SlideShare a Scribd company logo
© Men & Mice http://menandmice.com
How to send DNS over
anything encrypted
1
© Men & Mice http://menandmice.com
Agenda
The DNS-Privacy group (DPRIVE) inside the Internet Engineering
Task Force (IETF), as well as a number of dedicated people outside
the IETF, are working on new transport protocols to allow for
encrypting DNS traffic between DNS clients and resolvers. Current
developments include:
•DNS over TLS (RFC 7858)
•DNS over DTLS (RFC 8094)
•DNS over HTTP(S) (ID-draft)
•DNS over QUIC (ID-draft)
•DNS over DNSCrypt (outside IETF)
•DNS over TOR (outside IETF)
2
© Men & Mice http://menandmice.com
DNS Privacy
3
© Men & Mice http://menandmice.com
DNS is Metadata
•IETF started the DPRIVE (DNS Privacy Working
Group) after the Snowden revelations
•RFC 7626 DNS Privacy Considerations

https://tools.ietf.org/html/rfc7626
•current focus of DPRIVE is the client to resolver
channel
•creating protocols that are stealthy sometimes
painfully collides with clean protocol design
4
© Men & Mice http://menandmice.com
DNS OVER TLS
5
© Men & Mice http://menandmice.com
DNS-over-TLS
•RFC 7858 Specification for DNS over Transport
Layer Security (TLS)
•DNS wireformat over TLS over TCP
•Port 853 (TCP)
•encryption and authentication
6
© Men & Mice http://menandmice.com
DNS-over-TLS Performance
•performance of DNS-over-TLS can be quite good
•for existing sessions with TLS 1.3 as good as DNS-
over-UDP
•pipelining
•TCP fast open
•0-RTT resume
•current implementations are not optimized
7
© Men & Mice http://menandmice.com
DNS-over-TLS Implementations
•Client
•Unbound (as local forwarder)
•Stubby (getdnsapi)
•dnsfwd
•Server
•Unbound (as remote resolver)
•Knot
•any DNS server via stunnel
8
© Men & Mice http://menandmice.com
DNS-over-TLS Developments
•TLS 1.3 deployment stalled because of
misbehaving middle-boxes (BlueCoat)
•controversial in the IETF, but useful: multiplexing
HTTPS and DNS on port 443
•https://gitlab.com/dkg/hddemux
9
© Men & Mice http://menandmice.com
DNS OVER DTLS
10
© Men & Mice http://menandmice.com
DNS-over-DTLS
•RFC 8094 DNS over Datagram Transport Layer
Security (DTLS)
•DNS wireformat over TLS over UDP
•Port 853 (UDP)
•encryption and authentication
11
© Men & Mice http://menandmice.com
DNS-over-DTLS Issues
•adversary can block DNS queries
•resource exhaustion attacks against DNS server
possible
•no known implementations
12
© Men & Mice http://menandmice.com
DNS OVER HTTP(S)
13
© Men & Mice http://menandmice.com
DNS-over-HTTP(S)
•IETF Internet Draft DNS Queries over HTTPS

https://tools.ietf.org/html/draft-hoffman-dns-over-https
•DNS HTTP-Format over HTTPS over TCP
•Port 443 (HTTP/2)
•URL: https://server/.well-known/dns-query
•base64url encoded DNS data, Content-Header

application/dns-udpwireformat
•encryption and authentication
14
© Men & Mice http://menandmice.com
DNS-over-HTTP(S) Benefits
•HTTPS might be the only option in highly
firewalled networks
•easy to implement for (Web-)Developers
(JavaScript etc)
15
© Men & Mice http://menandmice.com
DNS-over-HTTP(S) additional
documents
•Representing DNS Messages in JSON

https://tools.ietf.org/html/draft-hoffman-dns-in-json
•DNS Messages in XML (expired)

https://tools.ietf.org/html/draft-mohan-dns-query-xml
16
© Men & Mice http://menandmice.com
DNS-over-HTTP(S) 

similar implementations
•DNS over JSON over HTTPS over TCP
•Google DNS Server-Side

https://developers.google.com/speed/public-dns/docs/dns-
over-https
•dingo - A DNS client in Go that supports Google DNS
over HTTPS

