Strengthening DNS Security with DNS over HTTPS (DoH)

The Domain Name System (DNS) is critical to the functioning of the internet. The protocol was created more than 30 years ago to replace the process of manually updating lists of servers (IP addresses) on the internet/Arpanet. DNS has become increasingly vulnerable to a host of malicious attacks on networks and subscribers. Over the years, the industry has responded to these growing concerns with several security enhancements — the most recently proposed standard is DNS over HTTPS (DoH).

What is the Domain Name System and How Does it Work?

Think of DNS as an address book that translates the IP address of every destination into a domain name that can be easily remembered. A DNS query is how every web session is initiated. If the query fails, users can’t get to the sites they’re attempting to access. Everyone has a stake in the proper functioning of DNS.

For service providers, the security, speed, and reliability of their service depends upon the proper execution of DNS queries. For enterprises, mission-critical operations and online commerce depend on the ability of customers and employees to find and access whatever they’re looking for. Everyday web surfers just want to get where their online browsing takes them — quickly and securely.

The Domain Name System was not Designed for Security

DNS was ratified as a standard internet protocol in 1983, when there was little concern about security and DNS attacks — that is, well before the appearance of the types of malicious cybercriminals we see today. The protocol has no built-in security or encryption and is transmitted in clear text that can be easily intercepted and spoofed to launch DNS attacks. As the disruption of DNS queries presents a single point of failure for network services and applications, DNS has become a common attack vector for cybercriminals.

A typical DNS query starts when a user, seeking to access a particular website, sends a DNS query via his or her device to the recursive DNS sever of a local ISP. The ISP then queries an authoritative DNS server to locate the IP address of the requested website. This entire process is transmitted, as noted, with little or no security. And, thus, the industry has recognized the need for a better way to secure the process of DNS resolution.

DNS over HTTPS: A New Way to Enhance DNS Security Solutions and User Privacy

Enter DNS over HTTPS (DoH), a recently drafted standard that changes how the DNS resolving process works. DoH only addresses the initial connection between a device and the local DNS resolver (i.e., the so-called “last mile”). It provides an option to encrypt the transmission of DNS queries, making them indistinguishable from HTTPS.

However, the rest of the query chain between the resolving DNS server and authoritative servers is not addressed. Rather, DoH focuses narrowly on DNS hijacking and the malicious activities derived from manipulating, redirecting, or impairing the queries that leave DNS resolution vulnerable to several types of DNS attacks.

How to mitigate these attack vulnerabilities is currently a hotly debated topic. Nevertheless, because of growing concerns about privacy and DNS security in today’s COVID-19-impacted, increasingly remote workforce, we believe that DoH will follow a pattern similar to that of HTTPS and see accelerated adoption by the industry. HTTPS was created in 1994 and formally specified in 2000. After the Edward Snowden leaks of highly classified intelligence in 2013, the use of HTTPS ramped up to where it is now with 80+ percent of web pages using the protocol.

At Stake: Who Gets to Resolve DNS Queries?

Initially proposed by the Internet Engineering Task Force (IETF) in late 2018, DNS over HTTPS (DoH) soon gave rise to a turf war. Traditionally, DNS has been resolved at the OS level, but initial DoH implementations from Mozilla and Google have been at the application level. That changes how DNS gets resolved and therefore who gets to resolve it.

For ISPs, DoH puts them at risk of being cut out of the resolution process by third-party DNS providers, where their subscribers can potentially be impacted. Many value-added services (e.g., parental controls and anti-malware) that subscribers pay for depend upon being able to see DNS queries. Additionally, service providers fear losing control of service quality as increased latency may result from using a different DNS resolver. Responses to law enforcement requests may also be impaired.

As for subscribers, they just want their communications to be secured and shielded from DNS attacks, and DoH does appear to address their long-standing concerns about malware, intrusions, data theft, and privacy.

A10’s DNS over HTTPS Solution

The DNS over HTTPS standard is still in draft form. It’s early in the process, but discussions are ongoing and the industry is responding rapidly. At A10 Networks, we believe that most operators will eventually offer DoH as an option. Accordingly, A10 has developed a DNS security solution using our carrier-grade Thunder® Convergent Firewall (CFW) that allows ISPs to do so without disrupting their existing DNS infrastructure or investments.

Our DNS security solution was recently selected by a tier-one operator in the Americas looking to ensure that it could continue to be meet its subscribers’ needs as the DNS standard evolves and protect against DNS attacks.

The solution helps the carrier ensure the continuity of its existing value-added services and maintain control of service quality. In addition, A10’s DNS over HTTPS solution helps cut costs and minimizes the impact to existing DNS infrastructures. Implemented in front of DNS servers, A10’s solution protects DNS investments while ensuring high performance and low latency. Read the case study to see how A10’s customer deployed a encrypted DNS protocol to protect its subscribers’ privacy and security.

Check out the DoH Webinar

Watch the on-demand webinar, “DoH – Strengthen DNS Infrastructure Security and Improve Subscriber Privacy,” now. We’ll cover the role of the Domain Name System, common DNS attack types, and industry developments as they pertain to DoH. The pros and cons for ISPs and subscribers will be explored and A10’s DNS security solution will be reviewed, including a demo featuring the A10 DoH solution in the Thunder Convergent Firewall (CFW).


|

August 12, 2020

About Terry Young

Terry Young is Director of 5G Marketing at A10 Networks. She is responsible for developing programs and marketing material that describe business value of A10 solutions for mobile network operators and other service providers. Prior to A10 Networks, Terry has 20 years experience in the telecommunications industry, including AT&T (mobile and fixed businesses), where she developed market strategy recommendations for new business initiatives for AT&T. As a principal analyst for a syndicated market research company early in the 3G technology introduction, her 3G/4G market analysis and forecasts were published by the UMTS Forum. She also previously held positions with several start-up mobile infrastructure and software vendors, including Infoblox and Palo Alto Networks. Terry has an MBA from Arizona State University and lives in the San Francisco Bay Area. READ MORE