T-DNS: Connection-Oriented DNS to Improve Privacy and Security (poster abstract). Zhu, L., Hu, Z., Heidemann, J., Wessels, D., Mankin, A., & Somaiya, N. Technical Report ISI-TR-2016-706, USC/Information Sciences Institute, March, 2016. Paper abstract bibtex DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial- of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose T-DNS to address these problems. It uses TCP to smoothly support large payloads and to mitigate spoofing and amplification for DoS. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS re- solvers and optionally to authoritative servers. Expectations about DNS suggest connections will balloon client latency and overwhelm servers with state, but our evaluation shows costs are modest: end-to-end latency from TLS to the recursive resolver is only about 9% slower with UDP to the au- thoritative server, and 22% slower with TCP to the authoritative. With diverse traces we show that frequent connection reuse is possible (60–95% for stub and recursive resolvers, although half that for authoritative servers), and after connec- tion establishment, we show TCP and TLS latency is equivalent to UDP. With conservative timeouts (20 s at authoritative servers and 60 s elsewhere) and conservative estimates of connection state memory requirements, we show that server memory requirements match current hardware: a large recursive resolver may have 24k active connections requiring about 3.6 GB additional RAM. We identify the key design and implementation decisions needed to minimize overhead: query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts.
@TechReport{Zhu16b,
author = "Liang Zhu and Zi Hu and John Heidemann and
Duane Wessels and Allison Mankin and Nikita Somaiya",
title = "T-DNS: Connection-Oriented DNS to Improve Privacy and Security (poster abstract)",
institution = "USC/Information Sciences Institute",
year = 2016,
sortdate = "2016-03-08",
project = "ant, retrofuture, lacrend, tdns",
jsubject = "dns",
number = "ISI-TR-2016-706",
month = mar,
jlocation = "johnh: pafile",
keywords = "DNS, privacy, t-dns, dns-over-tcp, dns-over-tls",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu16b.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Zhu16b.pdf",
otherurl = "http://www.isi.edu/publications/trpublic/files/tr-706.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "DNS is the canonical protocol for connectionless
UDP. Yet DNS today is challenged by eavesdropping
that compromises privacy, source-address spoofing
that results in denial- of-service (DoS) attacks on
the server and third parties, injection attacks that
exploit fragmentation, and size limitations that
constrain policy and operational choices. We propose
T-DNS to address these problems. It uses TCP to
smoothly support large payloads and to mitigate
spoofing and amplification for DoS. T-DNS uses
transport-layer security (TLS) to provide privacy
from users to their DNS re- solvers and optionally
to authoritative servers. Expectations about DNS
suggest connections will balloon client latency and
overwhelm servers with state, but our evaluation
shows costs are modest: end-to-end latency from TLS
to the recursive resolver is only about 9\% slower
with UDP to the au- thoritative server, and 22\%
slower with TCP to the authoritative. With diverse
traces we show that frequent connection reuse is
possible (60–95\% for stub and recursive resolvers,
although half that for authoritative servers), and
after connec- tion establishment, we show TCP and
TLS latency is equivalent to UDP. With conservative
timeouts (20 s at authoritative servers and 60 s
elsewhere) and conservative estimates of connection
state memory requirements, we show that server
memory requirements match current hardware: a large
recursive resolver may have 24k active connections
requiring about 3.6 GB additional RAM. We identify
the key design and implementation decisions needed
to minimize overhead: query pipelining,
out-of-order responses, TLS connection resumption,
and plausible timeouts.",
}
Downloads: 0
{"_id":"yXE5gMLREDutoYKQ3","bibbaseid":"zhu-hu-heidemann-wessels-mankin-somaiya-tdnsconnectionorienteddnstoimproveprivacyandsecurityposterabstract-2016","author_short":["Zhu, L.","Hu, Z.","Heidemann, J.","Wessels, D.","Mankin, A.","Somaiya, N."],"bibdata":{"bibtype":"techreport","type":"techreport","author":[{"firstnames":["Liang"],"propositions":[],"lastnames":["Zhu"],"suffixes":[]},{"firstnames":["Zi"],"propositions":[],"lastnames":["Hu"],"suffixes":[]},{"firstnames":["John"],"propositions":[],"lastnames":["Heidemann"],"suffixes":[]},{"firstnames":["Duane"],"propositions":[],"lastnames":["Wessels"],"suffixes":[]},{"firstnames":["Allison"],"propositions":[],"lastnames":["Mankin"],"suffixes":[]},{"firstnames":["Nikita"],"propositions":[],"lastnames":["Somaiya"],"suffixes":[]}],"title":"T-DNS: Connection-Oriented DNS to Improve Privacy and Security (poster abstract)","institution":"USC/Information Sciences Institute","year":"2016","sortdate":"2016-03-08","project":"ant, retrofuture, lacrend, tdns","jsubject":"dns","number":"ISI-TR-2016-706","month":"March","jlocation":"johnh: pafile","keywords":"DNS, privacy, t-dns, dns-over-tcp, dns-over-tls","url":"https://ant.isi.edu/%7ejohnh/PAPERS/Zhu16b.html","pdfurl":"https://ant.isi.edu/%7ejohnh/PAPERS/Zhu16b.pdf","otherurl":"http://www.isi.edu/publications/trpublic/files/tr-706.pdf","myorganization":"USC/Information Sciences Institute","copyrightholder":"authors","abstract":"DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial- of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose T-DNS to address these problems. It uses TCP to smoothly support large payloads and to mitigate spoofing and amplification for DoS. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS re- solvers and optionally to authoritative servers. Expectations about DNS suggest connections will balloon client latency and overwhelm servers with state, but our evaluation shows costs are modest: end-to-end latency from TLS to the recursive resolver is only about 9% slower with UDP to the au- thoritative server, and 22% slower with TCP to the authoritative. With diverse traces we show that frequent connection reuse is possible (60–95% for stub and recursive resolvers, although half that for authoritative servers), and after connec- tion establishment, we show TCP and TLS latency is equivalent to UDP. With conservative timeouts (20 s at authoritative servers and 60 s elsewhere) and conservative estimates of connection state memory requirements, we show that server memory requirements match current hardware: a large recursive resolver may have 24k active connections requiring about 3.6 GB additional RAM. We identify the key design and implementation decisions needed to minimize overhead: query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts.","bibtex":"@TechReport{Zhu16b,\n\tauthor = \t\"Liang Zhu and Zi Hu and John Heidemann and\n Duane Wessels and Allison Mankin and Nikita Somaiya\",\n\ttitle = \"T-DNS: Connection-Oriented DNS to Improve Privacy and Security (poster abstract)\",\n\tinstitution = \t\"USC/Information Sciences Institute\",\n\tyear = \t\t2016,\n\tsortdate = \t\t\"2016-03-08\",\n\tproject = \"ant, retrofuture, lacrend, tdns\",\n\tjsubject = \"dns\",\n\tnumber =\t\"ISI-TR-2016-706\",\n\tmonth =\t\tmar,\n\tjlocation =\t\"johnh: pafile\",\n\tkeywords = \t\"DNS, privacy, t-dns, dns-over-tcp, dns-over-tls\",\n\turl =\t\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Zhu16b.html\",\n\tpdfurl =\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Zhu16b.pdf\",\n\totherurl = \"http://www.isi.edu/publications/trpublic/files/tr-706.pdf\",\n\tmyorganization =\t\"USC/Information Sciences Institute\",\n\tcopyrightholder = \"authors\",\n\n abstract = \"DNS is the canonical protocol for connectionless\n UDP. Yet DNS today is challenged by eavesdropping\n that compromises privacy, source-address spoofing\n that results in denial- of-service (DoS) attacks on\n the server and third parties, injection attacks that\n exploit fragmentation, and size limitations that\n constrain policy and operational choices. We propose\n T-DNS to address these problems. It uses TCP to\n smoothly support large payloads and to mitigate\n spoofing and amplification for DoS. T-DNS uses\n transport-layer security (TLS) to provide privacy\n from users to their DNS re- solvers and optionally\n to authoritative servers. Expectations about DNS\n suggest connections will balloon client latency and\n overwhelm servers with state, but our evaluation\n shows costs are modest: end-to-end latency from TLS\n to the recursive resolver is only about 9\\% slower\n with UDP to the au- thoritative server, and 22\\%\n slower with TCP to the authoritative. With diverse\n traces we show that frequent connection reuse is\n possible (60–95\\% for stub and recursive resolvers,\n although half that for authoritative servers), and\n after connec- tion establishment, we show TCP and\n TLS latency is equivalent to UDP. With conservative\n timeouts (20 s at authoritative servers and 60 s\n elsewhere) and conservative estimates of connection\n state memory requirements, we show that server\n memory requirements match current hardware: a large\n recursive resolver may have 24k active connections\n requiring about 3.6 GB additional RAM. We identify\n the key design and implementation decisions needed\n to minimize overhead: query pipelining,\n out-of-order responses, TLS connection resumption,\n and plausible timeouts.\",\n}\n\n","author_short":["Zhu, L.","Hu, Z.","Heidemann, J.","Wessels, D.","Mankin, A.","Somaiya, N."],"bibbaseid":"zhu-hu-heidemann-wessels-mankin-somaiya-tdnsconnectionorienteddnstoimproveprivacyandsecurityposterabstract-2016","role":"author","urls":{"Paper":"https://ant.isi.edu/%7ejohnh/PAPERS/Zhu16b.html"},"keyword":["DNS","privacy","t-dns","dns-over-tcp","dns-over-tls"],"metadata":{"authorlinks":{}}},"bibtype":"techreport","biburl":"https://bibbase.org/f/dHevizJoWEhWowz8q/johnh-2023-2.bib","dataSources":["YLyu3mj3xsBeoqiHK","fLZcDgNSoSuatv6aX","fxEParwu2ZfurScPY","7nuQvtHTqKrLmgu99"],"keywords":["dns","privacy","t-dns","dns-over-tcp","dns-over-tls"],"search_terms":["dns","connection","oriented","dns","improve","privacy","security","poster","abstract","zhu","hu","heidemann","wessels","mankin","somaiya"],"title":"T-DNS: Connection-Oriented DNS to Improve Privacy and Security (poster abstract)","year":2016}