SlideShare ist ein Scribd-Unternehmen logo
1 von 45
© Men & Mice http://menandmice.com
How to send DNS over
anything encrypted
1
© Men & Mice http://menandmice.com
Agenda
The DNS-Privacy group (DPRIVE) inside the Internet Engineering
Task Force (IETF), as well as a number of dedicated people outside
the IETF, are working on new transport protocols to allow for
encrypting DNS traffic between DNS clients and resolvers. Current
developments include:
•DNS over TLS (RFC 7858)
•DNS over DTLS (RFC 8094)
•DNS over HTTP(S) (ID-draft)
•DNS over QUIC (ID-draft)
•DNS over DNSCrypt (outside IETF)
•DNS over TOR (outside IETF)
2
© Men & Mice http://menandmice.com
DNS Privacy
3
© Men & Mice http://menandmice.com
DNS is Metadata
•IETF started the DPRIVE (DNS Privacy Working
Group) after the Snowden revelations
•RFC 7626 DNS Privacy Considerations

https://tools.ietf.org/html/rfc7626
•current focus of DPRIVE is the client to resolver
channel
•creating protocols that are stealthy sometimes
painfully collides with clean protocol design
4
© Men & Mice http://menandmice.com
DNS OVER TLS
5
© Men & Mice http://menandmice.com
DNS-over-TLS
•RFC 7858 Specification for DNS over Transport
Layer Security (TLS)
•DNS wireformat over TLS over TCP
•Port 853 (TCP)
•encryption and authentication
6
© Men & Mice http://menandmice.com
DNS-over-TLS Performance
•performance of DNS-over-TLS can be quite good
•for existing sessions with TLS 1.3 as good as DNS-
over-UDP
•pipelining
•TCP fast open
•0-RTT resume
•current implementations are not optimized
7
© Men & Mice http://menandmice.com
DNS-over-TLS Implementations
•Client
•Unbound (as local forwarder)
•Stubby (getdnsapi)
•dnsfwd
•Server
•Unbound (as remote resolver)
•Knot
•any DNS server via stunnel
8
© Men & Mice http://menandmice.com
DNS-over-TLS Developments
•TLS 1.3 deployment stalled because of
misbehaving middle-boxes (BlueCoat)
•controversial in the IETF, but useful: multiplexing
HTTPS and DNS on port 443
•https://gitlab.com/dkg/hddemux
9
© Men & Mice http://menandmice.com
DNS OVER DTLS
10
© Men & Mice http://menandmice.com
DNS-over-DTLS
•RFC 8094 DNS over Datagram Transport Layer
Security (DTLS)
•DNS wireformat over TLS over UDP
•Port 853 (UDP)
•encryption and authentication
11
© Men & Mice http://menandmice.com
DNS-over-DTLS Issues
•adversary can block DNS queries
•resource exhaustion attacks against DNS server
possible
•no known implementations
12
© Men & Mice http://menandmice.com
DNS OVER HTTP(S)
13
© Men & Mice http://menandmice.com
DNS-over-HTTP(S)
•IETF Internet Draft DNS Queries over HTTPS

https://tools.ietf.org/html/draft-hoffman-dns-over-https
•DNS HTTP-Format over HTTPS over TCP
•Port 443 (HTTP/2)
•URL: https://server/.well-known/dns-query
•base64url encoded DNS data, Content-Header

application/dns-udpwireformat
•encryption and authentication
14
© Men & Mice http://menandmice.com
DNS-over-HTTP(S) Benefits
•HTTPS might be the only option in highly
firewalled networks
•easy to implement for (Web-)Developers
(JavaScript etc)
15
© Men & Mice http://menandmice.com
DNS-over-HTTP(S) additional
documents
•Representing DNS Messages in JSON

https://tools.ietf.org/html/draft-hoffman-dns-in-json
•DNS Messages in XML (expired)

https://tools.ietf.org/html/draft-mohan-dns-query-xml
16
© Men & Mice http://menandmice.com
DNS-over-HTTP(S) 

similar implementations
•DNS over JSON over HTTPS over TCP
•Google DNS Server-Side

https://developers.google.com/speed/public-dns/docs/dns-
over-https
•dingo - A DNS client in Go that supports Google DNS
over HTTPS

