Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering

02/01/2022
by   Nguyen Phong Hoang, et al.
0

Most online communications rely on DNS to map domain names to their hosting IP address(es). Previous work has shown that DNS-based network interference is widespread due to the unencrypted and unauthenticated nature of the original DNS protocol. In addition to DNS, accessed domain names can also be monitored by on-path observers during the TLS handshake when the SNI extension is used. These lingering issues with exposed plaintext domain names have led to the development of a new generation of protocols that keep accessed domain names hidden. DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) hide the domain names of DNS queries, while Encrypted Server Name Indication (ESNI) encrypts the domain name in the SNI extension. We present DNEye, a measurement system built on top of a network of distributed vantage points, which we used to study the accessibility of DoT/DoH and ESNI, and to investigate whether these protocols are tampered with by network providers (e.g., for censorship). Moreover, we evaluate the efficacy of these protocols in circumventing network interference when accessing content blocked by traditional DNS manipulation. We find evidence of blocking efforts against domain name encryption technologies in several countries, including China, Russia, and Saudi Arabia. At the same time, we discover that domain name encryption can help with unblocking more than 55 in China and other countries where DNS-based filtering is heavily employed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/03/2022

A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques

The domain name system (DNS) that maps alphabetic names to numeric Inter...
research
07/03/2023

Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS Servers

The Domain Name System (DNS) service is one of the pillars of the Intern...
research
05/14/2023

CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates

DNS manipulation is an increasingly common technique used by censors and...
research
06/26/2019

Quantifying Information Exposure in Internet Routing

Data sent over the Internet can be monitored and manipulated by intermed...
research
11/01/2019

Assessing the Privacy Benefits of Domain Name Encryption

As Internet users have become more savvy about the potential for their I...
research
04/17/2023

Detecting Domain-Generation Algorithm (DGA) Based Fully-Qualified Domain Names (FQDNs) with Shannon Entropy

Domain Name System (DNS) is the backbone of the Internet. However, threa...
research
07/14/2023

Assessing and Exploiting Domain Name Misinformation

Cloud providers' support for network evasion techniques that misrepresen...

Please sign up or login with your details

Forgot password? Click here to reset