Re: [Add] Google's DOH(like) being used for evil already

Stephane Bortzmeyer <bortzmeyer@nic.fr> Wed, 12 June 2019 13:24 UTC

Return-Path: <bortzmeyer@nic.fr>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 982A0120115 for <add@ietfa.amsl.com>; Wed, 12 Jun 2019 06:24:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8eZczziFQAes for <add@ietfa.amsl.com>; Wed, 12 Jun 2019 06:24:33 -0700 (PDT)
Received: from mx4.nic.fr (mx4.nic.fr [IPv6:2001:67c:2218:2::4:12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2976F1200B3 for <add@ietf.org>; Wed, 12 Jun 2019 06:24:33 -0700 (PDT)
Received: from mx4.nic.fr (localhost [127.0.0.1]) by mx4.nic.fr (Postfix) with SMTP id 668A628068C; Wed, 12 Jun 2019 15:24:30 +0200 (CEST)
Received: from relay01.prive.nic.fr (pa-th3.interco.nic.fr [192.134.4.74]) by mx4.nic.fr (Postfix) with ESMTP id 60B46280606; Wed, 12 Jun 2019 15:24:30 +0200 (CEST)
Received: from b12.nic.fr (b12.tech.ipv6.nic.fr [IPv6:2001:67c:1348:7::86:133]) by relay01.prive.nic.fr (Postfix) with ESMTP id 5D816642A7A1; Wed, 12 Jun 2019 15:24:30 +0200 (CEST)
Received: by b12.nic.fr (Postfix, from userid 1000) id 5834B40237; Wed, 12 Jun 2019 15:24:30 +0200 (CEST)
Date: Wed, 12 Jun 2019 15:24:30 +0200
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: Wes Hardaker <wjhns1@hardakers.net>
Cc: add@ietf.org
Message-ID: <20190612132430.ephihrsbijxprfan@nic.fr>
References: <yblblz3cfpo.fsf@wu.hardakers.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <yblblz3cfpo.fsf@wu.hardakers.net>
X-Operating-System: Debian GNU/Linux 9.9
X-Kernel: Linux 4.9.0-8-amd64 x86_64
X-Charlie: Je suis Charlie
Organization: NIC France
X-URL: http://www.nic.fr/
User-Agent: NeoMutt/20170113 (1.7.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/6lkOu-0D6OWNfHwnsK7S1NkG6Oo>
Subject: Re: [Add] Google's DOH(like) being used for evil already
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jun 2019 13:24:36 -0000

On Wed, Jun 12, 2019 at 02:31:31AM -0700,
 Wes Hardaker <wjhns1@hardakers.net> wrote 
 a message of 11 lines which said:

>https://myonlinesecurity.co.uk/it-looks-like-another-dns-compromise-hack-happening/

It's not DoH but a Google's proprietary protocol (which is something
that many people miss: in the permissionless environment of the
Internet, anyone can invent and deploy a name resolution protocol).

They could have used any of the many DNS->Web gateways.