https://github.com/pforemski/dingo
•CoreDNS

https://coredns.io/2016/11/26/dns-over-https/
17
© Men & Mice http://menandmice.com
DNS-WIREFORMAT OVER
HTTPS
18
© Men & Mice http://menandmice.com
DNS-Wireformat-over-HTTP(S)
•DNS wireformat over HTTP(S) over TCP
•Internet Draft DNS wire-format over HTTP

https://tools.ietf.org/html/draft-ietf-dnsop-dns-wireformat-http
•Port 80 or 443 (HTTP 1.1 or HTTP/2)
•URL: https://server/.well-known/dns-wireformat
•Content-Header application/dns-wireformat
•may provide encryption and authentication
•DNS wire-format data is wrapped with an HTTP header and
transmitted on port 80 or 443
19
© Men & Mice http://menandmice.com
DNS OVER QUIC
20
© Men & Mice http://menandmice.com
DNS-Wireformat-over-HTTP(S)
•DNS over QUIC over UDP
•Specification of DNS over Dedicated QUIC
Connections

https://tools.ietf.org/html/draft-huitema-quic-dnsoquic
21
© Men & Mice http://menandmice.com
DNS-over-QUIC
•modern TCP replacement from Google, now
standardised in the IETF
•uses UDP, implements TCP features
•usually implemented in applications, not OS kernel
•includes TLS 1.3
•0-RTT
•performance in-par with DNS-over-UDP
•QUIC Documents https://tools.ietf.org/wg/quic/
22
© Men & Mice http://menandmice.com
DNS-over-QUIC Comparison
23
Source: https://datatracker.ietf.org/meeting/99/materials/slides-99-dprive-dns-over-quic
© Men & Mice http://menandmice.com
DNS OVER OPPORTUNISTIC
IPSEC
24
© Men & Mice http://menandmice.com
DNS OVER OPPORTUNISTIC IPSEC
•DNS over UDP or TCP over IPSec
•DNS queries will be tunnelled via IPSec
•provides encryption (but only limited
authentication)
•Unauthenticated Opportunistic IPsec

https://libreswan.org/wiki/
HOWTO:_Unauthenticated_Opportunistic_IPsec
25
© Men & Mice http://menandmice.com
DNS-over-opportunistic IPSEC
Implementations
• LibreSWAN and Unbound (IPSec Module)
26
© Men & Mice http://menandmice.com
DNS-over-opportunistic IPSEC
additional work
•make IPSec work in case of heavy firewalling: 

RFC 8229 TCP Encapsulation of IKE and IPsec
Packets
•allows IPSec to work on Port 443 

(multiplexed with HTTPS)
27
© Men & Mice http://menandmice.com
DNS OVER DNSCrypt
28
© Men & Mice http://menandmice.com
DNS OVER DNSCrypt
•DNS over DNSCrypt over UDP or TCP
•DNSCrypt is a DNS privacy solution originally developed
by OpenDNS (now Cisco)
•encryption and authentication
•protocol is open source, but somewhat underdocumented
•client operates a DNS proxy that tunnels DNS over
DNSCrypt
•some, but not all DNSCrypt resolver support DNSSEC
29
© Men & Mice http://menandmice.com
DNS OVER Tor
30
© Men & Mice http://menandmice.com
DNS OVER TOR
•DNS over Tor over TCP
•Port 9053
•Tor client proxies the DNS queries through a tor
circuit
•only A/AAAA-Records supported (no TXT, MX, SOA …)
•no DNSSEC, rogue Tor exit node can spoof DNS traffic
•> 30 % of Tor exit nodes use Google public DNS
31
© Men & Mice http://menandmice.com
Padding of DNS data
32
© Men & Mice http://menandmice.com
DNS padding
•DNS query/responses are small data chunks
•traffic analysis might be acute when dealing with
DNS queries
•the IETF is working on padding schemes for DNS
to make traffic analysis more difficult
•RFC 7830 The EDNS(0) Padding Option
•Padding Policy for EDNS(0)

https://tools.ietf.org/html/draft-ietf-dprive-padding-policy
33
© Men & Mice http://menandmice.com
Performance
34
© Men & Mice http://menandmice.com
Performance 

