diff options
Diffstat (limited to 'doc/rfc/rfc9076.txt')
-rw-r--r-- | doc/rfc/rfc9076.txt | 1285 |
1 files changed, 1285 insertions, 0 deletions
diff --git a/doc/rfc/rfc9076.txt b/doc/rfc/rfc9076.txt new file mode 100644 index 0000000..5674bcb --- /dev/null +++ b/doc/rfc/rfc9076.txt @@ -0,0 +1,1285 @@ + + + + +Internet Engineering Task Force (IETF) T. Wicinski, Ed. +Request for Comments: 9076 July 2021 +Obsoletes: 7626 +Category: Informational +ISSN: 2070-1721 + + + DNS Privacy Considerations + +Abstract + + This document describes the privacy issues associated with the use of + the DNS by Internet users. It provides general observations about + typical current privacy practices. It is intended to be an analysis + of the present situation and does not prescribe solutions. This + document obsoletes RFC 7626. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are candidates for any level of Internet + Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9076. + +Copyright Notice + + Copyright (c) 2021 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction + 2. Scope + 3. Risks + 4. Risks in the DNS Data + 4.1. The Public Nature of DNS Data + 4.2. Data in the DNS Request + 4.2.1. Data in the DNS Payload + 4.3. Cache Snooping + 5. Risks on the Wire + 5.1. Unencrypted Transports + 5.2. Encrypted Transports + 6. Risks in the Servers + 6.1. In the Recursive Resolvers + 6.1.1. Resolver Selection + 6.1.2. Active Attacks on Resolver Configuration + 6.1.3. Blocking of DNS Resolution Services + 6.1.4. Encrypted Transports and Recursive Resolvers + 6.2. In the Authoritative Name Servers + 7. Other Risks + 7.1. Re-identification and Other Inferences + 7.2. More Information + 8. Actual "Attacks" + 9. Legalities + 10. Security Considerations + 11. IANA Considerations + 12. References + 12.1. Normative References + 12.2. Informative References + Appendix A. Updates since RFC 7626 + Acknowledgments + Contributions + Author's Address + +1. Introduction + + This document is an analysis of the DNS privacy issues, in the spirit + of Section 8 of [RFC6973]. + + The Domain Name System (DNS) is specified in [RFC1034], [RFC1035], + and many later RFCs, which have never been consolidated. It is one + of the most important infrastructure components of the Internet and + is often ignored or misunderstood by Internet users (and even by many + professionals). Almost every activity on the Internet starts with a + DNS query (and often several). Its use has many privacy + implications, and this document is an attempt at a comprehensive and + accurate list. + + Let us begin with a simplified reminder of how the DNS works (see + also [RFC8499]). A client, the stub resolver, issues a DNS query to + a server called the recursive resolver (also called caching resolver, + full resolver, or recursive name server). Let's use the query "What + are the AAAA records for www.example.com?" as an example. AAAA is + the QTYPE (Query Type), and www.example.com is the QNAME (Query + Name). (The description that follows assumes a cold cache, for + instance, because the server just started.) The recursive resolver + will first query the root name servers. In most cases, the root name + servers will send a referral. In this example, the referral will be + to the .com name servers. The resolver repeats the query to one of + the .com name servers. The .com name servers, in turn, will refer to + the example.com name servers. The example.com name servers will then + return the answers. The root name servers, the name servers of .com, + and the name servers of example.com are called authoritative name + servers. It is important, when analyzing the privacy issues, to + remember that the question asked to all these name servers is always + the original question, not a derived question. The question sent to + the root name servers is "What are the AAAA records for + www.example.com?", not "What are the name servers of .com?". By + repeating the full question, instead of just the relevant part of the + question to the next in line, the DNS provides more information than + necessary to the name server. In this simplified description, + recursive resolvers do not implement QNAME minimization as described + in [RFC7816], which will only send the relevant part of the question + to the upstream name server. + + DNS relies heavily on caching, so the algorithm described above is + actually a bit more complicated, and not all questions are sent to + the authoritative name servers. If the stub resolver asks the + recursive resolver a few seconds later, "What are the SRV records of + _xmpp-server._tcp.example.com?", the recursive resolver will remember + that it knows the name servers of example.com and will just query + them, bypassing the root and .com. Because there is typically no + caching in the stub resolver, the recursive resolver, unlike the + authoritative servers, sees all the DNS traffic. (Applications, like + web browsers, may have some form of caching that does not follow DNS + rules, for instance, because it may ignore the TTL. So, the + recursive resolver does not see all the name resolution activity.) + + It should be noted that DNS recursive resolvers sometimes forward + requests to other recursive resolvers, typically bigger machines, + with a larger and more shared cache (and the query hierarchy can be + even deeper, with more than two levels of recursive resolvers). From + the point of view of privacy, these forwarders are like resolvers + except that they do not see all of the requests being made (due to + caching in the first resolver). + + At the time of writing, almost all this DNS traffic is currently sent + unencrypted. However, there is increasing deployment of DNS over TLS + (DoT) [RFC7858] and DNS over HTTPS (DoH) [RFC8484], particularly in + mobile devices, browsers, and by providers of anycast recursive DNS + resolution services. There are a few cases where there is some + alternative channel encryption, for instance, in an IPsec VPN tunnel, + at least between the stub resolver and the resolver. Some recent + analysis on the service quality of encrypted DNS traffic can be found + in [dns-over-encryption]. + + Today, almost all DNS queries are sent over UDP [thomas-ditl-tcp]. + This has practical consequences when considering encryption of the + traffic as a possible privacy technique. Some encryption solutions + are only designed for TCP, not UDP, although new solutions are still + emerging [RFC9000] [DPRIVE-DNSOQUIC]. + + Another important point to keep in mind when analyzing the privacy + issues of DNS is the fact that DNS requests received by a server are + triggered for different reasons. Let's assume an eavesdropper wants + to know which web page is viewed by a user. For a typical web page, + there are three sorts of DNS requests being issued: + + Primary request: + This is the domain name in the URL that the user typed, selected + from a bookmark, or chose by clicking on a hyperlink. Presumably, + this is what is of interest for the eavesdropper. + + Secondary requests: + These are the additional requests performed by the user agent + (here, the web browser) without any direct involvement or + knowledge of the user. For the Web, they are triggered by + embedded content, Cascading Style Sheets (CSS), JavaScript code, + embedded images, etc. In some cases, there can be dozens of + domain names in different contexts on a single web page. + + Tertiary requests: + These are the additional requests performed by the DNS service + itself. For instance, if the answer to a query is a referral to a + set of name servers and the glue records are not returned, the + resolver will have to send additional requests to turn the name + servers' names into IP addresses. Similarly, even if glue records + are returned, a careful recursive server will send tertiary + requests to verify the IP addresses of those records. + + It can also be noted that, in the case of a typical web browser, more + DNS requests than strictly necessary are sent, for instance, to + prefetch resources that the user may query later or when + autocompleting the URL in the address bar. Both are a significant + privacy concern since they may leak information even about non- + explicit actions. For instance, just reading a local HTML page, even + without selecting the hyperlinks, may trigger DNS requests. + + Privacy-related terminology is from [RFC6973]. This document + obsoletes [RFC7626]. + +2. Scope + + This document focuses mostly on the study of privacy risks for the + end user (the one performing DNS requests). The risks of pervasive + surveillance [RFC7258] are considered as well as risks coming from a + more focused surveillance. In this document, the term "end user" is + used as defined in [RFC8890]. + + This document does not attempt a comparison of specific privacy + protections provided by individual networks or organizations; it + makes only general observations about typical current practices. + + Privacy risks for the holder of a zone (the risk that someone gets + the data) are discussed in [RFC5155] and [RFC5936]. + + Privacy risks for recursive operators (including access providers and + operators in enterprise networks) such as leakage of private + namespaces or blocklists are out of scope for this document. + + Non-privacy risks (e.g., security-related considerations such as + cache poisoning) are also out of scope. + + The privacy risks associated with the use of other protocols that + make use of DNS information are not considered here. + +3. Risks + + The following four sections outline the privacy considerations + associated with different aspects of the DNS for the end user. When + reading these sections, it needs to be kept in mind that many of the + considerations (for example, recursive resolver and transport + protocol) can be specific to the network context that a device is + using at a given point in time. A user may have many devices, and + each device might utilize many different networks (e.g., home, work, + public, or cellular) over a period of time or even concurrently. An + exhaustive analysis of the privacy considerations for an individual + user would need to take into account the set of devices used and the + multiple dynamic contexts of each device. This document does not + attempt such a complex analysis; instead, it presents an overview of + the various considerations that could form the basis of such an + analysis. + +4. Risks in the DNS Data + +4.1. The Public Nature of DNS Data + + It has been stated that "the data in the DNS is public". This + sentence makes sense for an Internet-wide lookup system, and there + are multiple facets to the data and metadata involved that deserve a + more detailed look. First, access control lists (ACLs) and private + namespaces notwithstanding, the DNS operates under the assumption + that public-facing authoritative name servers will respond to "usual" + DNS queries for any zone they are authoritative for, without further + authentication or authorization of the client (resolver). Due to the + lack of search capabilities, only a given QNAME will reveal the + resource records associated with that name (or that name's + nonexistence). In other words: one needs to know what to ask for in + order to receive a response. There are many ways in which supposedly + "private" resources currently leak. A few examples are DNSSEC NSEC + zone walking [RFC4470], passive DNS services [passive-dns], etc. The + zone transfer QTYPE [RFC5936] is often blocked or restricted to + authenticated/authorized access to enforce this difference (and maybe + for other reasons). + + Another difference between the DNS data and a particular DNS + transaction (i.e., a DNS name lookup): DNS data and the results of a + DNS query are public, within the boundaries described above, and may + not have any confidentiality requirements. However, the same is not + true of a single transaction or a sequence of transactions; those + transactions are not / should not be public. A single transaction + reveals both the originator of the query and the query contents; this + potentially leaks sensitive information about a specific user. A + typical example from outside the DNS world is that the website of + Alcoholics Anonymous is public but the fact that you visit it should + not be. Furthermore, the ability to link queries reveals information + about individual use patterns. + +4.2. Data in the DNS Request + + The DNS request includes many fields, but two of them seem + particularly relevant for the privacy issues: the QNAME and the + source IP address. "Source IP address" is used in a loose sense of + "source IP address + maybe source port number", because the port + number is also in the request and can be used to differentiate + between several users sharing an IP address (behind a Carrier-Grade + NAT (CGN), for instance [RFC6269]). + + The QNAME is the full name sent by the user. It gives information + about what the user does ("What are the MX records of example.net?" + means they probably want to send email to someone at example.net, + which may be a domain used by only a few persons and is therefore + very revealing about communication relationships). Some QNAMEs are + more sensitive than others. For instance, querying the A record of a + well-known web statistics domain reveals very little (everybody + visits websites that use this analytics service), but querying the A + record of www.verybad.example where verybad.example is the domain of + an organization that some people find offensive or objectionable may + create more problems for the user. Also, sometimes, the QNAME embeds + the software one uses, which could be a privacy issue (for instance, + _ldap._tcp.Default-First-Site-Name._sites.gc._msdcs.example.org. + There are also some BitTorrent clients that query an SRV record for + _bittorrent-tracker._tcp.domain.example. + + Another important thing about the privacy of the QNAME is future + usages. Today, the lack of privacy is an obstacle to putting + potentially sensitive or personally identifiable data in the DNS. At + the moment, your DNS traffic might reveal that you are exchanging + emails but not with whom. If your Mail User Agent (MUA) starts + looking up Pretty Good Privacy (PGP) keys in the DNS [RFC7929], then + privacy becomes a lot more important. And email is just an example; + there would be other really interesting uses for a more privacy- + friendly DNS. + + For the communication between the stub resolver and the recursive + resolver, the source IP address is the address of the user's machine. + Therefore, all the issues and warnings about collection of IP + addresses apply here. For the communication between the recursive + resolver and the authoritative name servers, the source IP address + has a different meaning; it does not have the same status as the + source address in an HTTP connection. It is typically the IP address + of the recursive resolver that, in a way, "hides" the real user. + However, hiding does not always work. The edns-client-subnet (ECS) + EDNS0 option [RFC7871] is sometimes used (see one privacy analysis in + [denis-edns-client-subnet]). Sometimes the end user has a personal + recursive resolver on their machine. In both cases, the IP address + originating queries to the authoritative server is as sensitive as it + is for HTTP [sidn-entrada]. + + A note about IP addresses: there is currently no IETF document that + describes in detail all the privacy issues around IP addressing in + general, although [RFC7721] does discuss privacy considerations for + IPv6 address generation mechanisms. In the meantime, the discussion + here is intended to include both IPv4 and IPv6 source addresses. For + a number of reasons, their assignment and utilization characteristics + are different, which may have implications for details of information + leakage associated with the collection of source addresses. (For + example, a specific IPv6 source address seen on the public Internet + is less likely than an IPv4 address to originate behind an address- + sharing scheme.) However, for both IPv4 and IPv6 addresses, it is + important to note that source addresses are propagated with queries + via the ECS option and comprise metadata about the host, user, or + application that originated them. + +4.2.1. Data in the DNS Payload + + At the time of writing, there are no standardized client identifiers + contained in the DNS payload itself (ECS, as described in [RFC7871], + is widely used; however, [RFC7871] is only an Informational RFC). + + DNS Cookies [RFC7873] are a lightweight DNS transaction security + mechanism that provides limited protection against a variety of + increasingly common denial-of-service and amplification/forgery or + cache poisoning attacks by off-path attackers. It is noted, however, + that they are designed to just verify IP addresses (and should change + once a client's IP address changes), but they are not designed to + actively track users (like HTTP cookies). + + There are anecdotal accounts of Media Access Control (MAC) addresses + (https://lists.dns-oarc.net/pipermail/dns- + operations/2016-January/014143.html) and