ABSTRACT
While DNS tunneling has shown promise as a censorship circumvention technique, it is limited by the plaintext nature of the DNS protocol, which renders it easily detectable to censors. DNS-over-HTTPS (DoH) [16] resolves this detectability obstacle, by encrypting the entire DNS protocol inside HTTPS. DoH tunneling shows promise as a medium for circumvention as its adoption increases in everyday usage, but it may still be vulnerable to flow-based attacks. This paper explores the design space of threshold-based attacks and defences on encrypted DNS tunnels. We identify thresholds separating tunnel traffic from browser-generated DoH traffic using packet size, packet rate, and throughput. We further propose modifications for encrypted DNS tunnels to evade flow-based detection and measure the reduction in usability. Notably, throughput is decreased by at least 27x and page load time is increased by at least 23x. However, despite the cutback in usability, we outline the potential for DNS tunnels to work in conjunction with, and obfuscate the registration traffic of, other anti-censorship tools.
References
- Sadia Afroz and David Fifield. 2015. 'Timeline of Tor Censorship'. http://www1.icsi.berkeley.edu/~sadia/tor_timeline.pdf. Accessed March 2021.Google Scholar
- Qurat-Ul-Ann Danyal Akbar, Marcel Flores, and Aleksandar Kuzmanovic. 2016. DNS-sly: Avoiding Censorship through Network Complexity. In 6th USENIX Workshop on Free and Open Communications on the Internet, FOCI '16, Austin, TX, USA, August 8, 2016, Amir Houmansadr and Prateek Mittal (Eds.). USENIX Association. https://www.usenix.org/conference/foci16/workshop-program/presentation/akbarGoogle Scholar
- Marc Bevand. 2016. My Experience With the Great Firewall of China. https://blog.zorinaq.com/my-experience-with-the-great-firewall-of-china/ Accessed May 2021.Google Scholar
- Timm Böttger, Felix Cuadrado, Gianni Antichi, Eder Leão Fernandes, Gareth Tyson, Ignacio Castro, and Steve Uhlig. 2019. An Empirical Study of the Cost of DNS-over-HTTPS. In Proceedings of the Internet Measurement Conference. 15--21.Google Scholar
Digital Library
- Ron Bowes. 2013. dnscat2. https://github.com/iagox86/dnscat2.Google Scholar
- Erik Ekman and Bjorn Andersson. 2006. 'Iodine'. https://code.kryo.se/iodine/. Accessed March 2021.Google Scholar
- Wendy Ellens, Piotr Zuraniewski, Anna Sperotto, Harm Schotanus, Michel Mandjes, and Erik Meeuwissen. 2013. Flow-Based Detection of DNS Tunnels. In Emerging Management Mechanisms for the Future Internet - 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings (Lecture Notes in Computer Science, Vol. 7943), Guillaume Doyen, Martin Waldburger, Pavel Celeda, Anna Sperotto, and Burkhard Stiller (Eds.). Springer, 124--135. https://doi.org/10.1007/978-3-642-38998-6_16Google Scholar
- Greg Farnham and Antonios Atlasis. 2013. Detecting DNS tunneling. SANS Institute InfoSec Reading Room 9 (2013), 1--32.Google Scholar
- David Fifield. 2017. Threat modeling and circumvention of Internet censorship. Ph.D. Dissertation. University of California, Berkeley.Google Scholar
- David Fifield. 2020. dnstt. https://www.bamsoftware.com/software/dnstt/index.htmlGoogle Scholar
- David Fifield. 2020. Turbo Tunnel, a good way to design censorship circumvention protocols. In 10th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2020, August 11, 2020, Roya Ensafi and Hans Klein (Eds.). USENIX Association. https://www.usenix.org/conference/foci20/presentation/fifieldGoogle Scholar
- Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, and Eric Wustrow. 2019. Conjure: Summoning Proxies from Unused Address Space. In Computer and Communications Security. ACM. https://jhalderm.com/pub/papers/conjure-ccs19.pdfGoogle Scholar
- Sergey Frolov and Eric Wustrow. 2019. The use of TLS in Censorship Circumvention. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society. https://www.ndss-symposium.org/ndss-paper/the-use-of-tls-in-censorship-circumvention/Google Scholar
Cross Ref
- Serene Han. 2011. Snowflake Technical Overview. https://keroserene.net/snowflake/technical. [Online; accessed 8-June-2018].Google Scholar
- Firefox Help. 2019. DNS-over-HTTPS (DoH) FAQs. https://support.mozilla.org/en-US/kb/dns-over-https-doh-faqs Accessed April 2021.Google Scholar
- Paul Hoffman and Patrick McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484. IETF Tools. https://tools.ietf.org/html/rfc8484Google Scholar
- A. Houmansadr, C. Brubaker, and V. Shmatikov. 2013. The Parrot Is Dead: Observing Unobservable Network Communications. In 2013 IEEE Symposium on Security and Privacy. 65--79. https://doi.org/10.1109/SP.2013.14Google Scholar
- Z. Hu, L. Zhu, J. Heidemann, A. Mankin, D. Wessels, and P. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858. IETF Tools. https://tools.ietf.org/html/rfc7858Google Scholar
- Mohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur, and Arash Habibi Lashkari. 2020. Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). 63--70. https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026Google Scholar
- Ramakrishna Padmanabhan, Alberto Dainotti, Nima Fatemi, Arturo Filastò, Maria Xynou, and Simone Basso. 2019. Iran's nation-wide Internet blackout: Measurement data and technical observations. https://ooni.org/post/2019-iran-internet-blackout/Google Scholar
- Michael Carl Tschantz, Sadia Afroz, anonymous, and Vern Paxson. 2016. SoK: Towards Grounding Censorship Circumvention in Empiricism. In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016. IEEE Computer Society, 914--933. https://doi.org/10.1109/SP.2016.59Google Scholar
- Dmitrii Vekshin, Karel Hynek, and Tomas Cejka. 2020. DoH Insight: Detecting DNS over HTTPS by Machine Learning. In Proceedings of the 15th International Conference on Availability, Reliability and Security (Virtual Event, Ireland) (ARES '20). Association for Computing Machinery, New York, NY, USA, Article 87, 8 pages. https://doi.org/10.1145/3407023.3409192Google Scholar
Digital Library
- Cathy Wang, Paul Janiszewski, Shela Qiu, and Carmen Kwan. 2021. dnstt-uTLS Fork. https://github.com/pjanisze/dnstt-uTLS.Google Scholar
- Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, and Thomas Shrimpton. 2015. Seeing through Network-Protocol Obfuscation. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Denver, Colorado, USA) (CCS '15). Association for Computing Machinery, New York, NY, USA, 57--69. https://doi.org/10.1145/2810103.2813715Google Scholar
Digital Library
- Eric Wustrow, Colleen M. Swanson, and J. Alex Halderman. 2014. TapDance: End-to-middle Anticensorship Without Flow Blocking. In 23rd USENIX Security Symposium (San Diego, CA). 159--174. http://dl.acm.org/citation.cfm?id=2671225.2671236Google Scholar
- Irvan Zhan. 2015. DNSCatProxy. https://github.com/izhan/dnstun_pt.Google Scholar
Index Terms
Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels





Comments