https://github.com/pforemski/dingo
•CoreDNS

https://coredns.io/2016/11/26/dns-over-https/
17
© Men & Mice http://menandmice.com
DNS-WIREFORMAT OVER
HTTPS
18
© Men & Mice http://menandmice.com
DNS-Wireformat-over-HTTP(S)
•DNS wireformat over HTTP(S) over TCP
•Internet Draft DNS wire-format over HTTP

https://tools.ietf.org/html/draft-ietf-dnsop-dns-wireformat-http
•Port 80 or 443 (HTTP 1.1 or HTTP/2)
•URL: https://server/.well-known/dns-wireformat
•Content-Header application/dns-wireformat
•may provide encryption and authentication
•DNS wire-format data is wrapped with an HTTP header and
transmitted on port 80 or 443
19
© Men & Mice http://menandmice.com
DNS OVER QUIC
20
© Men & Mice http://menandmice.com
DNS-Wireformat-over-HTTP(S)
•DNS over QUIC over UDP
•Specification of DNS over Dedicated QUIC
Connections

https://tools.ietf.org/html/draft-huitema-quic-dnsoquic
21
© Men & Mice http://menandmice.com
DNS-over-QUIC
•modern TCP replacement from Google, now
standardised in the IETF
•uses UDP, implements TCP features
•usually implemented in applications, not OS kernel
•includes TLS 1.3
•0-RTT
•performance in-par with DNS-over-UDP
•QUIC Documents https://tools.ietf.org/wg/quic/
22
© Men & Mice http://menandmice.com
DNS-over-QUIC Comparison
23
Source: https://datatracker.ietf.org/meeting/99/materials/slides-99-dprive-dns-over-quic
© Men & Mice http://menandmice.com
DNS OVER OPPORTUNISTIC
IPSEC
24
© Men & Mice http://menandmice.com
DNS OVER OPPORTUNISTIC IPSEC
•DNS over UDP or TCP over IPSec
•DNS queries will be tunnelled via IPSec
•provides encryption (but only limited
authentication)
•Unauthenticated Opportunistic IPsec

https://libreswan.org/wiki/
HOWTO:_Unauthenticated_Opportunistic_IPsec
25
© Men & Mice http://menandmice.com
DNS-over-opportunistic IPSEC
Implementations
• LibreSWAN and Unbound (IPSec Module)
26
© Men & Mice http://menandmice.com
DNS-over-opportunistic IPSEC
additional work
•make IPSec work in case of heavy firewalling: 

RFC 8229 TCP Encapsulation of IKE and IPsec
Packets
•allows IPSec to work on Port 443 

(multiplexed with HTTPS)
27
© Men & Mice http://menandmice.com
DNS OVER DNSCrypt
28
© Men & Mice http://menandmice.com
DNS OVER DNSCrypt
•DNS over DNSCrypt over UDP or TCP
•DNSCrypt is a DNS privacy solution originally developed
by OpenDNS (now Cisco)
•encryption and authentication
•protocol is open source, but somewhat underdocumented
•client operates a DNS proxy that tunnels DNS over
DNSCrypt
•some, but not all DNSCrypt resolver support DNSSEC
29
© Men & Mice http://menandmice.com
DNS OVER Tor
30
© Men & Mice http://menandmice.com
DNS OVER TOR
•DNS over Tor over TCP
•Port 9053
•Tor client proxies the DNS queries through a tor
circuit
•only A/AAAA-Records supported (no TXT, MX, SOA …)
•no DNSSEC, rogue Tor exit node can spoof DNS traffic
•> 30 % of Tor exit nodes use Google public DNS
31
© Men & Mice http://menandmice.com
Padding of DNS data
32
© Men & Mice http://menandmice.com
DNS padding
•DNS query/responses are small data chunks
•traffic analysis might be acute when dealing with
DNS queries
•the IETF is working on padding schemes for DNS
to make traffic analysis more difficult
•RFC 7830 The EDNS(0) Padding Option
•Padding Policy for EDNS(0)

https://tools.ietf.org/html/draft-ietf-dprive-padding-policy
33
© Men & Mice http://menandmice.com
Performance
34
© Men & Mice http://menandmice.com
Performance 