even user names being + inserted in nonstandard EDNS(0) options [RFC6891] for stub-to- + resolver communications to support proprietary functionality + implemented at the resolver (e.g., parental filtering). + +4.3. Cache Snooping + + The content of recursive resolvers' caches can reveal data about the + clients using it (the privacy risks depend on the number of clients). + This information can sometimes be examined by sending DNS queries + with RD=0 to inspect cache content, particularly looking at the DNS + TTLs [grangeia.snooping]. Since this also is a reconnaissance + technique for subsequent cache poisoning attacks, some + countermeasures have already been developed and deployed + [cache-snooping-defence]. + +5. Risks on the Wire + +5.1. Unencrypted Transports + + For unencrypted transports, DNS traffic can be seen by an + eavesdropper like any other traffic. (DNSSEC, specified in + [RFC4033], explicitly excludes confidentiality from its goals.) So, + if an initiator starts an HTTPS communication with a recipient, the + HTTP traffic will be encrypted, but the DNS exchange prior to it will + not be. When other protocols become more and more privacy aware and + secured against surveillance (e.g., [RFC8446], [RFC9000]), the use of + unencrypted transports for DNS may become "the weakest link" in + privacy. It is noted that, at the time of writing, there is ongoing + work attempting to encrypt the Server Name Identification (SNI) in + the TLS handshake [RFC8744], which is one of the last remaining non- + DNS cleartext identifiers of a connection target. + + An important specificity of the DNS traffic is that it may take a + different path than the communication between the initiator and the + recipient. For instance, an eavesdropper may be unable to tap the + wire between the initiator and the recipient but may have access to + the wire going to the recursive resolver or to the authoritative name + servers. + + The best place to tap, from an eavesdropper's point of view, is + clearly between the stub resolvers and the recursive resolvers, + because traffic is not limited by DNS caching. + + The attack surface between the stub resolver and the rest of the + world can vary widely depending upon how the end user's device is + configured. By order of increasing attack surface: + + * The recursive resolver can be on the end user's device. In + (currently) a small number of cases, individuals may choose to + operate their own DNS resolver on their local machine. In this + case, the attack surface for the connection between the stub + resolver and the caching resolver is limited to that single + machine. The recursive resolver will expose data to authoritative + resolvers as discussed in Section 6.2. + + * The recursive resolver may be at the local network edge. For + many/most enterprise networks and for some residential networks, + the caching resolver may exist on a server at the edge of the + local network. In this case, the attack surface is the local + network. Note that in large enterprise networks, the DNS resolver + may not be located at the edge of the local network but rather at + the edge of the overall enterprise network. In this case, the + enterprise network could be thought of as similar to the Internet + Access Provider (IAP) network referenced below. + + * The recursive resolver can be in the IAP network. For most + residential networks and potentially other networks, the typical + case is for the user's device to be configured (typically + automatically through DHCP or relay agent options) with the + addresses of the DNS proxy in the Customer Premises Equipment + (CPE), which in turn points to the DNS recursive resolvers at the + IAP. The attack surface for on-the-wire attacks is therefore from + the end user system across the local network and across the IAP + network to the IAP's recursive resolvers. + + * The recursive resolver can be a public DNS service (or a privately + run DNS resolver hosted on the public Internet). Some machines + may be configured to use public DNS resolvers such as those + operated by Google Public DNS or OpenDNS. The user may have + configured their machine to use these DNS recursive resolvers + themselves -- or their IAP may have chosen to use the public DNS + resolvers rather than operating their own resolvers. In this + case, the attack surface is the entire public Internet between the + user's connection and the public DNS service. It can be noted + that if the user selects a single resolver with a small client + population (even when using an encrypted transport), it can + actually serve to aid tracking of that user as they move across + network environments. + + It is also noted that, typically, a device connected _only_ to a + modern cellular network is + + * directly configured with only the recursive resolvers of the IAP + and + + * afforded some level of protection against some types of + eavesdropping for all traffic (including DNS traffic) due to the + cellular network link-layer encryption. + + The attack surface for this specific scenario is not considered here. + +5.2. Encrypted Transports + + The use of encrypted transports directly mitigates passive + surveillance of the DNS payload; however, some privacy attacks are + still possible. This section enumerates the residual privacy risks + to an end user when an attacker can passively monitor encrypted DNS + traffic flows on the wire. + + These are cases where user identification, fingerprinting, or + correlations may be possible due to the use of certain transport + layers or cleartext/observable features. These issues are not + specific to DNS, but DNS traffic is susceptible to these attacks when + using specific