Alexa Top 1000 domains
35
© Men & Mice http://menandmice.com
Performance 

1000 DNS queries from office network
36
© Men & Mice http://menandmice.com
Links
37
© Men & Mice http://menandmice.com
Informational resources
•DNS Privacy Project

https://dnsprivacy.org
•Specification for DNS over Transport Layer Security (TLS)

https://tools.ietf.org/html/rfc7858
•public DNS resolver with DNS over TLS

https://dnsprivacy.org/wiki/display/DP/
DNS+Privacy+Test+Servers
•HDDMUX sourcecode

https://0xacab.org/dkg/hddemux
38
© Men & Mice http://menandmice.com
Informational resources
•DNSCrypt

https://dnscrypt.org/
• DNSCrypt-proxy

https://github.com/jedisct1/dnscrypt-proxy
•list of DNSCrypt-Resolver

https://dnscrypt.org/dnscrypt-resolvers.html
•Simple DNSCrypt for Windows

https://simplednscrypt.org/
•DNSCrypt GUI für macOS

https://github.com/alterstep/dnscrypt-osxclient
•DNSCrypt Blacklist Konfiguration

https://github.com/jedisct1/dnscrypt-proxy/blob/master/contrib/domains-
blacklist.conf
39
© Men & Mice http://menandmice.com
Informational resources
•Tor-Project

https://torproject.org
• The Effect of DNS on Tor’s Anonymity

https://freedom-to-tinker.com/2016/09/29/the-
effect-of-dns-on-tors-anonymity/
• DNS-over-TLS Forwarder

https://github.com/randomstuff/dnsfwd
40
© Men & Mice http://menandmice.com
Next
41
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction to DNS & BIND Hands-On Class
•September 18 – 20, 2017 (Zurich, Switzerland)
42
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction & Advanced DNS and BIND Topics
Hands-On Class
•September 18 – 22, 2017 (Zurich, Switzerland)
43
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•DNSSEC and DANE (German Language)
•December 4-12, 2017, Essen, DE
44
http://linuxhotel.de/
© Men & Mice http://menandmice.com
Thank you!
Questions? Comments?
45

More Related Content

What's hot

BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
Men and Mice
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
Men and Mice
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
Men and Mice
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
Men and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
Men and Mice
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANE
Men and Mice
 
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
APNIC
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
Men and Mice
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
Men and Mice
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
Alex Mayrhofer
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNI
Jisc
 
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAILDNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
Utah Networxs Consultoria e Treinamento
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
APNIC
 
Passive DNS Collection – Henry Stern, Cisco
Passive DNS Collection – Henry Stern, CiscoPassive DNS Collection – Henry Stern, Cisco
Passive DNS Collection – Henry Stern, CiscoHenry Stern
 
Troubleshooting Tips from a Docker Support Engineer
Troubleshooting Tips from a Docker Support EngineerTroubleshooting Tips from a Docker Support Engineer
Troubleshooting Tips from a Docker Support Engineer
Jeff Anderson
 
Windows 2012 and DNSSEC
Windows 2012 and DNSSECWindows 2012 and DNSSEC
Windows 2012 and DNSSEC
Men and Mice
 
Get your instance by name integration of nova, neutron and designate
Get your instance by name  integration of nova, neutron and designateGet your instance by name  integration of nova, neutron and designate
Get your instance by name integration of nova, neutron and designate
Miguel Lavalle
 
DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013
Shumon Huque
 
Debugging Network Issues
Debugging Network IssuesDebugging Network Issues
Debugging Network Issues
Apcera
 

What's hot (20)

BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANE
 
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNI
 
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAILDNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
Passive DNS Collection – Henry Stern, Cisco
Passive DNS Collection – Henry Stern, CiscoPassive DNS Collection – Henry Stern, Cisco
Passive DNS Collection – Henry Stern, Cisco
 
Troubleshooting Tips from a Docker Support Engineer
Troubleshooting Tips from a Docker Support EngineerTroubleshooting Tips from a Docker Support Engineer
Troubleshooting Tips from a Docker Support Engineer
 
Windows 2012 and DNSSEC
Windows 2012 and DNSSECWindows 2012 and DNSSEC
Windows 2012 and DNSSEC
 
Get your instance by name integration of nova, neutron and designate
Get your instance by name  integration of nova, neutron and designateGet your instance by name  integration of nova, neutron and designate
Get your instance by name integration of nova, neutron and designate
 
