TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSA Recommends How Enterprises Can Securely Adopt Encrypted DNS

128 pointsby theBashShellover 4 years ago

12 comments

dylan604over 4 years ago
From under my tinfoil hat, I have to wonder why we would listen to any recommendations from the NSA? Why would we not believe they are going to make recommendations of methods they know how to exploit?<p>Taking off my tinfoil hat, I understand that one of the purposes of the NSA is to keep US information safe. Following their recommendations should make your data safer.<p>However, Snowden showed us that the NSA doesn&#x27;t always follow the rules it is supposed to operate within. Does that mean they are always be suspect? How do we decide when their recos are for the good fo all?
评论 #25806769 未加载
评论 #25806563 未加载
评论 #25807561 未加载
评论 #25806765 未加载
评论 #25808337 未加载
评论 #25808494 未加载
评论 #25807380 未加载
评论 #25808573 未加载
评论 #25807588 未加载
评论 #25806921 未加载
评论 #25806874 未加载
nimbiusover 4 years ago
&gt;NSA recommends that an enterprise network’s DNS traffic, encrypted or not, be sent only to the designated enterprise DNS resolver.<p>its either a slow day at the NSA or federal agencies have become so intellectually bankrupted by the cloud that they consider proclamations of the fundamentals of DNS and networking to be some sort of sage wisdom.
评论 #25805972 未加载
评论 #25805305 未加载
评论 #25805155 未加载
评论 #25805235 未加载
评论 #25805709 未加载
评论 #25805565 未加载
评论 #25805342 未加载
aftbitover 4 years ago
I wonder when smart TV manufacturers will begin using DNS-over-HTTPS to make it harder for PiHole et al to block their ads.
评论 #25806580 未加载
评论 #25807384 未加载
评论 #25806709 未加载
评论 #25807033 未加载
评论 #25807189 未加载
评论 #25806495 未加载
Randorover 4 years ago
I don&#x27;t understand why people can&#x27;t see the dangers of moving everything to DoH. For example if you have a 3000 user network and 2900 of them are using a local resolver. You have almost no chance of finding those 100 nodes doing DoH without MITM everything over 443.<p>Someone will probably respond with something like: &quot;Just block the IP address ranges of public DoH resolvers&quot; and that would work for the resolvers we know about.
评论 #25806594 未加载
评论 #25806595 未加载
collsniover 4 years ago
They are just saying within enterprises it is of the enterprises best interest to control all aspects of dns so all traffic can be monitored. Which you seriously need to do if you aren&#x27;t doing it already.<p>Dns needs to be monitored holistically it is a great place to catch IOCs.
评论 #25808154 未加载
ENOTTYover 4 years ago
There&#x27;s good money to be made selling a solution that detects and blocks rogue DoH requests.<p>Anyways, it&#x27;s possible: <a href="https:&#x2F;&#x2F;dl.acm.org&#x2F;doi&#x2F;abs&#x2F;10.1145&#x2F;3407023.3409192" rel="nofollow">https:&#x2F;&#x2F;dl.acm.org&#x2F;doi&#x2F;abs&#x2F;10.1145&#x2F;3407023.3409192</a>
评论 #25808086 未加载
nukerover 4 years ago
Why they advised DoH and not DoT? DoT is simpler, no http cookies ambiguity. Easier to block counter argument does not really apply to businesses...
评论 #25809984 未加载
1vuio0pswjnm7over 4 years ago
There has certainly been evidence of censorship amongst the thousands of third party open resolvers. Are there any examples of known &quot;malicious&quot; third party DoH or DoT resolvers. Has anyone been studying this.
jcpham2over 4 years ago
Nice try NSA
permille42over 4 years ago
Could someone create a replacement for DNS entirely please?<p>DNS does WAY more than what the typical user needs it for and services that present it are resultantly much more complex than what is needed for the 99% use case.<p>The 99% use case: resolve x.y.z to some IP address.<p>What I think should happen:<p>1. At each level, a public&#x2F;private keypair is used to authenticate valid records for the name. Eg: .com has public&#x2F;private keypair(s) to represent who can sign x.com records. .com owner only needs to publish these. Reliable sources ( ISPs etc ) can then share these.<p>2. The x.com records themselves would be: Mapping from x.com to IP address(s) &#x2F; public key.<p>3. The x.com owners could then publish out their x.y.com records freely and they could be mirrored by everyone.<p>Unlike the current methodology, there would be far less need to trust where you get the records from. The public&#x2F;private keypairs should change WAY less frequently.<p>Agreeably in such a widely distributed system you wouldn&#x27;t have nice TTL, but that is for the better. DNS records should not be changing that frequently.<p>Such a new system also should be done in a fully distributed way and NOT controlled by a bunch of money grubbing bastards who make way too much money from records.<p>It should NOT cost $20&#x2F;yr to own a record pointing x.y to a number. It&#x27;s absurd and really needs to stop.
评论 #25809095 未加载
评论 #25808283 未加载
room505over 4 years ago
<a href="https:&#x2F;&#x2F;www.lawfareblog.com&#x2F;explaining-sigint-annex" rel="nofollow">https:&#x2F;&#x2F;www.lawfareblog.com&#x2F;explaining-sigint-annex</a>
asdfthrowawayyyover 4 years ago
Bunch of garbage, NSA and FBI hate ESNI.<p>Firefox silently pulled all production ESNI code as of v83 without a word of warning to anyone. As in, the Firefox development team simply killed encrypted SNI and told nobody that may have been using ESNI in despot regimes, in exchange for future ECH support which is not implemented anywhere yet.<p>Nor will ECH be endpoint supported any time soon.