Alexa Top 1000 domains
35
© Men & Mice http://menandmice.com
Performance 

1000 DNS queries from office network
36
© Men & Mice http://menandmice.com
Links
37
© Men & Mice http://menandmice.com
Informational resources
•DNS Privacy Project

https://dnsprivacy.org
•Specification for DNS over Transport Layer Security (TLS)

https://tools.ietf.org/html/rfc7858
•public DNS resolver with DNS over TLS

https://dnsprivacy.org/wiki/display/DP/
DNS+Privacy+Test+Servers
•HDDMUX sourcecode

https://0xacab.org/dkg/hddemux
38
© Men & Mice http://menandmice.com
Informational resources
•DNSCrypt

https://dnscrypt.org/
• DNSCrypt-proxy

https://github.com/jedisct1/dnscrypt-proxy
•list of DNSCrypt-Resolver

https://dnscrypt.org/dnscrypt-resolvers.html
•Simple DNSCrypt for Windows

https://simplednscrypt.org/
•DNSCrypt GUI für macOS

https://github.com/alterstep/dnscrypt-osxclient
•DNSCrypt Blacklist Konfiguration

https://github.com/jedisct1/dnscrypt-proxy/blob/master/contrib/domains-
blacklist.conf
39
© Men & Mice http://menandmice.com
Informational resources
•Tor-Project

https://torproject.org
• The Effect of DNS on Tor’s Anonymity

https://freedom-to-tinker.com/2016/09/29/the-
effect-of-dns-on-tors-anonymity/
• DNS-over-TLS Forwarder

https://github.com/randomstuff/dnsfwd
40
© Men & Mice http://menandmice.com
Next
41
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction to DNS & BIND Hands-On Class
•September 18 – 20, 2017 (Zurich, Switzerland)
42
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction & Advanced DNS and BIND Topics
Hands-On Class
•September 18 – 22, 2017 (Zurich, Switzerland)
43
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•DNSSEC and DANE (German Language)
•December 4-12, 2017, Essen, DE
44
http://linuxhotel.de/
© Men & Mice http://menandmice.com
Thank you!
Questions? Comments?
45

Weitere ähnliche Inhalte

Was ist angesagt?

Passive DNS Collection – Henry Stern, Cisco
Passive DNS Collection – Henry Stern, CiscoPassive DNS Collection – Henry Stern, Cisco
Passive DNS Collection – Henry Stern, Cisco
Henry Stern
 

Was ist angesagt? (20)

BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANE
 
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
Passive DNS Collection -- the 'dnstap' approach, by Paul Vixie [APNIC 38 / AP...
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNI
 
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAILDNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
Passive DNS Collection – Henry Stern, Cisco
Passive DNS Collection – Henry Stern, CiscoPassive DNS Collection – Henry Stern, Cisco
Passive DNS Collection – Henry Stern, Cisco
 
Troubleshooting Tips from a Docker Support Engineer
Troubleshooting Tips from a Docker Support EngineerTroubleshooting Tips from a Docker Support Engineer
Troubleshooting Tips from a Docker Support Engineer
 
Windows 2012 and DNSSEC
Windows 2012 and DNSSECWindows 2012 and DNSSEC
Windows 2012 and DNSSEC
 
Get your instance by name integration of nova, neutron and designate
Get your instance by name  integration of nova, neutron and designateGet your instance by name  integration of nova, neutron and designate
Get your instance by name integration of nova, neutron and designate
 
Dnssec
DnssecDnssec
Dnssec
 
DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013
 
Debugging Network Issues
Debugging Network IssuesDebugging Network Issues
Debugging Network Issues
 

Andere mochten auch

Umbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerUmbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic Worker
OpenDNS
 
OISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) OverviewOISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) Overview
ThreatReel Podcast
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
ThreatReel Podcast
 

Andere mochten auch (20)

Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice Suite
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) OverviewDerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
 
Umbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerUmbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic Worker
 
Microsoft Cyber Security IT-Camp
Microsoft Cyber Security IT-CampMicrosoft Cyber Security IT-Camp
Microsoft Cyber Security IT-Camp
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
OISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) OverviewOISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) Overview
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Dns ppt
Dns pptDns ppt
Dns ppt
 

Ähnlich wie How to send DNS over anything encrypted

Ähnlich wie How to send DNS over anything encrypted (20)

Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenchesInternet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 
Juglouvain http revisited
Juglouvain http revisitedJuglouvain http revisited
Juglouvain http revisited
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
 