Dnssec
DnssecDnssec
Dnssec
 
DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013
 
Debugging Network Issues
Debugging Network IssuesDebugging Network Issues
Debugging Network Issues
 

Viewers also liked

Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice Suite
Men and Mice
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Canada
 
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) OverviewDerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
ThreatReel Podcast
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
CheapSSLsecurity
 
Umbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerUmbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerOpenDNS
 
Microsoft Cyber Security IT-Camp
Microsoft Cyber Security IT-CampMicrosoft Cyber Security IT-Camp
Microsoft Cyber Security IT-Camp
Alexander Benoit
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
ecarrow
 
OISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) OverviewOISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) Overview
ThreatReel Podcast
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
OpenDNS
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Canada
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
Kabul Education University
 
Tcp udp
Tcp udpTcp udp
Tcp udp
Programmer
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
ecarrow
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
CheapSSLsecurity
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
ThreatReel Podcast
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Canada
 

Viewers also liked (20)

Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice Suite
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) OverviewDerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
 
Umbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerUmbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic Worker
 
Microsoft Cyber Security IT-Camp
Microsoft Cyber Security IT-CampMicrosoft Cyber Security IT-Camp
Microsoft Cyber Security IT-Camp
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
OISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) OverviewOISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) Overview
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Dns ppt
Dns pptDns ppt
Dns ppt
 

Similar to How to send DNS over anything encrypted

Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenchesInternet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
APNIC
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
Deploy360 Programme (Internet Society)
 
Juglouvain http revisited
Juglouvain http revisitedJuglouvain http revisited
Juglouvain http revisited
marctritschler
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
Dan York
 
Qunog12-DNS暗号化
Qunog12-DNS暗号化Qunog12-DNS暗号化
Qunog12-DNS暗号化
Manabu Sonoda
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Positive Hack Days
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
SFMap (TMA 2015)
SFMap (TMA 2015)SFMap (TMA 2015)
SFMap (TMA 2015)
mori_tatsuya
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
APNIC
 
Introduction To The DANE Protocol (DNSSEC)
Introduction To The DANE Protocol  (DNSSEC)Introduction To The DANE Protocol  (DNSSEC)
Introduction To The DANE Protocol (DNSSEC)
Deploy360 Programme (Internet Society)
 
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
Deploy360 Programme (Internet Society)
 
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUICA new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
APNIC
 
Juglouvain http revisited
Juglouvain http revisitedJuglouvain http revisited
Juglouvain http revisited
Marc Tritschler
 
Encrypted DNS research @ nic.at
Encrypted DNS research @ nic.atEncrypted DNS research @ nic.at
Encrypted DNS research @ nic.at
Alex Mayrhofer
 
DNS resolver 1.1.1.1 from Cloudflare
DNS resolver 1.1.1.1 from CloudflareDNS resolver 1.1.1.1 from Cloudflare
DNS resolver 1.1.1.1 from Cloudflare
APNIC
 
Nginx, PHP, Apache and Spelix
Nginx, PHP, Apache and SpelixNginx, PHP, Apache and Spelix
Nginx, PHP, Apache and Spelix
Harald Zeitlhofer
 
WebRTC standards update - November 2014
WebRTC standards update - November 2014WebRTC standards update - November 2014
WebRTC standards update - November 2014
Victor Pascual Ávila
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
DNS Entrepreneurship Center
 
Understanding DNS Security
Understanding DNS SecurityUnderstanding DNS Security
Understanding DNS Security
Nihal Pasham, CISSP
 
getdns PyCon presentation
getdns PyCon presentationgetdns PyCon presentation
getdns PyCon presentation
Melinda Shore
 

Similar to How to send DNS over anything encrypted (20)

Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenchesInternet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 
Juglouvain http revisited
Juglouvain http revisitedJuglouvain http revisited
Juglouvain http revisited
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
 
Qunog12-DNS暗号化
Qunog12-DNS暗号化Qunog12-DNS暗号化
Qunog12-DNS暗号化
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
SFMap (TMA 2015)
SFMap (TMA 2015)SFMap (TMA 2015)
SFMap (TMA 2015)
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
Introduction To The DANE Protocol (DNSSEC)
Introduction To The DANE Protocol  (DNSSEC)Introduction To The DANE Protocol  (DNSSEC)
Introduction To The DANE Protocol (DNSSEC)
 
