Aniketh Girish
anikethgireesh@gmail.com
my quick open source story - boring, *showoff*
Which includes..
My complicated relationship with Networking
On a Serious note.
Why HTTPS here?
How insecure DNS is?
Under the hood DNS-over-HTTPS resolver implementation
I will talk more about.
How DNS-over-HTTPS brings secure DNS to the table?
I will talk more about.
The resistance!
Why not DNSSEC, DNS-over-TLS?
Disputes in secure DNS
2017- GSoC student with KDE, first patch in 2016 sept.
2018- Again, GSoC student with GNU Linux
2018- Exchange Student Ben-Gurion University, Israel
2019- Research Intern at Rochester Institute of Technology, USA
2019- Research collaboration with the University of Illinois at Chicago, USA
talks are fun (?)
you might enjoy this
Network/Internet Protocol Security enthusiast
mild OSS user/dev
me + IIESoc = ?
amFOSS Community
Are there any DNS servers available for me to resolve?
Sure, send all you need in Clear Text!!!
MITM: Man-in-the-Middle-attack
DNS communication over UDP or TCP is unencrypted. This is vulnerable to eavesdropping and spoofing
Responses can be tampered with
DNSSEC provides the check of authenticity but NOT availability
Tunnelling the full traffic via VPN is not a practical solution just to obtain authentic DNS records.
Diving into DoH:
The device-to-resolver connection is encrypted and hidden inside Web traffic
Each application can use a different resolver (DNS becomes an application level service, not a network one)
Each application maker can hardwire their own remote resolver, at least as a default
Creating IPv4 (A) && IPv6 (AAAA) and other RR records flags and what else?
Well, 80% of something is far better than 100% nothing
- Harvey Specter (Suits)
anikethgireesh@gmail.com