DoH disabled by default in Firefox

Contributed by Paul 'WEiRD' de Weerd on 2019-09-11 from the put-your-names-in-the-crypt dept. On Monday, Otto ([email protected]) committed a small but significant change to the Firefox port.
Date: Mon, 9 Sep 2019 12:50:35 -0600 (MDT)
From: Otto Moerbeek <[email protected][elided]>
To: [email protected]
Subject: CVS: cvs.openbsd.org: ports
Sender: [email protected]

CVSROOT:        /cvs
Module name:    ports
Changes by:     [email protected]    2019/09/09 12:50:35

Modified files:
        www/mozilla-firefox: Makefile
        www/mozilla-firefox/files: all-openbsd.js

Log message:
Disable DoH by default.  While encrypting DNS might be a good thing,
sending all DNS traffic to Cloudflare by default is not a good idea.
Applications should respect OS configured settings.
The DoH settings still can be overriden if needed. ok [email protected] [email protected]
If you are running your own DNS over HTTPS (DoH) server, you may want to point Firefox at it using the network.trr.uri configuration option in about:config, and overriding the network.trr.mode setting from Otto's change to 3. For more details on how to configure Firefox's use of DoH, please see their wiki.

Similar Articles:

Mozilla plans to roll out DNS over HTTPS to US users in late September 2019

Mozilla plans to roll out DNS over HTTPS to US users in late September 2019

DNS-over-HTTPS Policy Requirements for Resolvers

DNS-over-HTTPS Policy Requirements for Resolvers

Protections Against Fingerprinting and Cryptocurrency Mining Available in Firefox Nightly and Beta

Protections Against Fingerprinting and Cryptocurrency Mining Available in Firefox Nightly and Beta

DNS over HTTPS is coming whether ISPs and governments like it or not

DNS over HTTPS is coming whether ISPs and governments like it or not