{"id":2201,"date":"2020-02-20T08:37:53","date_gmt":"2020-02-20T05:37:53","guid":{"rendered":"https:\/\/vasexperts-ru.hst11.itglobal.com\/blog\/%d0%b1%d0%b5%d0%b7-%d1%80%d1%83%d0%b1%d1%80%d0%b8%d0%ba%d0%b8\/dns-https-point-contention\/"},"modified":"2025-08-11T14:14:05","modified_gmt":"2025-08-11T11:14:05","slug":"dns-https-point-contention","status":"publish","type":"post","link":"https:\/\/vasexperts.com\/br\/blog\/telecom\/dns-https-point-contention\/","title":{"rendered":"DNS over HTTPS: o ponto de disc\u00f3rdia"},"content":{"rendered":"O DNS sobre HTTPS (DoH) criptografa consultas e respostas do servidor DNS. Os nomes dos servidores remotos s\u00e3o ocultados se o usu\u00e1rio os acessar usando DoH.\r\n\r\nO motivo do argumento \u00e9 que parte da comunidade de TI considera que o protocolo adiciona uma camada extra de seguran\u00e7a \u00e0 internet. Por isso, ele j\u00e1 est\u00e1 implementado em alguns servi\u00e7os e aplicativos. Por outro lado, existem novas dificuldades e desafios no trabalho dos administradores de sistemas.\r\n\r\nPrecisamos entender o mecanismo do protocolo DoH para chegar ao cerne do problema. Com o DNS comum, o nome do host e o endere\u00e7o s\u00e3o transmitidos em texto n\u00e3o criptografado. No protocolo DoH, uma consulta por um endere\u00e7o IP \u00e9 encapsulada em tr\u00e1fego HTTPS criptografado. Depois disso, ela \u00e9 transmitida ao servidor HTTP e processada com comandos de API.\r\n\r\nEste \u00e9 um exemplo de tal consulta do RFC 8484 (<a href=\"https:\/\/tools.ietf.org\/html\/rfc8484\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">p\u00e1gina 4<\/a>):\r\n<pre>   :method = GET\r\n   :scheme = https\r\n   :authority = dnsserver.example.net\r\n   :path = \/dns-query?\r\n           dns=AAABAAABAAAAAAAAAWE-NjJjaGFyYWN0ZXJsYWJl\r\n           bC1tYWtlcy1iYXNlNjR1cmwtZGlzdGluY3QtZnJvbS1z\r\n           dGFuZGFyZC1iYXNlNjQHZXhhbXBsZQNjb20AAAEAAQ\r\n   accept = application\/dns-message\r\n<\/pre>\r\nComo podemos ver, as consultas ao DNS s\u00e3o an\u00f4nimas, pois est\u00e3o ocultas no HTTPS.\r\n<h2>O anonimato \u00e9 bom. Qual \u00e9 o problema?<\/h2>\r\nO primeiro motivo para descartar o DNS sobre HTTPS \u00e9 a seguran\u00e7a reduzida da Internet. Ser\u00e1 mais dif\u00edcil para os administradores de sistema bloquearem sites maliciosos, pois os nomes n\u00e3o poder\u00e3o ser removidos do tr\u00e1fego HTTPS. Al\u00e9m disso, os assinantes n\u00e3o poder\u00e3o mais usar o controle parental nos navegadores.\r\n\r\nPor exemplo, o sistema legal na Gr\u00e3-Bretanha <a href=\"https:\/\/en.wikipedia.org\/wiki\/Web_blocking_in_the_United_Kingdom\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">obriga<\/a> os ISPs a bloquear sites proibidos. Com o protocolo DOH, torna-se quase imposs\u00edvel filtrar o tr\u00e1fego. A Sede de Comunica\u00e7\u00f5es do Governo (GCHQ) e a Internet Watch Foundation (IWF) protestam contra a populariza\u00e7\u00e3o do protocolo \u2014 a tarefa dessas organiza\u00e7\u00f5es \u00e9 manter um registro dos recursos bloqueados.\r\n\r\nMesmo sistemas modernos de filtragem de tr\u00e1fego, como o <a href=\"\/br\/products\/stingray\/\" rel=\"noopener noreferrer\" target=\"_blank\">Stingray Service Gateway<\/a>, n\u00e3o conseguem realizar uma an\u00e1lise completa do tr\u00e1fego HTTPS. Esses sistemas utilizam classifica\u00e7\u00e3o por SSL\/TLS (Nome Comum) ou Indica\u00e7\u00e3o de Nome de Servidor (SNI) e an\u00e1lise de assinatura do fluxo de tr\u00e1fego.