacks.mozilla.org/files/2018/05/02_07-500x371.png 500w, https://hacks.mozilla.org/files/2018/05/02_07-250x186.png 250w, https://hacks.mozilla.org/files/2018/05/02_07-768x571.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>The resolver will return the IP address for <code>en.wikipedia.org</code> to the operating system.</p>
-
- <p>This process is called recursive resolution, because you have to go back and forth asking different servers what’s basically the same question.</p>
-
- <p>I said we need a resolver to help us in our quest. But how does the browser find this resolver? In general, it asks the computer’s operating system to set it up with a resolver that can help.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_08.png"><img class="alignnone size-large wp-image-32306" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_08-500x260.png" alt="browser asking OS for resolver" srcset="https://hacks.mozilla.org/files/2018/05/02_08-500x260.png 500w, https://hacks.mozilla.org/files/2018/05/02_08-250x130.png 250w, https://hacks.mozilla.org/files/2018/05/02_08-768x399.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>How does the operating system know which resolver to use? There are two possible ways.</p>
-
- <p>You <em>can</em> configure your computer to use a resolver you trust. But very few people do this.</p>
-
- <p>Instead, most people just use the default. And by default, the OS will just use whatever resolver the network told it to. When the computer connects to the network and gets its IP address, the network recommends a resolver to use.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_09.png"><img class="alignnone size-large wp-image-32307" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/02_09-500x260.png" alt="operating system getting a recommendation from the network" srcset="https://hacks.mozilla.org/files/2018/05/02_09-500x260.png 500w, https://hacks.mozilla.org/files/2018/05/02_09-250x130.png 250w, https://hacks.mozilla.org/files/2018/05/02_09-768x399.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>This means that the resolver that you’re using can change multiple times per day. If you head to the coffee shop for an afternoon work session, you’re probably using a different resolver than you were in the morning. And this is true even if you have configured your own resolver, because there’s no security in the DNS protocol.</p>
-
- <h3>How can DNS be exploited?</h3>
-
- <p>So how can this system make users vulnerable?</p>
-
- <p>Usually a resolver will tell each DNS server what domain you are looking for. This request sometimes includes your full IP address. Or if not your full IP address, increasingly often the request includes most of your IP address, which can easily be combined with other information to figure out your identity.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_01.png"><img class="alignnone size-large wp-image-32308" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_01-500x267.png" alt="DNS request" srcset="https://hacks.mozilla.org/files/2018/05/03_01-500x267.png 500w, https://hacks.mozilla.org/files/2018/05/03_01-250x133.png 250w, https://hacks.mozilla.org/files/2018/05/03_01-768x410.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>This means that every server that you ask to help with domain name resolution sees what site you’re looking for. But more than that, it also means that anyone on the path to those servers sees your requests, too.</p>
-
- <p>There are a few ways that this system puts users’ data at risk. The two major risks are tracking and spoofing.</p>
-
- <h4>Tracking</h4>
-
- <p>Like I said above, it’s easy to take the full or partial IP address info and figure out who’s asking for that web site. This means that the DNS server and anyone along the path to that DNS server — called on-path routers — can create a profile of you. They can create a record of all of the web sites that they’ve seen you look up.</p>
-
- <p>And that data is valuable. Many people and companies will pay lots of money to see what you are browsing for.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_02.png"><img class="alignnone size-large wp-image-32309" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_02-500x295.png" alt="a router offering to sell data" srcset="https://hacks.mozilla.org/files/2018/05/03_02-500x295.png 500w, https://hacks.mozilla.org/files/2018/05/03_02-250x147.png 250w, https://hacks.mozilla.org/files/2018/05/03_02-768x452.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>Even if you didn’t have to worry about the possibly nefarious DNS servers or on-path routers, you still risk having your data harvested and sold. That’s because the resolver itself — the one that the network gives to you — could be untrustworthy.</p>