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
 
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUICA new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
 
Juglouvain http revisited
Juglouvain http revisitedJuglouvain http revisited
Juglouvain http revisited
 
Encrypted DNS research @ nic.at
Encrypted DNS research @ nic.atEncrypted DNS research @ nic.at
Encrypted DNS research @ nic.at
 
DNS resolver 1.1.1.1 from Cloudflare
DNS resolver 1.1.1.1 from CloudflareDNS resolver 1.1.1.1 from Cloudflare
DNS resolver 1.1.1.1 from Cloudflare
 
Nginx, PHP, Apache and Spelix
Nginx, PHP, Apache and SpelixNginx, PHP, Apache and Spelix
Nginx, PHP, Apache and Spelix
 
WebRTC standards update - November 2014
WebRTC standards update - November 2014WebRTC standards update - November 2014
WebRTC standards update - November 2014
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
Understanding DNS Security
Understanding DNS SecurityUnderstanding DNS Security
Understanding DNS Security
 
getdns PyCon presentation
getdns PyCon presentationgetdns PyCon presentation
getdns PyCon presentation
 

More from Men and Mice

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Men and Mice
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
Men and Mice
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
Men and Mice
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
Men and Mice
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review Webinar
Men and Mice
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
Men and Mice
 
DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
Men and Mice
 
IETF 92 Webinar
IETF 92 WebinarIETF 92 Webinar
IETF 92 Webinar
Men and Mice
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
Men and Mice
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
Men and Mice
 
DNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedDNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloaded
Men and Mice
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANE
Men and Mice
 
RIPE 68 Webinar
RIPE 68 WebinarRIPE 68 Webinar
RIPE 68 Webinar
Men and Mice
 

More from Men and Mice (13)

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review Webinar
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
 
DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
 
IETF 92 Webinar
IETF 92 WebinarIETF 92 Webinar
IETF 92 Webinar
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
 
DNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedDNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloaded
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANE
 
RIPE 68 Webinar
RIPE 68 WebinarRIPE 68 Webinar
RIPE 68 Webinar
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

