Bart van de Velde from Cisco talking about the emerging use of #QUIC at #RIPE86. In the next release of our free, #OpenSource #DNS resolver Unbound, we’ll offer support for DNS-over-QUIC. #DoQ https://github.com/NLnetLabs/unbound/pull/871
#quic #ripe86 #opensource #dns #DoQ
Our DNS-over-QUIC implementation for Unbound #DNS resolver is now ready for review! #DoQ #OpenSource #OpenStandards https://github.com/NLnetLabs/unbound/pull/871
#dns #DoQ #opensource #openstandards
@danwing The attack works by having a pretend client send a forged packet to the #QUIC server, setting source address and port to the target values, plus using invalid QUIC version. Legit traffic comes from clients (ports > 1024?) and perhaps, rarely, from QUIC servers. It is very unlikely to come from port 53, for example (#DoQ specifically says don't do that). Protection could work now. Downside is maybe impeding VN, but we do have a safe alternative for VN: https://www.ietf.org/archive/id/draft-ietf-quic-version-negotiation-09.html
Implementing DNS-over-QUIC in Unbound is turning out to be quite an adventure, but we're making good progress! #DNS #DoQ #OpenSource #clang #SoftwareDevelopment https://github.com/NLnetLabs/unbound/commit/aa8c9c4367792c674c76181c3fbfdee9996e9be8
#dns #DoQ #opensource #clang #softwaredevelopment
@partim is now giving the entire NLnet Labs #DNS team a detailed rundown of the #Rust domain crate, setting the stage for our #rustlang development work for DNS in 2023. Exciting times ahead! #OpenSource #programming #DoT #DoH #DoQ #DNSSEC
#dns #rust #rustlang #opensource #programming #dot #doh #DoQ #dnssec
Check out Philip Homburg's #IETF draft "Control Options For #DNS Client Proxies". It introduces EDNS(0) options that allow a stub resolver to request certain transport and allow the proxy to report capabilities and actual transports that are available. #IETF115 #OpenStandards #DoT #DoH #DoQ https://datatracker.ietf.org/doc/draft-homburg-add-codcp/
#ietf #dns #IETF115 #openstandards #dot #doh #DoQ
RT @Le_Alternative
Una lunga lista di alternative: quali DNS privati utilizzare? Vi proponiamo anche molti DNS per bloccare pubblicità e traccianti!
#adguard #dnsprivati #doh #doq #dot #nextdns #quad9
https://www.lealternative.net/2022/07/13/quali-dns-privati-utilizzare/
#quad9 #NextDNS #dot #DoQ #doh #dnsprivati #adguard
Quali DNS privati utilizzare?
Una lunga lista di alternative: quali DNS privati utilizzare? Vi proponiamo anche molti DNS per bloccare pubblicità e traccianti!
LINK --> https://www.lealternative.net/2022/07/13/quali-dns-privati-utilizzare/
#OltreGoogle #adguard #dnsprivati #doh #doq #dot #nextdns #quad9
#OltreGoogle #adguard #dnsprivati #doh #DoQ #dot #NextDNS #quad9
RFC 9250: DNS over Dedicated QUIC Connections
Ce nouveau #RFC complète la série des mécanismes de protection cryptographique du DNS. Après DoT et DoH, voici #DoQ, #DNS sur #QUIC. On notera que bien que QUIC ait été conçu essentiellement pour les besoins de HTTP, c'est le DNS qui a été la première application normalisée de QUIC.
If you examine your network traffic, #DoQ runs by default over port 853 (like DNS over DTLS, which nobody ever used).