-
- <p>Even if you trust your network’s recommended resolver, you’re probably only using that resolver when you’re at home. Like I mentioned before, whenever you go to a coffee shop or hotel or use any other network, you’re probably using a different resolver. And who knows what its data collection policies are?</p>
-
- <p>Beyond having your data collected and then sold without your knowledge or consent, there are even more dangerous ways the system can be exploited.</p>
-
- <h4>Spoofing</h4>
-
- <p>With spoofing, someone on the path between the DNS server and you changes the response. Instead of telling you the real IP address, a spoofer will give you the wrong IP address for a site. This way, they can block you from visiting the real site or send you to a scam one.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_03.png"><img class="alignnone size-large wp-image-32310" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_03-500x295.png" alt="spoofer sending user to wrong site" srcset="https://hacks.mozilla.org/files/2018/05/03_03-500x295.png 500w, https://hacks.mozilla.org/files/2018/05/03_03-250x147.png 250w, https://hacks.mozilla.org/files/2018/05/03_03-768x452.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>Again, this is a case where the resolver itself might act nefariously.</p>
-
- <p>For example, let’s say you’re shopping for something at Megastore. You want to do a price check to see if you can get it cheaper at a competing online store, big-box.com.</p>
-
- <p>But if you’re on Megastore WiFi, you’re probably using their resolver. That resolver could hijack the request to big-box.com and lie to you, saying that the site is unavailable.</p>
-
- <h3 id="trr-and-doh">How can we fix this with Trusted Recursive Resolver (TRR) and DNS over HTTPS (DoH)?</h3>
-
- <p>At Mozilla, we feel strongly that we have a responsibility to protect our users and their data. We’ve been working on fixing these vulnerabilities.</p>
-
- <p>We are introducing two new features to fix this — Trusted Recursive Resolver (TRR) and DNS over HTTPS (DoH). Because really, there are three threats here:</p>
-
- <ol class="postList">
- <li id="eaab" class="graf graf--li graf-after--p">You could end up using an untrustworthy resolver that tracks your requests, or tampers with responses from DNS servers.</li>
- <li id="15e6" class="graf graf--li graf-after--li">On-path routers can track or tamper in the same way.</li>
- <li id="2131" class="graf graf--li graf-after--li">DNS servers can track your DNS requests.</li>
- </ol>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_04.png"><img class="alignnone size-large wp-image-32311" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_04-500x249.png" alt="the three threats—resolvers, on-path routers, and DNS servers" srcset="https://hacks.mozilla.org/files/2018/05/03_04-500x249.png 500w, https://hacks.mozilla.org/files/2018/05/03_04-250x125.png 250w, https://hacks.mozilla.org/files/2018/05/03_04-768x383.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>So how do we fix these?</p>
-
- <ol class="postList">
- <li id="64e1" class="graf graf--li graf-after--p">Avoid untrustworthy resolvers by using Trusted Recursive Resolver.</li>
- <li id="23d3" class="graf graf--li graf-after--li">Protect against on-path eavesdropping and tampering using DNS over HTTPS.</li>
- <li id="e4dd" class="graf graf--li graf-after--li">Transmit as little data as possible to protect users from deanonymization.</li>
- </ol>
-
- <h4>Avoid untrustworthy resolvers by using Trusted Recursive Resolver</h4>
-
- <p>Networks can get away with providing untrustworthy resolvers that steal your data or spoof DNS because very few users know the risks or how to protect themselves.</p>
-
- <p>Even for users who do know the risks, it’s hard for an individual user to negotiate with their ISP or other entity to ensure that their DNS data is handled responsibly.</p>
-
- <p>However, we’ve spent time studying these risks… and we have negotiating power. We worked hard to find a company to work with us to protect users’ DNS data. And we found one: <a href="https://www.cloudflare.com/">Cloudflare</a>.</p>
-
