Analyzing and Mitigating Privacy with the DNS Root Service. Hardaker, W. In Proceedings of the ISOC NDSS Workshop on DNS Privacy , San Diego, California, USA, February, 2018. The Internet Society. abstract bibtex Processing of all DNS requests start at the root of the DNS tree and make use of either cached data from previous requests, or by traversing the DNS tree for the missing information. When QNAME minimization is not in use, queries forwarded to the parental nodes in the DNS tree may leak private DNS query data. In this paper we examine 31 days during the month of January 2017 of queries sent from two recursive resolvers placed in two residential networks to the DNS root server operated by USC/ISI's, analyzing the leaked QNAMEs for an impact on the network’s privacy. We then compare a few DNS privacy preserving techniques against the privacy analysis against these networks. Finally, we introduce a new solution called ``LocalRoot''that enables users to entirely mitigate privacy concerns when interacting with the DNS root server system, while other solutions fail to completely protect users from all privacy analysis methods.
@InProceedings{Hardaker18a,
author = "Wes Hardaker",
title = "Analyzing and Mitigating Privacy with the {DNS} Root Service",
booktitle = "Proceedings of the " # " {ISOC} {NDSS} Workshop on {DNS} Privacy ",
year = 2018,
myorganization = "USC/Information Sciences Institute",
sortdate = "2018-02-18",
project = "ant, earr, researchroot, nipet",
month = feb,
address = "San Diego, California, USA",
publisher = "The Internet Society",
jlocation = "johnh: pafile",
keywords = "dns, privacy, data leak, PII",
pdfurl = "https://ant.isi.edu/%7ehardaker/papers/2018-02-ndss-analyzing-root-privacy.pdf",
abstract = "Processing of all DNS requests start at the root of the DNS tree and
make use of either cached data from previous requests, or by
traversing the DNS tree for the missing information. When QNAME
minimization is not in use, queries forwarded to the parental nodes in
the DNS tree may leak private DNS query data. In this paper we examine
31 days during the month of January 2017 of queries sent from two
recursive resolvers placed in two residential networks to the DNS root
server operated by USC/ISI's, analyzing the leaked QNAMEs for an
impact on the network’s privacy. We then compare a few DNS privacy
preserving techniques against the privacy analysis against these
networks. Finally, we introduce a new solution called ``LocalRoot''that
enables users to entirely mitigate privacy concerns when interacting
with the DNS root server system, while other solutions fail to
completely protect users from all privacy analysis methods.",
}
% wjh:icann:dnssecworkshop:2019danemtasts,
Downloads: 0
{"_id":"cEPEqec8xu9hcgbyX","bibbaseid":"hardaker-analyzingandmitigatingprivacywiththednsrootservice-2018","author_short":["Hardaker, W."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Wes"],"propositions":[],"lastnames":["Hardaker"],"suffixes":[]}],"title":"Analyzing and Mitigating Privacy with the DNS Root Service","booktitle":"Proceedings of the ISOC NDSS Workshop on DNS Privacy ","year":"2018","myorganization":"USC/Information Sciences Institute","sortdate":"2018-02-18","project":"ant, earr, researchroot, nipet","month":"February","address":"San Diego, California, USA","publisher":"The Internet Society","jlocation":"johnh: pafile","keywords":"dns, privacy, data leak, PII","pdfurl":"https://ant.isi.edu/%7ehardaker/papers/2018-02-ndss-analyzing-root-privacy.pdf","abstract":"Processing of all DNS requests start at the root of the DNS tree and make use of either cached data from previous requests, or by traversing the DNS tree for the missing information. When QNAME minimization is not in use, queries forwarded to the parental nodes in the DNS tree may leak private DNS query data. In this paper we examine 31 days during the month of January 2017 of queries sent from two recursive resolvers placed in two residential networks to the DNS root server operated by USC/ISI's, analyzing the leaked QNAMEs for an impact on the network’s privacy. We then compare a few DNS privacy preserving techniques against the privacy analysis against these networks. Finally, we introduce a new solution called ``LocalRoot''that enables users to entirely mitigate privacy concerns when interacting with the DNS root server system, while other solutions fail to completely protect users from all privacy analysis methods.","bibtex":"@InProceedings{Hardaker18a,\n author = \"Wes Hardaker\",\n\ttitle = \"Analyzing and Mitigating Privacy with the {DNS} Root Service\",\n booktitle = \"Proceedings of the \" # \" {ISOC} {NDSS} Workshop on {DNS} Privacy \",\n year = 2018,\n\tmyorganization =\t\"USC/Information Sciences Institute\",\n\tsortdate = \t\"2018-02-18\", \n\tproject = \"ant, earr, researchroot, nipet\",\n month = feb,\n address = \"San Diego, California, USA\",\n publisher = \"The Internet Society\",\n\tjlocation = \t\"johnh: pafile\",\n\tkeywords = \t\"dns, privacy, data leak, PII\",\n\tpdfurl = \"https://ant.isi.edu/%7ehardaker/papers/2018-02-ndss-analyzing-root-privacy.pdf\",\n\tabstract = \"Processing of all DNS requests start at the root of the DNS tree and\nmake use of either cached data from previous requests, or by\ntraversing the DNS tree for the missing information. When QNAME\nminimization is not in use, queries forwarded to the parental nodes in\nthe DNS tree may leak private DNS query data. In this paper we examine\n31 days during the month of January 2017 of queries sent from two\nrecursive resolvers placed in two residential networks to the DNS root\nserver operated by USC/ISI's, analyzing the leaked QNAMEs for an\nimpact on the network’s privacy. We then compare a few DNS privacy\npreserving techniques against the privacy analysis against these\nnetworks. Finally, we introduce a new solution called ``LocalRoot''that\nenables users to entirely mitigate privacy concerns when interacting\nwith the DNS root server system, while other solutions fail to\ncompletely protect users from all privacy analysis methods.\",\n}\n\n\n\n% wjh:icann:dnssecworkshop:2019danemtasts, \n","author_short":["Hardaker, W."],"bibbaseid":"hardaker-analyzingandmitigatingprivacywiththednsrootservice-2018","role":"author","urls":{},"keyword":["dns","privacy","data leak","PII"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/dHevizJoWEhWowz8q/johnh-2023-2.bib","dataSources":["Nsku3kYfcFpYyqu9a","tvsqNFk5TtbQJY2wo","YLyu3mj3xsBeoqiHK","fLZcDgNSoSuatv6aX","fxEParwu2ZfurScPY","b6BAndrcxvv6AyYZN","7nuQvtHTqKrLmgu99"],"keywords":["dns","privacy","data leak","pii"],"search_terms":["analyzing","mitigating","privacy","dns","root","service","hardaker"],"title":"Analyzing and Mitigating Privacy with the DNS Root Service","year":2018}