[cs615asa] Black Team Mission 3/9

Jared Bass jbass at stevens.edu
Sun Mar 8 21:36:16 EDT 2020


All,

We've decided to talk about DNS over TLS for this week. This first link describes how it works in general, while the later links go more in depth on how it is implemented, and what systems use it, including Android and Arch Linux.

https://developers.cloudflare.com/1.1.1.1/dns-over-tls/

https://developers.google.com/speed/public-dns/docs/dns-over-tls

https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html

https://wiki.archlinux.org/index.php/Systemd-resolved#DNS_over_TLS
systemd-resolved - ArchWiki - Arch Linux<https://wiki.archlinux.org/index.php/Systemd-resolved#DNS_over_TLS>
Tip: To understand the context around the choices and switches, one can turn on detailed debug information for systemd-resolved as described in systemd#Diagnosing a service.
wiki.archlinux.org

[https://4.bp.blogspot.com/-UunWAFj3dvQ/WtD00XIAcaI/AAAAAAAAIJk/xOHDgnRAG6k2exYxLhWeqyfEwBuxLIT9wCLcBGAs/w1200-h630-p-k-no-nu/updated_tls_img2.png]<https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html>
Android Developers Blog: DNS over TLS support in Android P Developer Preview<https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html>
Posted by Erik Kline, Android software engineer, and Ben Schwartz, Jigsaw software engineer. The first step of almost every connection on the internet is a DNS query. A client, such as a smartphone, typically uses a DNS server provided by the Wi-Fi or cellular network.
android-developers.googleblog.com

[https://www.gstatic.com/devrel-devsite/prod/v35095b53655653106712feb44f96c6929ce012ae38486ad7db1de265cbd9b7ec/developers/images/opengraph/google-blue.png]<https://developers.google.com/speed/public-dns/docs/dns-over-tls>
DNS-over-TLS | Public DNS | Google Developers<https://developers.google.com/speed/public-dns/docs/dns-over-tls>
Introduction. Traditional DNS queries and responses are sent over UDP or TCP without encryption. This is vulnerable to eavesdropping and spoofing (including DNS-based Internet filtering).
developers.google.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20200309/2d9270d2/attachment-0001.html>


More information about the cs615asa mailing list