Firefox 143 for Android to introduce DoH

Why browser-level DoH on Android?

  • Many argue the main reason is privacy from the OS vendor (Android = Google). Users may prefer to trust a browser over the OS stack.
  • Browser-level DoH reduces the number of parties that see DNS queries (no OS, VPN app, or OEM resolver in the path).
  • Android’s DNS features are version- and vendor-dependent; not all devices or ROMs support DoH/DoT consistently.
  • Firefox can offer clear UI controls for enabling/disabling DoH and choosing resolvers, which Android typically does not.
  • Firefox uses a curated list of “trusted recursive resolvers” with contractual privacy guarantees, unlike opaque OS behavior.

Privacy, leaks, and limitations

  • Several comments point out that DoH alone doesn’t hide which site you visit: IPs and TLS metadata still leak information.
  • Others note that Firefox pairs DoH with Encrypted Client Hello (ECH), which together better conceal domains from on-path observers.
  • Android VPN and “privacy” features have had DNS and connectivity-check leaks, making in-app DoH attractive for those who don’t trust the OS.

DoH providers, centralization, and trade-offs

  • Suggested providers: Quad9, Mullvad, NextDNS, ffmuc, Wikimedia’s experimental service, self-hosted DoH (with caveats).
  • Quad9 is praised for global coverage and strict IP-handling policies; Mullvad for privacy/ad-blocking but limited geography.
  • Cloudflare’s short-term logging and sampled packet retention raise concerns for some; others see that as acceptable.
  • Centralization is a major worry: defaulting to a few big DoH resolvers shifts visibility from ISPs to large global players.
  • Techniques like splitting queries across multiple resolvers are discussed but may unintentionally leak more information per “site.”

Impact on local/self-hosted DNS

  • Operators of home or custom DNS lose transparent control when browsers bypass DHCP-provided resolvers via hardcoded DoH.
  • This breaks internal split-horizon DNS and local overrides unless clients are explicitly configured.
  • RFC 9463 is mentioned as a mechanism to advertise DoH endpoints via DHCP, but tooling support is still lacking.

DoH vs DoT and technical details

  • Android is noted as primarily supporting DoT, not DoH; Firefox chooses DoH because it blends into normal HTTPS (port 443) and circumvents ISPs that block third-party DNS.
  • Some note that, since Firefox is a browser and the DoH spec’s lead author had browser background, HTTP tooling and expertise made DoH a natural fit.

Disabling or controlling DoH on networks

  • Network operators wanting to block DoH face difficulty because it’s just TLS on port 443.
  • Options mentioned: IP/SNI blocking of known DoH hosts, or full TLS interception and strict egress firewalls; both are imperfect or heavy-handed.

Firefox for Android UX and alternatives

  • Opinions on Firefox Android performance are split: some report severe lag and poor background behavior; others find it fine even on older hardware.
  • Many continue using it solely for full uBlock Origin support.
  • Alternatives discussed: Brave, Orion (iOS), Lemur, Kiwi, Vivaldi, Samsung Browser with adblock extensions, and Edge Canary with extension support.
  • Some prefer DNS-level adblocking (Pi-hole/AdGuard Home + VPN/Tailscale), while others say this is less effective than in-browser blocking.