Analyzing and Mitigating Privacy with the DNS Root Service. Hardaker, W. In Proceedings of the ISOC NDSS Workshop on DNS Privacy , San Diego, California, USA, February, 2018. The Internet Society.
abstract   bibtex   
Processing of all DNS requests start at the root of the DNS tree and make use of either cached data from previous requests, or by traversing the DNS tree for the missing information. When QNAME minimization is not in use, queries forwarded to the parental nodes in the DNS tree may leak private DNS query data. In this paper we examine 31 days during the month of January 2017 of queries sent from two recursive resolvers placed in two residential networks to the DNS root server operated by USC/ISI's, analyzing the leaked QNAMEs for an impact on the network’s privacy. We then compare a few DNS privacy preserving techniques against the privacy analysis against these networks. Finally, we introduce a new solution called ``LocalRoot''that enables users to entirely mitigate privacy concerns when interacting with the DNS root server system, while other solutions fail to completely protect users from all privacy analysis methods.
@InProceedings{Hardaker18a,
        author =        "Wes Hardaker",
	title = "Analyzing and Mitigating Privacy with the {DNS} Root Service",
        booktitle =     "Proceedings of the " # " {ISOC} {NDSS} Workshop on {DNS} Privacy ",
        year =          2018,
	myorganization =	"USC/Information Sciences Institute",
	sortdate = 	"2018-02-18", 
	project = "ant, earr, researchroot, nipet",
        month =      feb,
        address =    "San Diego, California, USA",
        publisher =  "The Internet Society",
	jlocation = 	"johnh: pafile",
	keywords = 	"dns, privacy, data leak, PII",
	pdfurl = "https://ant.isi.edu/%7ehardaker/papers/2018-02-ndss-analyzing-root-privacy.pdf",
	abstract = "Processing of all DNS requests start at the root of the DNS tree and
make use of either cached data from previous requests, or by
traversing the DNS tree for the missing information. When QNAME
minimization is not in use, queries forwarded to the parental nodes in
the DNS tree may leak private DNS query data. In this paper we examine
31 days during the month of January 2017 of queries sent from two
recursive resolvers placed in two residential networks to the DNS root
server operated by USC/ISI's, analyzing the leaked QNAMEs for an
impact on the network’s privacy.  We then compare a few DNS privacy
preserving techniques against the privacy analysis against these
networks. Finally, we introduce a new solution called ``LocalRoot''that
enables users to entirely mitigate privacy concerns when interacting
with the DNS root server system, while other solutions fail to
completely protect users from all privacy analysis methods.",
}



% wjh:icann:dnssecworkshop:2019danemtasts,

Downloads: 0