CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates

نویسندگان

چکیده

DNS manipulation is an increasingly common technique used by censors and other network adversaries to prevent users from accessing restricted Internet resources hijack their connections. Prior work in detecting relies largely on comparing resolutions with trusted control results identify inconsistencies. However, the emergence of CDNs cloud providers practicing content localization load balancing leads these heuristics being inaccurate, paving need for more verifiable signals manipulation. In this paper, we develop a new technique, CERTainty, that utilizes widely established TLS certificate ecosystem accurately detect manipulation, obtain information about performing such We find untrusted certificates, mismatching hostnames, blockpages are powerful proxies Our show previous using consistency-based allowing 72.45% false positives cases detected as Further, 17 commercial filtering products 52 countries, including SafeDNS, SkyDNS, Fortinet, presence 55 ASes 26 countries perform ISP-level also 226 blockpage clusters not covered research. integrating techniques CERTainty into active measurement platforms continuously monitor

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting DNS Root Manipulation

We present techniques for detecting unauthorized DNS root servers in the Internet using primarily endpoint-based measurements from RIPE Atlas, supplemented with BGP routing announcements from RouteViews and RIPE RIS. The first approach analyzes the latency to the root server and the second approach looks for route hijacks. We demonstrate the importance and validity of these techniques by measur...

متن کامل

Global-Scale Measurement of DNS Manipulation

Roya Ensafi is a Research Assistant Professor in Computer Science and Engineering at the University of Michigan, where her research focuses on computer networking and security. She pioneered the use of side-channels to remotely measure network interference and censorship of Internet traffic. Prior to joining Michigan, she was a postdoc at Princeton University. [email protected] Despite the perva...

متن کامل

Strengthening Web Authentication through TLS - Beyond TLS Client Certificates

Even though novel identification techniques like Single Sign-On (SSO) are on the rise, stealing the credentials used for the authentication is still possible. This situation can only be changed if we make novel use of the single cryptographic func-tionality a web browser offers, namely TLS. Although the use of client certificates for initial login has a long history, only two approaches to inte...

متن کامل

Detecting DNS Tunnels Using Character Frequency Analysis

High-bandwidth covert channels pose significant risks to sensitive and proprietary information inside company networks. Domain Name System (DNS) tunnels provide a means to covertly infiltrate and exfiltrate large amounts of information passed network boundaries. This paper explores the possibility of detecting DNS tunnels by analyzing the unigram, bigram, and trigram character frequencies of do...

متن کامل

DNS Trace Replay at Scale (abstract)

The Domain Name System (DNS) has grown to play various of broader roles in the Internet, beyond nameto-address mapping. It provides query engine for antispam [2] and replica selection for content delivery networks (CDNs) [3]. DANE [1] provides additional source of trust by leveraging the integrity verification of DNSSEC. The wide use and critical role of DNS prompt its continuous evolution. How...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2023

ISSN: ['2299-0984']

DOI: https://doi.org/10.56553/popets-2023-0073