Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/sekhan/thegreatwall
Prevent program and malware to bypass DNS filter by using DoH
https://github.com/sekhan/thegreatwall
blocklist doh hostsfile ipv4-list ipv6-list pihole security
Last synced: about 1 month ago
JSON representation
Prevent program and malware to bypass DNS filter by using DoH
- Host: GitHub
- URL: https://github.com/sekhan/thegreatwall
- Owner: Sekhan
- License: mit
- Created: 2020-03-08T11:01:40.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2022-07-10T21:20:28.000Z (over 2 years ago)
- Last Synced: 2024-09-26T13:02:10.617Z (about 2 months ago)
- Topics: blocklist, doh, hostsfile, ipv4-list, ipv6-list, pihole, security
- Size: 249 KB
- Stars: 106
- Watchers: 8
- Forks: 16
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
README
## What is DNS-over-HTTPS (DoH) ?
DoH is a protocol introduced in 2018 as a solution to improve DNS security by encrypting queries through HTTPS, which is advertised as a method to prevent your ISP from tracking your activity, allow you to bypass censorship and protect you against DNS data manipulation (MiMT). In the start of 2020, popular web-browser like Mozilla has started to turn DoH by default in the US and others are experimenting it. Microsoft is also considering the addition of DoH in Windows 10.
### But wait... DoH isn't supposed to be a good thing ?
While bringing encryption is always an important thing, including in oppressive countries, DoH isn't a bulletproof solution and may actually cause more problem than it solve. **The rise of service providing DoH, especially US companies like Google or Cloudflare, could harm your privacy by offering additional tracking capabilities** (ex : TLS resumption, which allow to reuse a previous encrypted state for future connection to the same server, could be used to track your browser across IP adress changes) **and centralizing DNS traffic into popular DoH resolver.**
**But moreover, programs and malwares could abuse public DoH provider to evade DNS filtering (like Pihole) and communicate with telemetry service or command-and-control server. See Godlua malware.**
### :warning: Disclaimer
**Theses lists (updated every month) has been created for security purpose ONLY**. There are not a tool to prevent your employee from bypassing the fact that you're monitoring/blocking their online activity ! If you suspect your entity to do so, consider using a VPN or Tor Browser.
You can also block `port 853` for DNS over TLS (DoT)
## An alternative way : increase DoH visibility
Blocking DoH entirely might not be the best approch for everyone, especially if your company wants the benefits of using encrypted DNS while being able to analyse suspicious communications. ** This paper demonstrate the possibility of redirecting all traffic from `port 453` to PolarProxy and Security Onion, allowing you to analyse DoH traffic in an unencrypted form.**
## Additionnal ressources :blue_book:
- NLNOG 2019 - DNS over HTTPS considerations.
- DoH draft for the IETF ("Privacy Concerns" and "Security Considerations").
* Wall icon drawed by Eucalyp (flaticon.com)