2018
DOI: 10.17487/rfc8310
|View full text |Cite
|
Sign up to set email alerts
|

Usage Profiles for DNS over TLS and DNS over DTLS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 2 publications
0
5
0
1
Order By: Relevance
“…They performed a downgrade attack by blocking the DoH connection, forcing the browsers to roll back to traditional unencrypted DNS without any noticeable alert in the user interface. According to the study [24], browser vendors do not consider this attack as a vulnerability but rather a welldocumented feature also described in RFC 8310 [25]. The impact of a downgrade attack could be reduced by proper notification about lost privacy; however, none of the browser vendors plan to integrate it [24].…”
Section: B Adoption Perspectivementioning
confidence: 99%
“…They performed a downgrade attack by blocking the DoH connection, forcing the browsers to roll back to traditional unencrypted DNS without any noticeable alert in the user interface. According to the study [24], browser vendors do not consider this attack as a vulnerability but rather a welldocumented feature also described in RFC 8310 [25]. The impact of a downgrade attack could be reduced by proper notification about lost privacy; however, none of the browser vendors plan to integrate it [24].…”
Section: B Adoption Perspectivementioning
confidence: 99%
“…The AS-based analysis can, therefore, not be extended to the whole monitoring period of the MAWI monitor. We are aware of other evolving protocols and protocol extensions/updates, such as HTTP/2 [46], TLS 1.3 [47], DNS over TLS (DoT) [48], [49], or DNS over HTTPS (DoH) [50]. However, traffic using HTTP/2, TLS 1.3, or DoH cannot be accurately identified based on the public trace data, as the monitors drop all packet information above the transport layer.…”
Section: Limitations and Future Directionsmentioning
confidence: 99%
“…Para a criptografia o proxy utiliza os seguintes softwares/protocolos: DNSCrypt 2 , DNS Queries over HTTPS (DoH) [10] e DNS over Transport Layer Security (DoT) [8,9,13].…”
Section: Métodos E Materiaisunclassified