\r\n\r\nO segundo problema do DNS sobre HTTPS s\u00e3o os novos malwares que utilizam as caracter\u00edsticas espec\u00edficas do protocolo. Por exemplo, em julho de 2019, especialistas em seguran\u00e7a da Netlab <a href=\"https:\/\/www.zdnet.com\/article\/first-ever-malware-strain-spotted-abusing-new-doh-dns-over-https-protocol\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">descobriram<\/a> um novo v\u00edrus chamado <a href=\"https:\/\/blog.netlab.360.com\/an-analysis-of-godlua-backdoor-en\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Godlua<\/a> que utilizava o DoH para ataques DDoS. O v\u00edrus obt\u00e9m registros DNS de texto (TXT) e URLs de servidores de controle do DoH.\r\n\r\nA seguran\u00e7a cibern\u00e9tica est\u00e1 amea\u00e7ada porque as solu\u00e7\u00f5es antiv\u00edrus populares n\u00e3o conseguem reconhecer as consultas DoH criptografadas. Portanto, \u00e9 prov\u00e1vel que novos v\u00edrus apare\u00e7am e a situa\u00e7\u00e3o pode piorar.\r\n\r\n<h2>O lado positivo<\/h2>\r\nAo mesmo tempo, um novo protocolo pode fortalecer a seguran\u00e7a cibern\u00e9tica. O DoH pode <a href=\"https:\/\/www.potaroo.net\/ispcol\/2018-10\/doh.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ajudar<\/a> a neutralizar os ataques de sequestro de DNS cada vez mais comuns. Isso \u00e9 <a href=\"https:\/\/www.potaroo.net\/ispcol\/2018-10\/doh.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">confirmado<\/a> pelo relat\u00f3rio da empresa de seguran\u00e7a da informa\u00e7\u00e3o FireEye. O protocolo tamb\u00e9m \u00e9 suportado por diversas outras grandes empresas de TI.\r\n\r\nDesde 2018, o Google vem testando o protocolo DNS sobre HTTPS. H\u00e1 pouco tempo, a empresa <a href=\"https:\/\/threatpost.com\/google-announces-dns-over-https-general-availability\/146057\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">anunciou<\/a> seu servi\u00e7o de Disponibilidade Geral (DoH). O Google espera que a distribui\u00e7\u00e3o do DoH aumente o n\u00edvel de seguran\u00e7a dos dados pessoais e proteja contra ataques MITM.\r\n\r\nPor sua vez, desde o ver\u00e3o passado, a Mozilla <a href=\"https:\/\/blog.nightly.mozilla.org\/2018\/06\/01\/improving-dns-privacy-in-firefox\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">oferece suporte<\/a> \u00e0 opera\u00e7\u00e3o completa do DNS sobre HTTPS e est\u00e1 ativamente apoiando o protocolo. A Associa\u00e7\u00e3o de Provedores de Servi\u00e7os de Internet (ISPA) <a href=\"https:\/\/www.zdnet.com\/article\/uk-isp-group-names-mozilla-internet-villain-for-supporting-dns-over-https\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">indicaram<\/a> a Mozilla para o pr\u00eamio de \u201cVil\u00e3o da Internet do Ano\u201d; os representantes do navegador <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/07\/05\/mozilla-slammed-as-internet-villain-for-letting-children-visit-banned-websites\/#47508a67f1bc\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">responderam<\/a> que est\u00e3o decepcionados com a tend\u00eancia das operadoras de telecomunica\u00e7\u00f5es de abandonar as atualiza\u00e7\u00f5es de infraestrutura e \u201cestarem atualizadas\u201d. Embora a nomea\u00e7\u00e3o tenha sido retirada depois que <a href=\"https:\/\/www.theregister.co.uk\/2019\/07\/12\/ispa_hands_awards_to_bt_and_openreach_following_mozilla_gaffe\/\" rel=\"noopener norefferer nofollow noreferrer\" target=\"_blank\">grande m\u00eddia<\/a> e alguns provedores se manifestaram a favor da Mozilla e da British Telecom, alegando que o novo protocolo s\u00f3 aumentar\u00e1 a seguran\u00e7a dos usu\u00e1rios brit\u00e2nicos sem afetar a qualidade da filtragem de conte\u00fado.