Qunog12-DNS暗号化
Qunog12-DNS暗号化Qunog12-DNS暗号化
Qunog12-DNS暗号化
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
SFMap (TMA 2015)
SFMap (TMA 2015)SFMap (TMA 2015)
SFMap (TMA 2015)
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
Introduction To The DANE Protocol (DNSSEC)
Introduction To The DANE Protocol  (DNSSEC)Introduction To The DANE Protocol  (DNSSEC)
Introduction To The DANE Protocol (DNSSEC)
 
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
ION Cape Town - DANE: The Future of Transport Layer Security (TLS)
 
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUICA new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
 
Juglouvain http revisited
Juglouvain http revisitedJuglouvain http revisited
Juglouvain http revisited
 
Encrypted DNS research @ nic.at
Encrypted DNS research @ nic.atEncrypted DNS research @ nic.at
Encrypted DNS research @ nic.at
 
DNS resolver 1.1.1.1 from Cloudflare
DNS resolver 1.1.1.1 from CloudflareDNS resolver 1.1.1.1 from Cloudflare
DNS resolver 1.1.1.1 from Cloudflare
 
Nginx, PHP, Apache and Spelix
Nginx, PHP, Apache and SpelixNginx, PHP, Apache and Spelix
Nginx, PHP, Apache and Spelix
 
WebRTC standards update - November 2014
WebRTC standards update - November 2014WebRTC standards update - November 2014
WebRTC standards update - November 2014
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
Understanding DNS Security
Understanding DNS SecurityUnderstanding DNS Security
Understanding DNS Security
 
getdns PyCon presentation
getdns PyCon presentationgetdns PyCon presentation
getdns PyCon presentation
 

Mehr von Men and Mice

Mehr von Men and Mice (13)

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review Webinar
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
 
DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
 
IETF 92 Webinar
IETF 92 WebinarIETF 92 Webinar
IETF 92 Webinar
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
 
DNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedDNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloaded
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANE
 
RIPE 68 Webinar
RIPE 68 WebinarRIPE 68 Webinar
RIPE 68 Webinar
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

