{"id":2201,"date":"2020-02-20T08:37:53","date_gmt":"2020-02-20T05:37:53","guid":{"rendered":"https:\/\/vasexperts-ru.hst11.itglobal.com\/blog\/%d0%b1%d0%b5%d0%b7-%d1%80%d1%83%d0%b1%d1%80%d0%b8%d0%ba%d0%b8\/dns-https-point-contention\/"},"modified":"2025-08-11T14:14:05","modified_gmt":"2025-08-11T11:14:05","slug":"dns-https-point-contention","status":"publish","type":"post","link":"https:\/\/vasexperts.com\/fr\/blog\/telecom\/dns-https-point-contention\/","title":{"rendered":"DNS over HTTPS \u2013 s\u00e9curit\u00e9 ou complexit\u00e9 de fonctionnement"},"content":{"rendered":"Le protocole DNS over HTTPS (DoH) a pour principe de chiffrer les requ\u00eates et les r\u00e9ponses au serveur DNS. Les noms des serveurs distants auxquels l\u2019utilisateur acc\u00e8de \u00e0 l\u2019aide du DoH sont cach\u00e9s.\r\n\r\nLa cause du d\u00e9bat est qu\u2019une partie de la communaut\u00e9 consid\u00e8re que le protocole augmente le niveau de s\u00e9curit\u00e9 sur Internet et le met d\u00e9j\u00e0 en \u0153uvre dans les applications et les services, mais une autre parle de difficult\u00e9s suppl\u00e9mentaires dans le travail des administrateurs syst\u00e8me.\r\n\r\nPour comprendre l\u2019essence du conflit il faut comprendre le m\u00e9canisme du DNS over HTTPS. Si le nom d\u2019h\u00f4te et l\u2019adresse sont transmis en clair lors de l\u2019utilisation du DNS classique, le protocole DoH encapsule la demande d\u2019adresse IP dans le trafic HTTPS chiffr\u00e9. Ensuite, il est transmis au serveur HTTP et est trait\u00e9 \u00e0 l\u2019aide de commandes API.\r\n\r\nVoici un exemple de cette requ\u00eate de la RFC 8484 (<a href=\"https:\/\/tools.ietf.org\/html\/rfc8484\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">page 4<\/a>) :\r\n<pre>   :method = GET\r\n   :scheme = https\r\n   :authority = dnsserver.example.net\r\n   :path = \/dns-query?\r\n           dns=AAABAAABAAAAAAAAAWE-NjJjaGFyYWN0ZXJsYWJl\r\n           bC1tYWtlcy1iYXNlNjR1cmwtZGlzdGluY3QtZnJvbS1z\r\n           dGFuZGFyZC1iYXNlNjQHZXhhbXBsZQNjb20AAAEAAQ\r\n   accept = application\/dns-message\r\n<\/pre>\r\nComme vous pouvez le voir dans l\u2019exemple, les requ\u00eates DNS sont anonymes, car elles sont cach\u00e9es dans le trafic HTTPS.\r\n\r\n<h2>L\u2019anonymat c\u2019est bon, mais quel est le probl\u00e8me ?<\/h2>\r\nLa premi\u00e8re raison de l\u2019\u00e9chec du DNS over HTTPS est la r\u00e9duction de la s\u00e9curit\u00e9 du travail sur Internet. Il sera plus difficile pour l\u2019administrateur syst\u00e8me de bloquer les sites malveillants, car leurs noms ne peuvent pas \u00eatre retir\u00e9s du trafic HTTPS, et les utilisateurs ordinaires perdront la possibilit\u00e9 de contr\u00f4le parental dans les navigateurs de leurs appareils.\r\n\r\nLa l\u00e9gislation britannique, tout comme en Russie, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Web_blocking_in_the_United_Kingdom\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">oblige<\/a> les fournisseurs de services Internet \u00e0 bloquer les sites interdits. Avec le protocole DoH, il devient presque impossible de filtrer le trafic. Le Centre de communication du gouvernement pour l\u2019Angleterre (GCHQ) et l\u2019Internet Watch Foundation (IWF) s\u2019opposent \u00e0 la vulgarisation du protocole, leur t\u00e2che est de maintenir un registre des ressources bloqu\u00e9es.\r\n\r\nM\u00eame les syst\u00e8mes modernes de filtrage du trafic, tels que le <a href=\"\/fr\/products\/stingray\/\" rel=\"noopener noreferrer\" target=\"_blank\">Stingray Service Gateway<\/a>, ne peuvent pas effectuer une analyse compl\u00e8te du trafic HTTPS. Ils utilisent des m\u00e9thodes de classification par nom de service dans un certificat SSL\/TLS (Common Name) ou dans Server Name Indication (SNI), ainsi qu\u2019une analyse de signature de flux de trafic.