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/07\/doh-firefox-mozilla.jpg\" alt=\"DoH-FireFox-Mozilla\" width=\"100%\" class=\"alignnone size-full wp-image-2017\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/07\/doh-firefox-mozilla.jpg\" alt=\"DoH-FireFox-Mozilla\" width=\"100%\" class=\"alignnone size-full wp-image-2017 lazyload\" data-src=\"\/wp-content\/uploads\/2020\/07\/doh-firefox-mozilla.jpg\">\r\n\r\nOs provedores de nuvem tamb\u00e9m intervieram. A Cloudflare j\u00e1 oferece servi\u00e7os de DNS baseados em DNS sobre HTTPS.\r\n\r\nAs disputas n\u00e3o se acalmar\u00e3o por muito tempo. Novas tecnologias s\u00e3o sempre recebidas com hostilidade e muita discuss\u00e3o, e uma implementa\u00e7\u00e3o generalizada do novo protocolo pode ser esperada provavelmente <a href=\"https:\/\/packetpushers.net\/response-doh-dns-over-https-explained-apnic-blog\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">em mais de uma d\u00e9cada<\/a>. Atualmente, voc\u00ea pode encontrar a lista de navegadores e clientes que suportam DNS sobre HTTPS no <a href=\"https:\/\/github.com\/curl\/curl\/wiki\/DNS-over-HTTPS\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GitHub<\/a>.\r\n\r\n[subscription id=\u201d11987\u2033]Assine nossa newsletter e fique por dentro das \u00faltimas novidades e ofertas especiais.[\/subscription]","protected":false},"excerpt":{"rendered":"<p>Em 2018, a IETF aprovou um novo protocolo chamado DNS sobre HTTPS, mas o t\u00f3pico ganhou a aten\u00e7\u00e3o da comunidade de TI h\u00e1 pouco tempo. N\u00e3o apenas o lado positivo foi levado em considera\u00e7\u00e3o: houve debates acalorados sobre os recursos e benef\u00edcios do protocolo entre ISPs e desenvolvedores.<\/p>\n","protected":false},"author":1,"featured_media":2202,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48],"tags":[],"class_list":["post-2201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-telecom"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>(English) VASExperts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/\",\"url\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/\",\"name\":\"[:en]DNS over HTTPS: the point of contention \u2014 VAS Experts[:es]DNS sobre HTTPS: el punto de discusi\u00f3n \u2014 VAS Experts[:fr]DNS sur HTTPS : le point de discorde \u2014 VAS Experts[:br]DNS over HTTPS: o ponto de disc\u00f3rdia \u2014 VAS Experts\",\"isPartOf\":{\"@id\":\"https:\/\/vasexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg\",\"datePublished\":\"2020-02-20T05:37:53+00:00\",\"dateModified\":\"2025-08-11T11:14:05+00:00\",\"author\":{\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/da05c9a6f023e1596cae221d4037bea5\"},\"description\":\"[:en]DNS over HTTPS (DoH) encrypts queries and responses from DNS-server. The names of the remote servers are hidden if the user accesses them using DoH[:es]DNS sobre HTTPS (DoH) cifra las consultas y respuestas del servidor DNS. Los nombres de los servidores remotos se ocultan si el usuario accede a ellos mediante DoH[:fr]DNS over HTTPS (DoH) crypte les requ\u00eates et les r\u00e9ponses du serveur DNS. Les noms des serveurs distants sont cach\u00e9s si l'utilisateur y acc\u00e8de en utilisant DoH[:br]DNS over HTTPS (DoH) criptografa consultas e respostas do servidor DNS. Os nomes dos servidores remotos s\u00e3o ocultados se o usu\u00e1rio os acessar usando DoH.