
Originally Posted by
DuckHook
Wow.
A world of issues to unpack in your questions. Here's my attempt. In no particular order:
IPv6 is the wave of the future. It cannot be avoided. We have run out of IPv4 space and the only option going forward is IPv6. But do I use it? No. I have it turned off. In fact, IPv6 cannot get through my router firewall. Why? Because it opens up an entirely new and massive attack surface. For now, I can get to wherever I want to go using IPv4 alone. So, until I get my head wrapped around IPv6, and until I am forced to use it by necessity, I am too lazy to learn it. But it must be confessed, these are my limitations; not those of IPv6. On its own, IPv6 has awesome potential. Technically, it allows every connectable device to have its own unique IP address. Think about that. No more NATs, no more ugly kludges that break connectivity, no more having to mess around with port forwardings, bindings and other techno‑nonsense. Packets get delivered from one precise point of origin to another precise destination—end of story. Of course, this opens up an entire world of exposure and risk (which I've already alluded to) but that's the price we pay these days for massively better utility.
There are few disadvantages to disabling IPv6. But that's only because the foundational web of today is still mired in IPv4. Those who use IPv6 are way ahead of the game and have access to utility denied to the rest of us. If you run a massive shipping concern that tracks its assets using embedded IoT devices, then IPv6 cannot be turned off. The benefit is that you could see where every pallet of goods is all over the world in real time. But if you are an ordinary Joe like all consumers, then IPv6 will hardly be noticeable… for now.
DoT is not better than DoH. Nor is DoH better than DoT. They do a similar job differently and both have advantages and disadvantages. Both are designed to stop intermediaries and data carriers (like your ISP) from snooping on your DNS queries. They do so through the theoretically simple expedient of leveraging already proven encryption technology to encrypt your DNS traffic which, until now, has generally been sent in the clear. So, while the actual data that you exchange with your bank is encrypted, the fact that you were visiting your banking site was open and accessible to anyone interested in seeing this. But note that while this is theoretically simple, it is applicably complex.
DoT is the older tech, but only slightly. It borrows the TLS mechanism that your browser uses and treats it as a separate tool to encrypt your DNS traffic. The fact that it acts as a separate tool is important. To do so, it must use a port of its own: I believe it is 853. Without getting too arcane, the practical upshot of this is that evil ISPs or oppressive regimes can continue to spy on you because they can easily cripple DoT by blocking port 853. While my ISP allows this port, I have read that some don't. The benefit of DoT is that it is easier to implement than DoH, especially on standalone apps and use cases where a browser would be unwanted.
DoH works by tunnelling DNS through port 443 which is the port used by all HTTPS traffic. Bad ISPs/regimes cannot block port 443 without also blocking the most important parts of the Internet, so in effect, they cannot block DoH. However, my understanding is that it is harder to implement and requires a browser. I could be wrong. I'm not a programmer and my knowledge in this regard comes only from what I've read.
There's a vast ecosystem of technology behind your seemingly simple queries that I haven't touched on. There's DNSSEC and MitM avoidance and browser fingerprinting, and blah‑blah‑blah. The above explanation is only the quickest and dirtiest of summaries. You cannot hope to get your head properly wrapped around these issues by asking on a forum. It involves a lot of reading and research, which is readily available using even the simplest web search. As a launching point, and even though it is regularly scoffed at by real experts, I have found Wikipedia to be invaluable.
Bookmarks