\r\n\r\nLe deuxi\u00e8me probl\u00e8me de l\u2019utilisation de DNS over HTTPS est l\u2019\u00e9mergence de nouveaux logiciels malveillants qui utilisent les caract\u00e9ristiques du protocole. Par exemple, en juillet de cette ann\u00e9e, les sp\u00e9cialistes de la s\u00e9curit\u00e9 de l\u2019information Netlab ont <a href=\"https:\/\/www.zdnet.com\/article\/first-ever-malware-strain-spotted-abusing-new-doh-dns-over-https-protocol\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">d\u00e9couvert<\/a> un nouveau virus <a href=\"https:\/\/blog.netlab.360.com\/an-analysis-of-godlua-backdoor-en\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Godlua<\/a> utilisant le DoH pour proc\u00e9der des attaques DDoS. Le programme malveillant du DoH obtient des enregistrements de texte DNS (TXT) et des URL de serveur de gestion.\r\n\r\nLa menace de la cybers\u00e9curit\u00e9 est que les solutions antivirus populaires ne peuvent pas reconna\u00eetre les requ\u00eates DoH crypt\u00e9es. Ensuite, de nouveaux virus appara\u00eetront et la situation commencera \u00e0 s\u2019aggraver.\r\n\r\n<h2>Il y a aussi des avantages<\/h2>\r\n\r\nLe nouveau protocole peut \u00e9galement renforcer la cybers\u00e9curit\u00e9, il permet de lutter <a href=\"https:\/\/www.potaroo.net\/ispcol\/2018-10\/doh.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">contre les attaques<\/a> DNS hijacking, qui sont de plus en plus r\u00e9pandues. La preuve de cela peut \u00eatre trouv\u00e9e dans <a href=\"https:\/\/www.potaroo.net\/ispcol\/2018-10\/doh.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">le rapport<\/a> de la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 informatique FireEye, et le protocole est \u00e9galement pris en charge par d\u2019autres grandes entreprises informatiques.\r\n\r\nGoogle teste DoH depuis l\u2019ann\u00e9e derni\u00e8re et, plus r\u00e9cemment, la soci\u00e9t\u00e9 General Availability a <a href=\"https:\/\/threatpost.com\/google-announces-dns-over-https-general-availability\/146057\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">pr\u00e9sent\u00e9<\/a> son service DoH. Google estime que la diffusion du DoH am\u00e9liorera la s\u00e9curit\u00e9 des donn\u00e9es personnelles et fournira une protection contre les attaques MITM.\r\n\r\n\u00c0 son tour, Mozilla <a href=\"https:\/\/blog.nightly.mozilla.org\/2018\/06\/01\/improving-dns-privacy-in-firefox\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">depuis<\/a> l\u2019\u00e9t\u00e9 dernier prend en charge le fonctionnement complet de DNS over HTTPS et est engag\u00e9 dans un support actif pour le protocole. \u2018Association des fournisseurs de services Internet Internet Services Providers Association (ISPA) a <a href=\"https:\/\/www.zdnet.com\/article\/uk-isp-group-names-mozilla-internet-villain-for-supporting-dns-over-https\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">nomm\u00e9<\/a> Mozilla pour le prix \u00ab Internet Villain of the Year \u00bb ; les repr\u00e9sentants des navigateurs ont <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/07\/05\/mozilla-slammed-as-internet-villain-for-letting-children-visit-banned-websites\/#47508a67f1bc\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">r\u00e9pondu<\/a> qu\u2019ils \u00e9taient d\u00e9\u00e7us de la tendance des op\u00e9rateurs de t\u00e9l\u00e9communications \u00e0 abandonner les mises \u00e0 niveau de l\u2019infrastructure et \u00e0 \u00ab suivre l\u2019air du temps \u00bb. Bien que la nomination a \u00e9t\u00e9 retir\u00e9e lorsque <a href=\"https:\/\/www.theregister.co.uk\/2019\/07\/12\/ispa_hands_awards_to_bt_and_openreach_following_mozilla_gaffe\/\" rel=\"noopener norefferer nofollow noreferrer\" target=\"_blank\">les principaux m\u00e9dias<\/a> et certains fournisseurs ont d\u00e9fendu Mozilla, et British Telecom a d\u00e9clar\u00e9 que le nouveau protocole ne ferait qu\u2019augmenter la s\u00e9curit\u00e9 des utilisateurs britanniques et n\u2019affecterait pas la qualit\u00e9 du filtrage du contenu.