\",\"breadcrumb\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#breadcrumb\"},\"inLanguage\":\"br-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"br-PT\",\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg\",\"width\":1140,\"height\":760},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/vasexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS over HTTPS: the point of contention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vasexperts.com\/#website\",\"url\":\"https:\/\/vasexperts.com\/\",\"name\":\"ITGLOBAL.COM\",\"description\":\"(English) VASExperts\",\"inLanguage\":\"br-PT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/da05c9a6f023e1596cae221d4037bea5\",\"name\":\"ivan.kuzin\",\"sameAs\":[\"https:\/\/vasexperts-ru.hst11.itglobal.com\"],\"url\":\"https:\/\/vasexperts.com\/br\/blog\/author\/ivan-kuzin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"(English) VASExperts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/","url":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/","name":"[:en]DNS over HTTPS: the point of contention \u2014 VAS Experts[:es]DNS sobre HTTPS: el punto de discusi\u00f3n \u2014 VAS Experts[:fr]DNS sur HTTPS : le point de discorde \u2014 VAS Experts[:br]DNS over HTTPS: o ponto de disc\u00f3rdia \u2014 VAS Experts","isPartOf":{"@id":"https:\/\/vasexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage"},"image":{"@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg","datePublished":"2020-02-20T05:37:53+00:00","dateModified":"2025-08-11T11:14:05+00:00","author":{"@id":"https:\/\/vasexperts.com\/#\/schema\/person\/da05c9a6f023e1596cae221d4037bea5"},"description":"[:en]DNS over HTTPS (DoH) encrypts queries and responses from DNS-server. The names of the remote servers are hidden if the user accesses them using DoH[:es]DNS sobre HTTPS (DoH) cifra las consultas y respuestas del servidor DNS. Los nombres de los servidores remotos se ocultan si el usuario accede a ellos mediante DoH[:fr]DNS over HTTPS (DoH) crypte les requ\u00eates et les r\u00e9ponses du serveur DNS. Les noms des serveurs distants sont cach\u00e9s si l'utilisateur y acc\u00e8de en utilisant DoH[:br]DNS over HTTPS (DoH) criptografa consultas e respostas do servidor DNS. Os nomes dos servidores remotos s\u00e3o ocultados se o usu\u00e1rio os acessar usando DoH.","breadcrumb":{"@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#breadcrumb"},"inLanguage":"br-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/"]}]},{"@type":"ImageObject","inLanguage":"br-PT","@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage","url":"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg","contentUrl":"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg","width":1140,"height":760},{"@type":"BreadcrumbList","@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/vasexperts.com\/"},{"@type":"ListItem","position":2,"name":"DNS over HTTPS: the point of contention"}]},{"@type":"WebSite","@id":"https:\/\/vasexperts.com\/#website","url":"https:\/\/vasexperts.com\/","name":"ITGLOBAL.COM","description":"(English) VASExperts","inLanguage":"br-PT"},{"@type":"Person","@id":"https:\/\/vasexperts.com\/#\/schema\/person\/da05c9a6f023e1596cae221d4037bea5","name":"ivan.kuzin","sameAs":["https:\/\/vasexperts-ru.hst11.itglobal.com"],"url":"https:\/\/vasexperts.com\/br\/blog\/author\/ivan-kuzin\/"}]}},"_links":{"self":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/2201"}],"collection":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/comments?post=2201"}],"version-history":[{"count":10,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/2201\/revisions"}],"predecessor-version":[{"id":12909,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/2201\/revisions\/12909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/media\/2202"}],"wp:attachment":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/media?parent=2201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/categories?post=2201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/tags?post=2201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}