Dan is literally *using* DNS to hide his traffic, not just using udp:53.
Even so, this still isn't that interesting. So you mime encode it (or whatever), tack on a domain, and talk to a rogue dns server. Anyone dealing with secure networks should know that having any opening to the internet is a security risk and take that into account when designing one's network.
RTFA. Rogue DNS servers aren't needed. Two parties without access to DNS servers can use anyone's DNS server as a covert channel. Dan explains this and much more in his paper. It's groundbreaking stuff, really. You should read it before you slam it.
The opulence of the front office door varies inversely with the fundamental
solvency of the firm.
Old news (Score:5, Informative)
Re:Old news (Score:2)
Dan is literally *using* DNS to hide his traffic, not just using udp:53.
I know Dan and he's one of those people crazy (smart) enough to hack on something as dumb as this long enough to get something interesting out of it.
-davidu
Re:Old news (Score:3)
Even so, this still isn't that interesting. So you mime encode it (or whatever), tack on a domain, and talk to a rogue dns server. Anyone dealing with secure networks should know that having any opening to the internet is a security risk and take that into account when designing one's network.
Re:Old news (Score:0)