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/07\/doh-firefox-mozilla.jpg\" alt=\"DoH-FireFox-Mozilla\" width=\"100%\" class=\"alignnone size-full wp-image-2017\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/07\/doh-firefox-mozilla.jpg\" alt=\"DoH-FireFox-Mozilla\" width=\"100%\" class=\"alignnone size-full wp-image-2017 lazyload\" data-src=\"\/wp-content\/uploads\/2020\/07\/doh-firefox-mozilla.jpg\">\r\n\r\nLes fournisseurs de cloud ne sont pas en reste et Cloudflare propose d\u00e9j\u00e0 des services DNS bas\u00e9s sur DNS sur HTTPS.\r\n\r\nLe d\u00e9bats ne s\u2019est pas apais\u00e9 pendant longtemps, la nouvelle technologie se heurte toujours \u00e0 l\u2019hostilit\u00e9 et provoque beaucoup de discussions. Et la mise en \u0153uvre g\u00e9n\u00e9ralis\u00e9e du nouveau protocole peut \u00eatre parl\u00e9 dans plus <a href=\"https:\/\/packetpushers.net\/response-doh-dns-over-https-explained-apnic-blog\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">d\u2019une d\u00e9cennie<\/a>. Une liste de navigateurs et de clients prenant en charge DNS sur HTTPS est d\u00e9sormais disponible sur <a href=\"https:\/\/github.com\/curl\/curl\/wiki\/DNS-over-HTTPS\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GitHub<\/a>.\r\n\r\n[subscription id=\u00a0\u00bb11987\u2033]Abonnez-vous \u00e0 notre newsletter et restez inform\u00e9 des derniers d\u00e9veloppements et offres sp\u00e9ciales.[\/subscription]","protected":false},"excerpt":{"rendered":"<p>En 2018, IETF a approuv\u00e9 le nouveau protocole DNS over HTTPS, mais ce n&rsquo;est que r\u00e9cemment qu&rsquo;il a \u00e9t\u00e9 activement discut\u00e9 dans les m\u00e9dias et les communaut\u00e9s informatiques, et pas seulement du c\u00f4t\u00e9 positif-parmi les fournisseurs de services Internet et les d\u00e9veloppeurs de navigateurs, il y a eu un d\u00e9bat houleux sur ses caract\u00e9ristiques et ses avantages.<\/p>\n","protected":false},"author":1,"featured_media":2202,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48],"tags":[],"class_list":["post-2201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-telecom"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>(English) VASExperts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/\",\"url\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/\",\"name\":\"[:en]DNS over HTTPS: the point of contention \u2014 VAS Experts[:es]DNS sobre HTTPS: el punto de discusi\u00f3n \u2014 VAS Experts[:fr]DNS sur HTTPS : le point de discorde \u2014 VAS Experts[:br]DNS over HTTPS: o ponto de disc\u00f3rdia \u2014 VAS Experts\",\"isPartOf\":{\"@id\":\"https:\/\/vasexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg\",\"datePublished\":\"2020-02-20T05:37:53+00:00\",\"dateModified\":\"2025-08-11T11:14:05+00:00\",\"author\":{\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/da05c9a6f023e1596cae221d4037bea5\"},\"description\":\"[:en]DNS over HTTPS (DoH) encrypts queries and responses from DNS-server. The names of the remote servers are hidden if the user accesses them using DoH[:es]DNS sobre HTTPS (DoH) cifra las consultas y respuestas del servidor DNS. Los nombres de los servidores remotos se ocultan si el usuario accede a ellos mediante DoH[:fr]DNS over HTTPS (DoH) crypte les requ\u00eates et les r\u00e9ponses du serveur DNS. Les noms des serveurs distants sont cach\u00e9s si l'utilisateur y acc\u00e8de en utilisant DoH[:br]DNS over HTTPS (DoH) criptografa consultas e respostas do servidor DNS. Os nomes dos servidores remotos s\u00e3o ocultados se o usu\u00e1rio os acessar usando DoH.