The Chinese threat group 'ChamelGang' infects Linux devices with a previously unknown implant named 'ChamelDoH,' allowing DNS-over-HTTPS communications with attackers' servers.
So … people misusing DoH – a system that makes it impossible to block or see the traffic because you cannot block port 443 nowadays and where it is by design that the individual clients and not the operating system handle DNS requests?
Yes, it isn’t great how DoH traffic can’t be controlled well. Apps using DoH makes blocking ads unnecessarily more difficult. (DoT solves DNS encryption better imo.) HTTPS is already often unblocked and also difficult to analyze, but DNS is already used enough for malware communication.
So … people misusing DoH – a system that makes it impossible to block or see the traffic because you cannot block port 443 nowadays and where it is by design that the individual clients and not the operating system handle DNS requests?
DoH was a mistake.
Yes, it isn’t great how DoH traffic can’t be controlled well. Apps using DoH makes blocking ads unnecessarily more difficult. (DoT solves DNS encryption better imo.) HTTPS is already often unblocked and also difficult to analyze, but DNS is already used enough for malware communication.
DoH can be blocked while allowing other traffic. idk how, but the fortigate at my work has an active rule to block DoH.