transports. + + Some general examples exist; for example, certain studies highlight + that the OS fingerprint values (http://netres.ec/?b=11B99BD) of IPv4 + TTL, IPv6 Hop Limit, or TCP Window size can be used to fingerprint + client OSes or that various techniques can be used to de-NAT DNS + queries [dns-de-nat]. + + Note that even when using encrypted transports, the use of cleartext + transport options to decrease latency can provide correlation of a + user's connections, e.g., using TCP Fast Open [RFC7413]. + + Implementations that support encrypted transports also commonly reuse + connections for multiple DNS queries to optimize performance (e.g., + via DNS pipelining or HTTPS multiplexing). Default configuration + options for encrypted transports could, in principle, fingerprint a + specific client application. For example: + + * TLS version or cipher suite selection + + * session resumption + + * the maximum number of messages to send and + + * a maximum connection time before closing a connections and + reopening. + + If libraries or applications offer user configuration of such options + (e.g., [getdns]), then they could, in principle, help to identify a + specific user. Users may want to use only the defaults to avoid this + issue. + + While there are known attacks on older versions of TLS, the most + recent recommendations [RFC7525] and the development of TLS 1.3 + [RFC8446] largely mitigate those. + + Traffic analysis of unpadded encrypted traffic is also possible + [pitfalls-of-dns-encryption] because the sizes and timing of + encrypted DNS requests and responses can be correlated to unencrypted + DNS requests upstream of a recursive resolver. + +6. Risks in the Servers + + Using the terminology of [RFC6973], the DNS servers (recursive + resolvers and authoritative servers) are enablers: "they facilitate + communication between an initiator and a recipient without being + directly in the communications path". As a result, they are often + forgotten in risk analysis. But, to quote [RFC6973] again, "Although + [...] enablers may not generally be considered as attackers, they may + all pose privacy threats (depending on the context) because they are + able to observe, collect, process, and transfer privacy-relevant + data". In [RFC6973] parlance, enablers become observers when they + start collecting data. + + Many programs exist to collect and analyze DNS data at the servers -- + from the "query log" of some programs like BIND to tcpdump and more + sophisticated programs like PacketQ [packetq] and DNSmezzo + [dnsmezzo]. The organization managing the DNS server can use this + data itself, or it can be part of a surveillance program like PRISM + [prism] and pass data to an outside observer. + + Sometimes this data is kept for a long time and/or distributed to + third parties for research purposes [ditl] [day-at-root], security + analysis, or surveillance tasks. These uses are sometimes under some + sort of contract, with various limitations, for instance, on + redistribution, given the sensitive nature of the data. Also, there + are observation points in the network that gather DNS data and then + make it accessible to third parties for research or security purposes + ("passive DNS" [passive-dns]). + +6.1. In the Recursive Resolvers + + Recursive resolvers see all the traffic since there is typically no + caching before them. To summarize: your recursive resolver knows a + lot about you. The resolver of a large IAP, or a large public + resolver, can collect data from many users. + +6.1.1. Resolver Selection + + Given all the above considerations, the choice of recursive resolver + has direct privacy considerations for end users. Historically, end + user devices have used the DHCP-provided local network recursive + resolver. The choice by a user to join a particular network (e.g., + by physically plugging in a cable or selecting a network in an OS + dialogue) typically updates a number of system resources -- these can + include IP addresses, the availability of IPv4/IPv6, DHCP server, and + DNS resolver. These individual changes, including the change in DNS + resolver, are not normally communicated directly to the user by the + OS when the network is joined. The choice of network has + historically determined the default system DNS resolver selection; + the two are directly coupled in this model. + + The vast majority of users do not change their default system DNS + settings and so implicitly accept the network settings for the DNS. + The network resolvers have therefore historically been the sole + destination for all of the DNS queries from a device. These + resolvers may have varied privacy policies depending on the network. + Privacy policies for these servers may or may not be available, and + users need to be aware that privacy guarantees will vary with the + network. + + All major OSes expose the system DNS settings and allow users to + manually override them if desired. + + More recently, some networks and users have actively chosen to use a + large public resolver, e.g., Google Public DNS + (https://developers.google.com/speed/public-dns), Cloudflare + (https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/), or + Quad9 (https://www.quad9.net). There can be many reasons: cost + considerations for network operators, better reliability, or anti- + censorship considerations are just a few. Such services typically do + provide a privacy policy, and the user can get an idea of the data + collected by such operators by reading one, e.g., Google Public DNS - + Your Privacy (https://developers.google.com/speed/public-dns/ + privacy). + + In general, as with many other protocols, issues around + centralization also arise with