How to send DNS over anything encrypted

  • 1. © Men & Mice http://menandmice.com How to send DNS over anything encrypted 1
  • 2. © Men & Mice http://menandmice.com Agenda The DNS-Privacy group (DPRIVE) inside the Internet Engineering Task Force (IETF), as well as a number of dedicated people outside the IETF, are working on new transport protocols to allow for encrypting DNS traffic between DNS clients and resolvers. Current developments include: •DNS over TLS (RFC 7858) •DNS over DTLS (RFC 8094) •DNS over HTTP(S) (ID-draft) •DNS over QUIC (ID-draft) •DNS over DNSCrypt (outside IETF) •DNS over TOR (outside IETF) 2
  • 3. © Men & Mice http://menandmice.com DNS Privacy 3
  • 4. © Men & Mice http://menandmice.com DNS is Metadata •IETF started the DPRIVE (DNS Privacy Working Group) after the Snowden revelations •RFC 7626 DNS Privacy Considerations
 https://tools.ietf.org/html/rfc7626 •current focus of DPRIVE is the client to resolver channel •creating protocols that are stealthy sometimes painfully collides with clean protocol design 4
  • 5. © Men & Mice http://menandmice.com DNS OVER TLS 5
  • 6. © Men & Mice http://menandmice.com DNS-over-TLS •RFC 7858 Specification for DNS over Transport Layer Security (TLS) •DNS wireformat over TLS over TCP •Port 853 (TCP) •encryption and authentication 6
  • 7. © Men & Mice http://menandmice.com DNS-over-TLS Performance •performance of DNS-over-TLS can be quite good •for existing sessions with TLS 1.3 as good as DNS- over-UDP •pipelining •TCP fast open •0-RTT resume •current implementations are not optimized 7
  • 8. © Men & Mice http://menandmice.com DNS-over-TLS Implementations •Client •Unbound (as local forwarder) •Stubby (getdnsapi) •dnsfwd •Server •Unbound (as remote resolver) •Knot •any DNS server via stunnel 8
  • 9. © Men & Mice http://menandmice.com DNS-over-TLS Developments •TLS 1.3 deployment stalled because of misbehaving middle-boxes (BlueCoat) •controversial in the IETF, but useful: multiplexing HTTPS and DNS on port 443 •https://gitlab.com/dkg/hddemux 9
  • 10. © Men & Mice http://menandmice.com DNS OVER DTLS 10
  • 11. © Men & Mice http://menandmice.com DNS-over-DTLS •RFC 8094 DNS over Datagram Transport Layer Security (DTLS) •DNS wireformat over TLS over UDP •Port 853 (UDP) •encryption and authentication 11
  • 12. © Men & Mice http://menandmice.com DNS-over-DTLS Issues •adversary can block DNS queries •resource exhaustion attacks against DNS server possible •no known implementations 12
  • 13. © Men & Mice http://menandmice.com DNS OVER HTTP(S) 13
  • 14. © Men & Mice http://menandmice.com DNS-over-HTTP(S) •IETF Internet Draft DNS Queries over HTTPS
 https://tools.ietf.org/html/draft-hoffman-dns-over-https •DNS HTTP-Format over HTTPS over TCP •Port 443 (HTTP/2) •URL: https://server/.well-known/dns-query •base64url encoded DNS data, Content-Header
 application/dns-udpwireformat •encryption and authentication 14
  • 15. © Men & Mice http://menandmice.com DNS-over-HTTP(S) Benefits •HTTPS might be the only option in highly firewalled networks •easy to implement for (Web-)Developers (JavaScript etc) 15
  • 16. © Men & Mice http://menandmice.com DNS-over-HTTP(S) additional documents •Representing DNS Messages in JSON
 https://tools.ietf.org/html/draft-hoffman-dns-in-json •DNS Messages in XML (expired)
 https://tools.ietf.org/html/draft-mohan-dns-query-xml 16
  • 17. © Men & Mice http://menandmice.com DNS-over-HTTP(S) 
 similar implementations •DNS over JSON over HTTPS over TCP •Google DNS Server-Side
 https://developers.google.com/speed/public-dns/docs/dns- over-https •dingo - A DNS client in Go that supports Google DNS over HTTPS
 https://github.com/pforemski/dingo •CoreDNS
 https://coredns.io/2016/11/26/dns-over-https/ 17
  • 18. © Men & Mice http://menandmice.com DNS-WIREFORMAT OVER HTTPS 18
  • 19. © Men & Mice http://menandmice.com DNS-Wireformat-over-HTTP(S) •DNS wireformat over HTTP(S) over TCP •Internet Draft DNS wire-format over HTTP
 https://tools.ietf.org/html/draft-ietf-dnsop-dns-wireformat-http •Port 80 or 443 (HTTP 1.1 or HTTP/2) •URL: https://server/.well-known/dns-wireformat •Content-Header application/dns-wireformat •may provide encryption and authentication •DNS wire-format data is wrapped with an HTTP header and transmitted on port 80 or 443 19
  • 20. © Men & Mice http://menandmice.com DNS OVER QUIC 20
  • 21. © Men & Mice http://menandmice.com DNS-Wireformat-over-HTTP(S) •DNS over QUIC over UDP •Specification of DNS over Dedicated QUIC Connections
 https://tools.ietf.org/html/draft-huitema-quic-dnsoquic 21