- <p>Cloudflare is providing a recursive resolution service with a pro-user privacy policy. They have committed to throwing away all personally identifiable data after 24 hours, and to never pass that data along to third-parties. And there will be regular audits to ensure that data is being cleared as expected.</p>
-
- <p>With this, we have a resolver that we can trust to protect users’ privacy. This means Firefox can ignore the resolver that the network provides and just go straight to Cloudflare. With this trusted resolver in place, we don’t have to worry about rogue resolvers selling our users’ data or tricking our users with spoofed DNS.</p>
-
- <p>Why are we picking one resolver? Cloudflare is as excited as we are about building a privacy-first DNS service. They worked with us to build a DoH resolution service that would serve our users well in a transparent way. They’ve been very open to adding user protections to the service, so we’re happy to be able to collaborate with them.</p>
-
- <p>But this doesn’t mean you have to use Cloudflare. Users can configure Firefox to use whichever DoH-supporting recursive resolver they want. As more offerings crop up, we plan to make it easy to discover and switch to them.</p>
-
- <h4>Protect against on-path eavesdropping and tampering using DNS over HTTPS</h4>
-
- <p>The resolver isn’t the only threat, though. On-path routers can track and spoof DNS because they can see the contents of the DNS requests and responses. But the Internet already has technology for ensuring that on-path routers can’t eavesdrop like this. It’s the encryption that I talked about before.</p>
-
- <p>By using HTTPS to exchange the DNS packets, we ensure that no one can spy on the DNS requests that our users are making.</p>
-
- <h4>Transmit as little data as possible to protect users from deanonymization</h4>
-
- <p>In addition to providing a trusted resolver which communicates using the DoH protocol, Cloudflare is working with us to make this even more secure.</p>
-
- <p>Normally, a resolver would send the whole domain name to each server—to the Root DNS, the TLD name server, the second-level name server, etc. But Cloudflare will be doing something different. It will only send the part that is relevant to the DNS server it’s talking to at the moment. This is called <a href="https://datatracker.ietf.org/doc/rfc7816/?include_text=1">QNAME minimization</a>.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_05.png"><img class="alignnone size-large wp-image-32312" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_05-500x373.png" alt="image showing resolver only asking the relevant question" srcset="https://hacks.mozilla.org/files/2018/05/03_05-500x373.png 500w, https://hacks.mozilla.org/files/2018/05/03_05-250x186.png 250w, https://hacks.mozilla.org/files/2018/05/03_05-768x572.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>The resolver will also often include the first 24 bits of your IP address in the request. This helps the DNS server know where you are and pick a CDN closer to you. But this information can be used by DNS servers to link different requests together.</p>
-
- <p>Instead of doing this, Cloudflare will make the request from one of their own IP addresses near the user. This provides geolocation without tying it to a particular user. In addition to this, we’re looking into how we can enable even better, very fine-grained load balancing in a privacy-sensitive way.</p>
-
- <p>Doing this — removing the irrelevant parts of the domain name and not including your IP address — means that DNS servers have much less data that they can collect about you.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_06.png"><img class="alignnone size-large wp-image-32313" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/03_06-500x267.png" alt="DNS request with client subnet and first part of domain cross out" srcset="https://hacks.mozilla.org/files/2018/05/03_06-500x267.png 500w, https://hacks.mozilla.org/files/2018/05/03_06-250x133.png 250w, https://hacks.mozilla.org/files/2018/05/03_06-768x410.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <h3>What isn’t fixed by TRR with DoH?</h3>
-
- <p>With these fixes, we’ve reduced the number of people who can see what sites you’re visiting. But this doesn’t eliminate data leaks entirely.</p>
-
- <p>After you do the DNS lookup to find the IP address, you still need to connect to the web server at that address. To do this, you send an initial request. This request includes a server name indication, which says which site on the server you want to connect to. And this request is unencrypted.</p>
