On 12/03/2019, 20:37, "Doh on behalf of Stephane Bortzmeyer" 
<doh-boun...@ietf.org on behalf of bortzme...@nic.fr> wrote:

    On Tue, Mar 12, 2019 at 04:55:11PM +0100,
     Neil Cook <neil.c...@noware.co.uk> wrote 
     a message of 22 lines which said:
    
    > Actually many enterprises (particularly banks etc.) do not allow DNS 
resolution directly from employee endpoints.
    
    They block UDP/53, which is not the same thing. Malware or
    non-cooperating applications can do name resolution by other means. I
    still do not understand why people have a problem with DoH whch did
    not already exist before with
    my-own-name-resolution-protocol-over-HTTPS.
    
It is common practice for Malware operators to use bona fide DNS infrastructure 
(including resolvers) to communicate with the malware application. One useful 
example are DGAs [1]. This practice is cheaper and more robust for Malware 
operators than setting up their own DNS resolver service, not to mention 
implementing a proprietary protocol. It also helps isolate the malware operator 
from the malware as these communications all happen through legit services (all 
the malware operator has to do to trigger the resident malware is to register a 
domain). 

DoH, and specifically the (intended) inability to distinguish DoH from other 
traffic, makes this practice much harder to detect and to block - which is why 
this a problem that did not already exist before.

[1] 
https://umbrella.cisco.com/blog/2016/10/10/domain-generation-algorithms-effective/
    _______________________________________________
    Doh mailing list
    d...@ietf.org
    https://www.ietf.org/mailman/listinfo/doh
    
Yishai

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to