  • 22. © Men & Mice http://menandmice.com DNS-over-QUIC •modern TCP replacement from Google, now standardised in the IETF •uses UDP, implements TCP features •usually implemented in applications, not OS kernel •includes TLS 1.3 •0-RTT •performance in-par with DNS-over-UDP •QUIC Documents https://tools.ietf.org/wg/quic/ 22
  • 23. © Men & Mice http://menandmice.com DNS-over-QUIC Comparison 23 Source: https://datatracker.ietf.org/meeting/99/materials/slides-99-dprive-dns-over-quic
  • 24. © Men & Mice http://menandmice.com DNS OVER OPPORTUNISTIC IPSEC 24
  • 25. © Men & Mice http://menandmice.com DNS OVER OPPORTUNISTIC IPSEC •DNS over UDP or TCP over IPSec •DNS queries will be tunnelled via IPSec •provides encryption (but only limited authentication) •Unauthenticated Opportunistic IPsec
 https://libreswan.org/wiki/ HOWTO:_Unauthenticated_Opportunistic_IPsec 25
  • 26. © Men & Mice http://menandmice.com DNS-over-opportunistic IPSEC Implementations • LibreSWAN and Unbound (IPSec Module) 26
  • 27. © Men & Mice http://menandmice.com DNS-over-opportunistic IPSEC additional work •make IPSec work in case of heavy firewalling: 
 RFC 8229 TCP Encapsulation of IKE and IPsec Packets •allows IPSec to work on Port 443 
 (multiplexed with HTTPS) 27
  • 28. © Men & Mice http://menandmice.com DNS OVER DNSCrypt 28
  • 29. © Men & Mice http://menandmice.com DNS OVER DNSCrypt •DNS over DNSCrypt over UDP or TCP •DNSCrypt is a DNS privacy solution originally developed by OpenDNS (now Cisco) •encryption and authentication •protocol is open source, but somewhat underdocumented •client operates a DNS proxy that tunnels DNS over DNSCrypt •some, but not all DNSCrypt resolver support DNSSEC 29
  • 30. © Men & Mice http://menandmice.com DNS OVER Tor 30
  • 31. © Men & Mice http://menandmice.com DNS OVER TOR •DNS over Tor over TCP •Port 9053 •Tor client proxies the DNS queries through a tor circuit •only A/AAAA-Records supported (no TXT, MX, SOA …) •no DNSSEC, rogue Tor exit node can spoof DNS traffic •> 30 % of Tor exit nodes use Google public DNS 31
  • 32. © Men & Mice http://menandmice.com Padding of DNS data 32
  • 33. © Men & Mice http://menandmice.com DNS padding •DNS query/responses are small data chunks •traffic analysis might be acute when dealing with DNS queries •the IETF is working on padding schemes for DNS to make traffic analysis more difficult •RFC 7830 The EDNS(0) Padding Option •Padding Policy for EDNS(0)
 https://tools.ietf.org/html/draft-ietf-dprive-padding-policy 33
  • 34. © Men & Mice http://menandmice.com Performance 34
  • 35. © Men & Mice http://menandmice.com Performance 
 Alexa Top 1000 domains 35
  • 36. © Men & Mice http://menandmice.com Performance 
 1000 DNS queries from office network 36
  • 37. © Men & Mice http://menandmice.com Links 37
  • 38. © Men & Mice http://menandmice.com Informational resources •DNS Privacy Project
 https://dnsprivacy.org •Specification for DNS over Transport Layer Security (TLS)
 https://tools.ietf.org/html/rfc7858 •public DNS resolver with DNS over TLS
 https://dnsprivacy.org/wiki/display/DP/ DNS+Privacy+Test+Servers •HDDMUX sourcecode
 https://0xacab.org/dkg/hddemux 38
  • 39. © Men & Mice http://menandmice.com Informational resources •DNSCrypt
 https://dnscrypt.org/ • DNSCrypt-proxy
 https://github.com/jedisct1/dnscrypt-proxy •list of DNSCrypt-Resolver
 https://dnscrypt.org/dnscrypt-resolvers.html •Simple DNSCrypt for Windows
 https://simplednscrypt.org/ •DNSCrypt GUI für macOS
 https://github.com/alterstep/dnscrypt-osxclient •DNSCrypt Blacklist Konfiguration
 https://github.com/jedisct1/dnscrypt-proxy/blob/master/contrib/domains- blacklist.conf 39
  • 40. © Men & Mice http://menandmice.com Informational resources •Tor-Project
 https://torproject.org • The Effect of DNS on Tor’s Anonymity
 https://freedom-to-tinker.com/2016/09/29/the- effect-of-dns-on-tors-anonymity/ • DNS-over-TLS Forwarder
 https://github.com/randomstuff/dnsfwd 40
  • 41. © Men & Mice http://menandmice.com Next 41
  • 42. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction to DNS & BIND Hands-On Class •September 18 – 20, 2017 (Zurich, Switzerland) 42 https://www.menandmice.com/training/
  • 43. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction & Advanced DNS and BIND Topics Hands-On Class •September 18 – 22, 2017 (Zurich, Switzerland) 43 https://www.menandmice.com/training/
  • 44. © Men & Mice http://menandmice.com Men & Mice DNS Training •DNSSEC and DANE (German Language) •December 4-12, 2017, Essen, DE 44 http://linuxhotel.de/
  • 45. © Men & Mice http://menandmice.com Thank you! Questions? Comments? 45