\",\"breadcrumb\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg\",\"width\":1140,\"height\":760},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/vasexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS over HTTPS: the point of contention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vasexperts.com\/#website\",\"url\":\"https:\/\/vasexperts.com\/\",\"name\":\"ITGLOBAL.COM\",\"description\":\"(English) VASExperts\",\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/da05c9a6f023e1596cae221d4037bea5\",\"name\":\"ivan.kuzin\",\"sameAs\":[\"https:\/\/vasexperts-ru.hst11.itglobal.com\"],\"url\":\"https:\/\/vasexperts.com\/fr\/blog\/author\/ivan-kuzin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"(English) VASExperts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/","url":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/","name":"[:en]DNS over HTTPS: the point of contention \u2014 VAS Experts[:es]DNS sobre HTTPS: el punto de discusi\u00f3n \u2014 VAS Experts[:fr]DNS sur HTTPS : le point de discorde \u2014 VAS Experts[:br]DNS over HTTPS: o ponto de disc\u00f3rdia \u2014 VAS Experts","isPartOf":{"@id":"https:\/\/vasexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage"},"image":{"@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg","datePublished":"2020-02-20T05:37:53+00:00","dateModified":"2025-08-11T11:14:05+00:00","author":{"@id":"https:\/\/vasexperts.com\/#\/schema\/person\/da05c9a6f023e1596cae221d4037bea5"},"description":"[:en]DNS over HTTPS (DoH) encrypts queries and responses from DNS-server. The names of the remote servers are hidden if the user accesses them using DoH[:es]DNS sobre HTTPS (DoH) cifra las consultas y respuestas del servidor DNS. Los nombres de los servidores remotos se ocultan si el usuario accede a ellos mediante DoH[:fr]DNS over HTTPS (DoH) crypte les requ\u00eates et les r\u00e9ponses du serveur DNS. Les noms des serveurs distants sont cach\u00e9s si l'utilisateur y acc\u00e8de en utilisant DoH[:br]DNS over HTTPS (DoH) criptografa consultas e respostas do servidor DNS. Os nomes dos servidores remotos s\u00e3o ocultados se o usu\u00e1rio os acessar usando DoH.","breadcrumb":{"@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#primaryimage","url":"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg","contentUrl":"\/wp-content\/uploads\/2020\/07\/dns-over-https-1140x760-1.jpg","width":1140,"height":760},{"@type":"BreadcrumbList","@id":"https:\/\/vasexperts.com\/blog\/telecom\/dns-https-point-contention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/vasexperts.com\/"},{"@type":"ListItem","position":2,"name":"DNS over HTTPS: the point of contention"}]},{"@type":"WebSite","@id":"https:\/\/vasexperts.com\/#website","url":"https:\/\/vasexperts.com\/","name":"ITGLOBAL.COM","description":"(English) VASExperts","inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/vasexperts.com\/#\/schema\/person\/da05c9a6f023e1596cae221d4037bea5","name":"ivan.kuzin","sameAs":["https:\/\/vasexperts-ru.hst11.itglobal.com"],"url":"https:\/\/vasexperts.com\/fr\/blog\/author\/ivan-kuzin\/"}]}},"_links":{"self":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/2201"}],"collection":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/comments?post=2201"}],"version-history":[{"count":10,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/2201\/revisions"}],"predecessor-version":[{"id":12909,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/2201\/revisions\/12909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/media\/2202"}],"wp:attachment":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/media?parent=2201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/categories?post=2201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/tags?post=2201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}