-
- <p>That means that your ISP can still figure out which sites you’re visiting, because it’s right there in the server name indication. Plus, the routers that pass that initial request from your browser to the web server can see that info too.</p>
-
- <p>However, once you’ve made that connection to the web server, then everything is encrypted. And the neat thing is that this encrypted connection can be used for any site that is hosted on that server, not just the one that you initially asked for.</p>
-
- <p>This is sometimes called HTTP/2 connection coalescing, or simply connection reuse. When you open a connection to a server that supports it, that server will tell you what other sites it hosts. Then you can visit those other sites using that existing encrypted connection.</p>
-
- <p>Why does this help? You don’t need to start up a new connection to visit these other sites. This means you don’t need to send that unencrypted initial request with its server name indication saying which site you’re visiting. Which means you can visit any of the other sites on the same server without revealing what sites you’re looking at to your ISP and on-path routers.</p>
-
- <p>With the rise of CDNs, more and more independent sites are being served by a single server. And since you can have multiple coalesced connections open, you can be connected to multiple shared servers or CDNs at once, visiting all of the sites across the different servers without leaking data. This means this will be more and more effective as a privacy shield.</p>
-
- <h3>What is the status?</h3>
-
- <p>You can enable DNS over HTTPS in Firefox today, and we <a href="https://blog.nightly.mozilla.org/2018/06/01/improving-dns-privacy-in-firefox/">encourage you to</a>.</p>
-
- <p>We’d like to turn this on as the default for all of our users. We believe that every one of our users deserves this privacy and security, no matter if they understand DNS leaks or not.</p>
-
- <p>But it’s a big change and we need to test it out first. That’s why we’re conducting a study. We’re asking half of our <a href="https://www.mozilla.org/firefox/channel/desktop/#nightly">Firefox Nightly</a> users to help us collect data on performance.</p>
-
- <p>We’ll use the default resolver, as we do now, but we’ll also send the request to Cloudflare’s DoH resolver. Then we’ll compare the two to make sure that everything is working as we expect.</p>
-
- <p>For participants in the study, the Cloudflare DNS response won’t be used yet. We’re simply checking that everything works, and then throwing away the Cloudflare response.</p>
-
- <p><a href="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/05_01.png"><img class="alignnone size-large wp-image-32314" src="https://2r4s9p1yi1fa2jd7j43zph8r-wpengine.netdna-ssl.com/files/2018/05/05_01-500x293.png" alt="diagram showing a person timing both and then throwing away Cloudflare response" srcset="https://hacks.mozilla.org/files/2018/05/05_01-500x293.png 500w, https://hacks.mozilla.org/files/2018/05/05_01-250x146.png 250w, https://hacks.mozilla.org/files/2018/05/05_01-768x450.png 768w" sizes="(max-width: 500px) 100vw, 500px"/></a></p>
-
- <p>We are thankful to have the support of our Nightly users — the people who help us test Firefox every day — and we hope that you will help us test this, too.</p>
- </article>
- </section>
-
-
- <nav id="jumpto">
- <p>
- <a href="/david/blog/">Accueil du blog</a> |
- <a href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/">Source originale</a> |
- <a href="/david/stream/2019/">Accueil du flux</a>
- </p>
- </nav>
-
- <footer>
- <div>
- <img src="/static/david/david-larlet-avatar.jpg" loading="lazy" class="avatar" width="200" height="200">
- <p>
- Bonjour/Hi!
- Je suis <a href="/david/" title="Profil public">David Larlet</a>, je vis actuellement à Montréal et j’alimente cet espace depuis 15 ans. <br>
- Si tu as apprécié cette lecture, n’hésite pas à poursuivre ton exploration. Par exemple via les <a href="/david/blog/" title="Expériences bienveillantes">réflexions bimestrielles</a>, la <a href="/david/stream/2019/" title="Pensées (dés)articulées">veille hebdomadaire</a> ou en t’abonnant au <a href="/david/log/" title="S’abonner aux publications via RSS">flux RSS</a> (<a href="/david/blog/2019/flux-rss/" title="Tiens c’est quoi un flux RSS ?">so 2005</a>).
