arrow_upward

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
DNS-over-HTTPS (DoH) can be easily detected and blocked
#1
DNS-over-HTTPS (DoH) can be easily detected and blocked
Johannes B. Ullrich


The security researcher Johannes B. Ullrich has researched if and how DNS-over-HTTPS can be detected and broken or prevented from working WITHOUT the attempt to break the actual TLS connection.

He has managed to do so by analyzing the DoH packets. His research shows that it is possible to detect DoH by size of the payload inside the packets. He has created two forum posts #1 and #2 at the ISC SANS forums where he is sharing and discussing his findings.

In order to make it harder to detect DoH and solve this issue he suggests the use of EDNS padding. For this to work however all DoH servers have to be reconfigured to enable and support EDNS padding. In addition all clients need EDNS padding support, too. Mozilla has a discussion regarding this subject here already.

Another blow to the rollout of DoH. Hopefully a fix will be found and applied soon if all the pro DoH candidates really care about DoH as much as they say. Surely someone will be unhappy while another party will be very happy.
[Image: zHHqO5Q.png]


Possibly Related Threads…
Thread
Author
Replies
Views
Last Post

person_pin_circle Users browsing this thread: 1 Guest(s)
Sponsors: VirMach - Host4Fun - CubeData - Evolution-Host - HostDare - Hyper Expert - Shadow Hosting - Bladenode - Hostlease - RackNerd - ReadyDedis - Limitless Hosting