Sekhan TheGreatWall Save

Prevent program and malware to bypass DNS filter by using DoH

Project README

TitleList

What is DNS-over-HTTPS (DoH) ?

DoH is a protocol introduced in 2018 as a solution to improve DNS security by encrypting queries through HTTPS, which is advertised as a method to prevent your ISP from tracking your activity, allow you to bypass censorship and protect you against DNS data manipulation (MiMT). In the start of 2020, popular web-browser like Mozilla has started to turn DoH by default in the US and others are experimenting it. Microsoft is also considering the addition of DoH in Windows 10.

But wait... DoH isn't supposed to be a good thing ?

While bringing encryption is always an important thing, including in oppressive countries, DoH isn't a bulletproof solution and may actually cause more problem than it solve. The rise of service providing DoH, especially US companies like Google or Cloudflare, could harm your privacy by offering additional tracking capabilities (ex : TLS resumption, which allow to reuse a previous encrypted state for future connection to the same server, could be used to track your browser across IP adress changes) and centralizing DNS traffic into popular DoH resolver.

But moreover, programs and malwares could abuse public DoH provider to evade DNS filtering (like Pihole) and communicate with telemetry service or command-and-control server. See Godlua malware.

:warning: Disclaimer

Theses lists (updated every month) has been created for security purpose ONLY. There are not a tool to prevent your employee from bypassing the fact that you're monitoring/blocking their online activity ! If you suspect your entity to do so, consider using a VPN or Tor Browser.

You can also block port 853 for DNS over TLS (DoT)

An alternative way : increase DoH visibility

Blocking DoH entirely might not be the best approch for everyone, especially if your company wants the benefits of using encrypted DNS while being able to analyse suspicious communications. This paper demonstrate the possibility of redirecting all traffic from port 453 to PolarProxy and Security Onion, allowing you to analyse DoH traffic in an unencrypted form.

Additionnal ressources :blue_book:

* Wall icon drawed by Eucalyp (flaticon.com)

Open Source Agenda is not affiliated with "Sekhan TheGreatWall" Project. README Source: Sekhan/TheGreatWall
Stars
103
Open Issues
3
Last Commit
1 year ago
Repository
License
MIT

Open Source Agenda Badge

Open Source Agenda Rating