Skip to content

Latest commit

 

History

History
15 lines (12 loc) · 1.03 KB

tq-004-DNS-TCP-DoT-DoH-against-same-resolver.md

File metadata and controls

15 lines (12 loc) · 1.03 KB

tq-004 DNS/TCP, DoT, DoH against same resolver

When a Probe assumes MITM between the client and the recursive DNS resolver, it is interesting to compare responses obtained via DNS/UDP and responses obtained via DNS/TCP, DoT (DNS over TLS) and DoH (DNS over HTTPS) as those requests are likely to go through the same network path. Extra IPs obtained this way may be added to a set of “Origin IPs” for further testing (TCP, HTTP, TLS).

It makes sense both for public DNS resolvers, and DNS resolvers run by ISPs.

Examples

  • AS41843, ER-Telecom, Omsk: DNS/TCP does not provoke “censored” reply for rutracker.org neither from Google’s 8.8.8.8, nor from ISP’s 5.3.3.3, but DNS/TCP gives “censored” reply from another ISP’s resolver 109.194.112.1
  • AS61173, Green Web Samaneh Novin Co Ltd, Iran — “uncensored” reply from 8.8.8.8 for bridges.torproject.org via TCP