- </p>
- <p>
- Je m’intéresse à la place que je peux avoir dans ce monde. En tant qu’humain, en tant que membre d’une famille et en tant qu’associé d’une coopérative. De temps en temps, je fais aussi des <a href="https://github.com/davidbgk" title="Principalement sur Github mais aussi ailleurs">trucs techniques</a>. Et encore plus rarement, <a href="/david/talks/" title="En ce moment je laisse plutôt la place aux autres">j’en parle</a>.
- </p>
-
- <p>
- Voici quelques articles choisis :
- <a href="/david/blog/2019/faire-equipe/" title="Accéder à l’article complet">Faire équipe</a>,
- <a href="/david/blog/2018/bivouac-automnal/" title="Accéder à l’article complet">Bivouac automnal</a>,
- <a href="/david/blog/2018/commodite-effondrement/" title="Accéder à l’article complet">Commodité et effondrement</a>,
- <a href="/david/blog/2017/donnees-communs/" title="Accéder à l’article complet">Des données aux communs</a>,
- <a href="/david/blog/2016/accompagner-enfant/" title="Accéder à l’article complet">Accompagner un enfant</a>,
- <a href="/david/blog/2016/senior-developer/" title="Accéder à l’article complet">Senior developer</a>,
- <a href="/david/blog/2016/illusion-sociale/" title="Accéder à l’article complet">L’illusion sociale</a>,
- <a href="/david/blog/2016/instantane-scopyleft/" title="Accéder à l’article complet">Instantané Scopyleft</a>,
- <a href="/david/blog/2016/enseigner-web/" title="Accéder à l’article complet">Enseigner le Web</a>,
- <a href="/david/blog/2016/simplicite-defaut/" title="Accéder à l’article complet">Simplicité par défaut</a>,
- <a href="/david/blog/2016/minimalisme-esthetique/" title="Accéder à l’article complet">Minimalisme et esthétique</a>,
- <a href="/david/blog/2014/un-web-omni-present/" title="Accéder à l’article complet">Un web omni-présent</a>,
- <a href="/david/blog/2014/manifeste-developpeur/" title="Accéder à l’article complet">Manifeste de développeur</a>,
- <a href="/david/blog/2013/confort-convivialite/" title="Accéder à l’article complet">Confort et convivialité</a>,
- <a href="/david/blog/2013/testament-numerique/" title="Accéder à l’article complet">Testament numérique</a>,
- et <a href="/david/blog/" title="Accéder aux archives">bien d’autres…</a>
- </p>
- <p>
- On peut <a href="mailto:david%40larlet.fr" title="Envoyer un courriel">échanger par courriel</a>. Si éventuellement tu souhaites que l’on travaille ensemble, tu devrais commencer par consulter le <a href="http://larlet.com">profil dédié à mon activité professionnelle</a> et/ou contacter directement <a href="http://scopyleft.fr/">scopyleft</a>, la <abbr title="Société coopérative et participative">SCOP</abbr> dont je fais partie depuis six ans. Je recommande au préalable de lire <a href="/david/blog/2018/cout-site/" title="Attention ce qui va suivre peut vous choquer">combien coûte un site</a> et pourquoi je suis plutôt favorable à une <a href="/david/pro/devis/" title="Discutons-en !">non-demande de devis</a>.
- </p>
- <p>
- Je ne traque pas ta navigation mais mon
- <abbr title="Alwaysdata, 62 rue Tiquetonne 75002 Paris, +33.184162340">hébergeur</abbr>
- conserve des logs d’accès.
- </p>
- </div>
- </footer>
- <script type="text/javascript">
- ;(_ => {
- const jumper = document.getElementById('jumper')
- jumper.addEventListener('click', e => {
- e.preventDefault()
- const anchor = e.target.getAttribute('href')
- const targetEl = document.getElementById(anchor.substring(1))
- targetEl.scrollIntoView({behavior: 'smooth'})
- })
- })()
- </script>
|