Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:02 PM
Connect Directly

Windows Gets Privacy Boost For DNS

New public-domain 'VPN For DNS' technology encrypts exposed link between Windows machines and DNS

New open-source technology locks down the "last mile" traditionally exposed between a Windows computer and the Domain Name Service (DNS) provider, especially in public WiFi networks.

DNS provider OpenDNS today released a Windows version of its DNSCrypt tool for its customers, as well the open-source code for DNSCrypt. OpenDNS in December first rolled out DNSCrypt versions for the Macintosh and Linux operating systems.

Dan Hubbard, CTO of OpenDNS, says privacy and man-in-the-middle attack concerns are on the rise as users become more mobile. "Our technology takes one of the most important protocols and encrypts that," Hubbard says.

And not all applications for business users require a traditional VPN connection anymore, he says. "There are more things going to the cloud. You can do more of your work without having to VPN or tunnel back to the company," he says.

OpenDNS expects to see developers start deploying DNSCrypt, he says. Some open-source router manufacturers have been discussing adopting it, for example, Hubbard says.

Security expert Dan Kaminsky says OpenDNS's DNSCrypt technology is basically a way to VPN to your connection to the DNS. But it doesn't solve the problem of compromised certificate authorities or DNS cache poisoning, he notes. "It's neat and occasionally helpful, but it's not a fix for DigiNotar in any way. DNSCrypt does nothing to implement end-to-end trust," Kaminsky says. "It's a VPN for DNS traffic, not more than that, but not less." It protects users from man-in-the-middle and spoofing attacks at the DNS protocol specifically, but a determined attacker will likely try more than just an attack at the DNS level. "If an attacker is sitting in a coffee shop and snooping on traffic, there's probably way more interesting stuff than DNS traffic," says Bruce Van Nice, director of product marketing for Nominum. "That's a small part of the problem. If an attacker has the capability to snoop DNS, it seems he would want to capture a lot of other stuff, too."

DNSCrypt can work in concert with DNSSEC, which digitally signs DNS responses to ensure a website is who it says it is, for instance. DNSSEC also helps defend against cache-poisoning attacks.

[ Many companies do not scrutinize their domain-name service traffic, leaving an opening for malware to communicate using the protocol. See Malware To Increasingly Abuse DNS?. ]

OpenDNS's Hubbard says more than 10,000 users are running DNSCrypt just for the Mac, and mainly for open WiFi environments. It uses elliptical curve cryptography to encrypt the traffic between the user and DNS.

DNSCrypt has caught the attention of privacy advocates, too. "OpenDNS is addressing the serious issue of DNS query privacy -- this is an issue that many have otherwise overlooked or incorrectly dismissed as irrelevant. It is an important step forward in network privacy and it will improve the Internet," said security researcher Jacob Applebaum, who is one of the key members of the TOR Project, in a statement when DNSCrypt was first announced in December. "It is wonderful that OpenDNS has decided to build on a free software base and doing so with openly specified ideas is a solid foundation for a safer Internet."

The open-source Windows tool, as well as OpenDNS's commercial software for its customers, are available for download here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Can you smell me now?
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.