How to send DNS over anything encrypted

  • 1. © Men & Mice http://menandmice.com How to send DNS over anything encrypted 1
  • 2. © Men & Mice http://menandmice.com Agenda The DNS-Privacy group (DPRIVE) inside the Internet Engineering Task Force (IETF), as well as a number of dedicated people outside the IETF, are working on new transport protocols to allow for encrypting DNS traffic between DNS clients and resolvers. Current developments include: •DNS over TLS (RFC 7858) •DNS over DTLS (RFC 8094) •DNS over HTTP(S) (ID-draft) •DNS over QUIC (ID-draft) •DNS over DNSCrypt (outside IETF) •DNS over TOR (outside IETF) 2
  • 3. © Men & Mice http://menandmice.com DNS Privacy 3
  • 4. © Men & Mice http://menandmice.com DNS is Metadata •IETF started the DPRIVE (DNS Privacy Working Group) after the Snowden revelations •RFC 7626 DNS Privacy Considerations
 https://tools.ietf.org/html/rfc7626 •current focus of DPRIVE is the client to resolver channel •creating protocols that are stealthy sometimes painfully collides with clean protocol design 4
  • 5. © Men & Mice http://menandmice.com DNS OVER TLS 5
  • 6. © Men & Mice http://menandmice.com DNS-over-TLS •RFC 7858 Specification for DNS over Transport Layer Security (TLS) •DNS wireformat over TLS over TCP •Port 853 (TCP) •encryption and authentication 6
  • 7. © Men & Mice http://menandmice.com DNS-over-TLS Performance •performance of DNS-over-TLS can be quite good •for existing sessions with TLS 1.3 as good as DNS- over-UDP •pipelining •TCP fast open •0-RTT resume •current implementations are not optimized 7
  • 8. © Men & Mice http://menandmice.com DNS-over-TLS Implementations •Client •Unbound (as local forwarder) •Stubby (getdnsapi) •dnsfwd •Server •Unbound (as remote resolver) •Knot •any DNS server via stunnel 8
  • 9. © Men & Mice http://menandmice.com DNS-over-TLS Developments •TLS 1.3 deployment stalled because of misbehaving middle-boxes (BlueCoat) •controversial in the IETF, but useful: multiplexing HTTPS and DNS on port 443 •https://gitlab.com/dkg/hddemux 9
  • 10. © Men & Mice http://menandmice.com DNS OVER DTLS 10
  • 11. © Men & Mice http://menandmice.com DNS-over-DTLS •RFC 8094 DNS over Datagram Transport Layer Security (DTLS) •DNS wireformat over TLS over UDP •Port 853 (UDP) •encryption and authentication 11
  • 12. © Men & Mice http://menandmice.com DNS-over-DTLS Issues •adversary can block DNS queries •resource exhaustion attacks against DNS server possible •no known implementations 12
  • 13. © Men & Mice http://menandmice.com DNS OVER HTTP(S) 13
  • 14. © Men & Mice http://menandmice.com DNS-over-HTTP(S) •IETF Internet Draft DNS Queries over HTTPS
 https://tools.ietf.org/html/draft-hoffman-dns-over-https •DNS HTTP-Format over HTTPS over TCP •Port 443 (HTTP/2) •URL: https://server/.well-known/dns-query •base64url encoded DNS data, Content-Header
 application/dns-udpwireformat •encryption and authentication 14
  • 15. © Men & Mice http://menandmice.com DNS-over-HTTP(S) Benefits •HTTPS might be the only option in highly firewalled networks •easy to implement for (Web-)Developers (JavaScript etc) 15
  • 16. © Men & Mice http://menandmice.com DNS-over-HTTP(S) additional documents •Representing DNS Messages in JSON
 https://tools.ietf.org/html/draft-hoffman-dns-in-json •DNS Messages in XML (expired)
 https://tools.ietf.org/html/draft-mohan-dns-query-xml 16
  • 17. © Men & Mice http://menandmice.com DNS-over-HTTP(S) 
 similar implementations •DNS over JSON over HTTPS over TCP •Google DNS Server-Side
 https://developers.google.com/speed/public-dns/docs/dns- over-https •dingo - A DNS client in Go that supports Google DNS over HTTPS
 https://github.com/pforemski/dingo •CoreDNS
 https://coredns.io/2016/11/26/dns-over-https/ 17
  • 18. © Men & Mice http://menandmice.com DNS-WIREFORMAT OVER HTTPS 18
  • 19. © Men & Mice http://menandmice.com DNS-Wireformat-over-HTTP(S) •DNS wireformat over HTTP(S) over TCP •Internet Draft DNS wire-format over HTTP
 https://tools.ietf.org/html/draft-ietf-dnsop-dns-wireformat-http •Port 80 or 443 (HTTP 1.1 or HTTP/2) •URL: https://server/.well-known/dns-wireformat •Content-Header application/dns-wireformat •may provide encryption and authentication •DNS wire-format data is wrapped with an HTTP header and transmitted on port 80 or 443 19
  • 20. © Men & Mice http://menandmice.com DNS OVER QUIC 20
  • 21. © Men & Mice http://menandmice.com DNS-Wireformat-over-HTTP(S) •DNS over QUIC over UDP •Specification of DNS over Dedicated QUIC Connections
 https://tools.ietf.org/html/draft-huitema-quic-dnsoquic 21
