Skip to content

Prevent program and malware to bypass DNS filter by using DoH

License

Notifications You must be signed in to change notification settings

pallebone/TheGreatWall

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TitleList

What is DNS-over-HTTPS (DoH) ?

DoH is a protocol introduced in 2018 as a solution to improve DNS security by encrypting queries through HTTPS, which is advertised as a method to prevent your ISP from tracking your activity, allow you to bypass censorship and protect you against DNS data manipulation (MiMT). In the start of 2020, popular web-browser like Mozilla has started to turn DoH by default in the US and others are experimenting it. Microsoft is also considering the addition of DoH in Windows 10.

But wait... DoH isn't supposed to be a good thing ?

While bringing encryption is always an important thing, including in oppressive countries, DoH isn't a bulletproof solution and may actually cause more problem than it solve. The rise of service providing DoH, especially US companies like Google or Cloudflare, could harm your privacy by offering additional tracking capabilities (ex : TLS resumption, which allow to reuse a previous encrypted state for future connection to the same server, could be used to track your browser across IP adress changes) and centralizing DNS traffic into popular DoH resolver.

But moreover, programs and malwares could abuse public DoH provider to evade DNS filtering (like Pihole) and communicate with telemetry service or command-and-control server. See Godlua malware.

⚠️ Disclaimer

Theses lists (updated every month) has been created for security purpose ONLY. There are not a tool to prevent your employee from bypassing the fact that you're monitoring/blocking their online activity ! If you suspect your entity to do so, consider using a VPN or Tor Browser.

You can also block port 853 for DNS over TLS (DoT)

An alternative way : increase DoH visibility

Blocking DoH entirely might not be the best approch for everyone, especially if your company wants the benefits of using encrypted DNS while being able to analyse suspicious communications. This paper demonstrate the possibility of redirecting all traffic from port 453 to PolarProxy and Security Onion, allowing you to analyse DoH traffic in an unencrypted form.

Additionnal ressources 📘

* Wall icon drawed by Eucalyp (flaticon.com)

About

Prevent program and malware to bypass DNS filter by using DoH

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published