Despite the rapid evolution of internet standards and an increasing amount of encryption, there is one aspect of our daily online world yet to drastically change: DNS. We don't think about it often, but it truly is the heart and backbone of everything we do online. Unless you want to memorize "2607:f8b0:400a:0804:0000:0000:0000:2004" to access Google, you must have working DNS. But DNS is inherently insecure: DNS is shown to be vulnerable to numerous attacks. This discussion specifically also exposes where you're going. While the HTTP payload may be encrypted, the DNS request that goes out first is still visible. DNSSEC was developed to help secure DNS and prevent spoofing. DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) are more recent developments that focus mainly on the privacy aspect of DNS communications (or lack thereof.) With DoH and DoT, clients and servers forego the typical DNS protocol request over UDP or TCP port 53 and embed the request inside an encrypted HTTPS or pure TLS connection.
During this F5 Test Drive Lab, learn how to detect DoH and DoT traffic with F5 SSL Orchestrator by using decrypted analysis. When the traffic is decrypted and identified as DoH and DoT, there are a number of things one can do, including:
Prerequisite: None
(ISC)2 CPE Credits:
This upcoming event will qualify for (ISC)2 CPE credits. As an approved (ISC)2 CPE Submitter Partner we will submit for CPE credits on your behalf.