  • 22. © Men & Mice http://menandmice.com DNS-over-QUIC •modern TCP replacement from Google, now standardised in the IETF •uses UDP, implements TCP features •usually implemented in applications, not OS kernel •includes TLS 1.3 •0-RTT •performance in-par with DNS-over-UDP •QUIC Documents https://tools.ietf.org/wg/quic/ 22
  • 23. © Men & Mice http://menandmice.com DNS-over-QUIC Comparison 23 Source: https://datatracker.ietf.org/meeting/99/materials/slides-99-dprive-dns-over-quic
  • 24. © Men & Mice http://menandmice.com DNS OVER OPPORTUNISTIC IPSEC 24
  • 25. © Men & Mice http://menandmice.com DNS OVER OPPORTUNISTIC IPSEC •DNS over UDP or TCP over IPSec •DNS queries will be tunnelled via IPSec •provides encryption (but only limited authentication) •Unauthenticated Opportunistic IPsec
 https://libreswan.org/wiki/ HOWTO:_Unauthenticated_Opportunistic_IPsec 25
  • 26. © Men & Mice http://menandmice.com DNS-over-opportunistic IPSEC Implementations • LibreSWAN and Unbound (IPSec Module) 26
  • 27. © Men & Mice http://menandmice.com DNS-over-opportunistic IPSEC additional work •make IPSec work in case of heavy firewalling: 
 RFC 8229 TCP Encapsulation of IKE and IPsec Packets •allows IPSec to work on Port 443 
 (multiplexed with HTTPS) 27
  • 28. © Men & Mice http://menandmice.com DNS OVER DNSCrypt 28
  • 29. © Men & Mice http://menandmice.com DNS OVER DNSCrypt •DNS over DNSCrypt over UDP or TCP •DNSCrypt is a DNS privacy solution originally developed by OpenDNS (now Cisco) •encryption and authentication •protocol is open source, but somewhat underdocumented •client operates a DNS proxy that tunnels DNS over DNSCrypt •some, but not all DNSCrypt resolver support DNSSEC 29
  • 30. © Men & Mice http://menandmice.com DNS OVER Tor 30
  • 31. © Men & Mice http://menandmice.com DNS OVER TOR •DNS over Tor over TCP •Port 9053 •Tor client proxies the DNS queries through a tor circuit •only A/AAAA-Records supported (no TXT, MX, SOA …) •no DNSSEC, rogue Tor exit node can spoof DNS traffic •> 30 % of Tor exit nodes use Google public DNS 31
  • 32. © Men & Mice http://menandmice.com Padding of DNS data 32
  • 33. © Men & Mice http://menandmice.com DNS padding •DNS query/responses are small data chunks •traffic analysis might be acute when dealing with DNS queries •the IETF is working on padding schemes for DNS to make traffic analysis more difficult •RFC 7830 The EDNS(0) Padding Option •Padding Policy for EDNS(0)
 https://tools.ietf.org/html/draft-ietf-dprive-padding-policy 33
  • 34. © Men & Mice http://menandmice.com Performance 34
  • 35. © Men & Mice http://menandmice.com Performance 
 Alexa Top 1000 domains 35
  • 36. © Men & Mice http://menandmice.com Performance 
 1000 DNS queries from office network 36
  • 37. © Men & Mice http://menandmice.com Links 37
  • 38. © Men & Mice http://menandmice.com Informational resources •DNS Privacy Project
 https://dnsprivacy.org •Specification for DNS over Transport Layer Security (TLS)
 https://tools.ietf.org/html/rfc7858 •public DNS resolver with DNS over TLS
 https://dnsprivacy.org/wiki/display/DP/ DNS+Privacy+Test+Servers •HDDMUX sourcecode
 https://0xacab.org/dkg/hddemux 38
  • 39. © Men & Mice http://menandmice.com Informational resources •DNSCrypt
 https://dnscrypt.org/ • DNSCrypt-proxy
 https://github.com/jedisct1/dnscrypt-proxy •list of DNSCrypt-Resolver
 https://dnscrypt.org/dnscrypt-resolvers.html •Simple DNSCrypt for Windows
 https://simplednscrypt.org/ •DNSCrypt GUI für macOS
 https://github.com/alterstep/dnscrypt-osxclient •DNSCrypt Blacklist Konfiguration
 https://github.com/jedisct1/dnscrypt-proxy/blob/master/contrib/domains- blacklist.conf 39
  • 40. © Men & Mice http://menandmice.com Informational resources •Tor-Project
 https://torproject.org • The Effect of DNS on Tor’s Anonymity
 https://freedom-to-tinker.com/2016/09/29/the- effect-of-dns-on-tors-anonymity/ • DNS-over-TLS Forwarder
 https://github.com/randomstuff/dnsfwd 40
  • 41. © Men & Mice http://menandmice.com Next 41
  • 42. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction to DNS & BIND Hands-On Class •September 18 – 20, 2017 (Zurich, Switzerland) 42 https://www.menandmice.com/training/
  • 43. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction & Advanced DNS and BIND Topics Hands-On Class •September 18 – 22, 2017 (Zurich, Switzerland) 43 https://www.menandmice.com/training/
  • 44. © Men & Mice http://menandmice.com Men & Mice DNS Training •DNSSEC and DANE (German Language) •December 4-12, 2017, Essen, DE 44 http://linuxhotel.de/
  • 45. © Men & Mice http://menandmice.com Thank you! Questions? Comments? 45