DNS. The picture is fluid with + several competing factors contributing, where these factors can also + vary by geographic region. These include: + + * ISP outsourcing, including to third-party and public resolvers + + * regional market domination by one or only a few ISPs + + * applications directing DNS traffic by default to a limited subset + of resolvers (see Section 6.1.1.2) + + An increased proportion of the global DNS resolution traffic being + served by only a few entities means that the privacy considerations + for users are highly dependent on the privacy policies and practices + of those entities. Many of the issues around centralization are + discussed in [centralisation-and-data-sovereignty]. + +6.1.1.1. Dynamic Discovery of DoH and Strict DoT + + While support for opportunistic DoT can be determined by probing a + resolver on port 853, there is currently no standardized discovery + mechanism for DoH and Strict DoT servers. + + This means that clients that might want to dynamically discover such + encrypted services, and where users are willing to trust such + services, are not able to do so. At the time of writing, efforts to + provide standardized signaling mechanisms to discover the services + offered by local resolvers are in progress [DNSOP-RESOLVER]. Note + that an increasing number of ISPs are deploying encrypted DNS; for + example, see the Encrypted DNS Deployment Initiative [EDDI]. + +6.1.1.2. Application-Specific Resolver Selection + + An increasing number of applications are offering application- + specific encrypted DNS resolution settings, rather than defaulting to + using only the system resolver. A variety of heuristics and + resolvers are available in different applications, including hard- + coded lists of recognized DoH/DoT servers. + + Generally, users are not aware of application-specific DNS settings + and may not have control over those settings. To address these + limitations, users will only be aware of and have the ability to + control such settings if applications provide the following + functions: + + * communicate the change clearly to users when the default + application resolver changes away from the system resolver + + * provide configuration options to change the default application + resolver, including a choice to always use the system resolver + + * provide mechanisms for users to locally inspect, selectively + forward, and filter queries (either via the application itself or + use of the system resolver) + + Application-specific changes to default destinations for users' DNS + queries might increase or decrease user privacy; it is highly + dependent on the network context and the application-specific + default. This is an area of active debate, and the IETF is working + on a number of issues related to application-specific DNS settings. + +6.1.2. Active Attacks on Resolver Configuration + + The previous section discussed DNS privacy, assuming that all the + traffic was directed to the intended servers (i.e., those that would + be used in the absence of an active attack) and that the potential + attacker was purely passive. But, in reality, there can be active + attackers in the network. + + The Internet Threat model, as described in [RFC3552], assumes that + the attacker controls the network. Such an attacker can completely + control any insecure DNS resolution, both passively monitoring the + queries and responses and substituting their own responses. Even if + encrypted DNS such as DoH or DoT is used, unless the client has been + configured in a secure way with the server identity, an active + attacker can impersonate the server. This implies that opportunistic + modes of DoH/DoT as well as modes where the client learns of the DoH/ + DoT server via in-network mechanisms such as DHCP are vulnerable to + attack. In addition, if the client is compromised, the attacker can + replace the DNS configuration with one of its own choosing. + +6.1.3. Blocking of DNS Resolution Services + + User privacy can also be at risk if there is blocking of access to + remote recursive servers that offer encrypted transports, e.g., when + the local resolver does not offer encryption and/or has very poor + privacy policies. For example, active blocking of port 853 for DoT + or blocking of specific IP addresses could restrict the resolvers + available to the user. The extent of the risk to user privacy is + highly dependent on the specific network and user context; a user on + a network that is known to perform surveillance would be compromised + if they could not access such services, whereas a user on a trusted + network might have no privacy motivation to do so. + + As a matter of policy, some recursive resolvers use their position in + the query path to selectively block access to certain DNS records. + This is a form of rendezvous-based blocking as described in + Section 4.3 of [RFC7754]. Such blocklists often include servers + known to be used for malware, bots, or other security risks. In + order to prevent circumvention of their blocking policies, some + networks also block access to resolvers with incompatible policies. + + It is also noted that attacks on remote resolver services, e.g., + DDoS, could force users to switch to other services that do not offer + encrypted transports for DNS. + +6.1.4. Encrypted Transports and Recursive Resolvers + +6.1.4.1. DoT and DoH + + Use of encrypted transports does not reduce the data available in the + recursive resolver and ironically can actually expose more + information about users to operators. As described in Section 5.2, + use of session-based encrypted transports (TCP/TLS) can expose + correlation data about users. + +6.1.4.2. DoH-Specific Considerations + + DoH inherits the full privacy properties of the HTTPS stack and as a + consequence introduces new privacy considerations when compared with + DNS over UDP, TCP, or TLS [RFC7858]. Section 8.2 of [RFC8484] + describes the privacy considerations in the server of the DoH + protocol. + + A brief summary of some of the issues includes the following: + + * HTTPS presents new considerations for correlation, such as + explicit HTTP cookies and implicit fingerprinting of the unique + set and ordering of HTTP request header fields. + + * The User-Agent and Accept-Language request header fields often + convey specific information about the client version or locale. + + * Utilizing the full set of HTTP features enables DoH to be more + than an HTTP tunnel, but it is at the cost of opening up + implementations to the full set of privacy considerations of HTTP. + + * Implementations are advised to expose the minimal set of data + needed to achieve the desired feature set. + + [RFC8484] specifically makes selection of HTTPS functionality vs. + privacy an implementation choice. At the extremes, there may be + implementations that attempt to achieve parity with DoT from a + privacy perspective at the cost of using no identifiable HTTP + headers, and there might be others that provide feature-rich data + flows where the low-level origin of the DNS query is easily + identifiable. Some implementations have, in fact, chosen to restrict + the use of the User-Agent header so that resolver operators cannot + identify the specific application that is originating the DNS + queries. + + Privacy-focused users should be aware of the potential for additional + client identifiers in DoH compared to DoT and may want to only use + DoH client implementations that provide clear guidance on what + identifiers they add. + +6.2. In the Authoritative Name Servers + + Unlike what happens for recursive resolvers, the observation + capabilities of authoritative name servers are limited by caching; + they see only the requests for which the answer was not in the cache. + For aggregated statistics ("What is the percentage of LOC queries?"), + this is sufficient, but it prevents an observer from seeing + everything. Similarly, the increasing deployment of QNAME + minimization [ripe-qname-measurements] reduces the data visible at + the authoritative name server. Still, the authoritative name servers + see a part of the traffic, and this subset may be sufficient to + violate some privacy expectations. + + Also, the user often has some legal/contractual link with the + recursive resolver (they have chosen the IAP, or they have chosen to + use a given public resolver) while having no control and perhaps no + awareness of the role of the authoritative name servers and their + observation abilities. + + As noted before, using a local resolver or a resolver close to the + machine decreases the attack surface for an on-the-wire eavesdropper. + But it may decrease privacy against an observer located on an + authoritative name server. This authoritative name server will see + the IP address of the end client instead of the address of a big + recursive resolver shared by many users. + + This "protection", when using a large resolver with many clients, is + no longer present if ECS [RFC7871] is used because, in this case, the + authoritative name server sees the original IP address (or prefix, + depending on the setup). + + As of today, all the instances of one root name server, L-root, + receive together around 50,000 queries per second. While most of it + is "junk" (errors on the Top-Level Domain (TLD) name), it gives an + idea of the amount of big data that pours into name servers. (And + even "junk" can leak information; for instance, if there is a typing + error in the TLD, the user will send data to a TLD that is not the + usual one.) + + Many domains, including TLDs, are partially hosted by third-party + servers, sometimes in a different country. The contracts between the + domain manager and these servers may or may not take privacy into + account. Whatever the contract, the third-party hoster may or may + not be honest; in any case, it will have to follow its local laws. + For example, requests to a given ccTLD may go to servers managed by + organizations outside of the ccTLD's country. Users may not + anticipate that when doing a security analysis. + + Also, it seems (see the survey described in [aeris-dns]) that there + is a strong concentration of authoritative name servers among + "popular" domains (such as the Alexa Top N list). For instance, + among the Alexa Top 100K (https://www.alexa.com/topsites), one DNS + provider hosts 10% of the domains today. The ten most important DNS + providers together host one-third of all domains. With the control + (or the ability to sniff the traffic) of a few name servers, you can + gather a lot of information. + +7. Other Risks + +7.1. Re-identification and Other Inferences + + An observer has access not only to the data they directly collect but + also to the results of various inferences about this data. The term + "observer" here is used very generally; for example, the observer + might passively observe cleartext DNS traffic or be in the network + that is actively attacking the user by redirecting DNS resolution, or + it might be a local or remote resolver operator. + + For instance, a user can be re-identified via DNS queries. If the + adversary knows a user's identity and can watch their DNS queries for + a period, then that same adversary may be able to re-identify the + user solely based on their pattern of DNS queries later on regardless + of the location from which the user makes those queries. For + example, one study [herrmann-reidentification] found that such re- + identification is possible so that "73.1% of all day-to-day links + were correctly established, i.e. user u was either re-identified + unambiguously (1) or the classifier correctly reported that u was not + present on day t + 1 any more (2)". While that study related to web + browsing behavior, equally characteristic patterns may be produced + even in machine-to-machine communications or without a user taking + specific actions, e.g., at reboot time if a characteristic set of + services are accessed by the device. + + For instance, one could imagine that an intelligence agency + identifies people going to a site by putting in a very long DNS name + and looking for queries of a specific length. Such traffic analysis + could weaken some privacy solutions. + + The IAB Privacy and Security Program also has a document [RFC7624] + that considers such inference-based attacks in a more general + framework. + +7.2. More Information + + Useful background information can also be found in [tor-leak] + (regarding the risk of privacy leaks through DNS) and in a few + academic papers: [yanbin-tsudik], [castillo-garcia], + [fangming-hori-sakurai], and [federrath-fuchs-herrmann-piosecny]. + +8. Actual "Attacks" + + A very quick examination of DNS traffic may lead to the false + conclusion that extracting the needle from the haystack is difficult. + "Interesting" primary DNS requests are mixed with useless (for the + eavesdropper) secondary and tertiary requests (see the terminology in + Section 1). But, in this time of "big data" processing, powerful + techniques now exist to get from the raw data to what the + eavesdropper is actually interested in. + + Many research papers about malware detection use DNS traffic to + detect "abnormal" behavior that can be traced back to the activity of + malware on infected machines. Yes, this research was done for the + greater good, but technically it is a privacy attack and it + demonstrates the power of the observation of DNS traffic. See + [dns-footprint], [dagon-malware], and [darkreading-dns]. + + Passive DNS services [passive-dns] allow reconstruction of the data + of sometimes an entire zone. Well-known passive DNS services keep + only the DNS responses and not the source IP address of the client, + precisely for privacy reasons. Other passive DNS services may not be + so careful. And there are still potential problems with revealing + QNAMEs. + + The revelations from the Edward Snowden documents, which were leaked + from the National Security Agency (NSA), provide evidence of the use + of the DNS in mass surveillance operations [morecowbell]. For + example, the MORECOWBELL surveillance program uses a dedicated covert + monitoring infrastructure to actively query DNS servers and perform + HTTP requests to obtain meta-information about services and to check + their availability. Also, the QUANTUMTHEORY + (https://theintercept.com/document/2014/03/12/nsa-gchqs- + quantumtheory-hacking-tactics/) project, which includes detecting + lookups for certain addresses and injecting bogus replies, is another + good example showing that the lack of privacy protections in the DNS + is actively exploited. + +9. Legalities + + To our knowledge, there are no specific privacy laws for DNS data in + any country. Interpreting general privacy laws, like the European + Union's [data-protection-directive] or GDPR (https://gdpr.eu/tag/ + gdpr/), in the context of DNS traffic data is not an easy task, and + there is no known court precedent. See an interesting analysis in + [sidn-entrada]. + +10. Security Considerations + + This document is entirely about security -- more precisely, privacy. + It just lays out the problem; it does not try to set requirements + (with the choices and compromises they imply), much less define + solutions. Possible solutions to the issues described here are + discussed in other documents (currently too many to all be + mentioned); see, for instance, "Recommendations for DNS Privacy + Operators" [RFC8932]. + +11. IANA Considerations + + This document has no IANA actions. + +12. References + +12.1. Normative References + + [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", + STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, + <https://www.rfc-editor.org/info/rfc1034>. + + [RFC1035] Mockapetris, P., "Domain names - implementation and + specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, + November 1987, <https://www.rfc-editor.org/info/rfc1035>. + + [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., + Morris, J., Hansen, M., and R. Smith, "Privacy + Considerations for Internet Protocols", RFC 6973, + DOI 10.17487/RFC6973, July 2013, + <https://www.rfc-editor.org/info/rfc6973>. + + [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an + Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May + 2014, <https://www.rfc-editor.org/info/rfc7258>. + +12.2. Informative References + + [aeris-dns] + Vinot, N., "Vie privée: et le DNS alors? [Privacy: what + about DNS?]", February 2015, + <https://blog.imirhil.fr/vie-privee-et-le-dns-alors.html>. + + [cache-snooping-defence] + ISC, "DNS Cache snooping - should I be concerned?", + October 2018, <https://kb.isc.org/docs/aa-00482>. + + [castillo-garcia] + Castillo-Perez, S. and J. Garcia-Alfaro, "Anonymous + Resolution of DNS Queries", Lecture Notes in Computer + Science, Vol. 5332, DOI 10.1007/978-3-540-88873-4_5, 2008, + <https://dl.acm.org/doi/10.1007/978-3-540-88873-4_5>. + + [centralisation-and-data-sovereignty] + De Filippi, P. and S. McCarthy, "Cloud Computing: + Centralization and Data Sovereignty", European Journal of + Law and Technology, Vol. 3, No. 2, October 2012, + <https://papers.ssrn.com/sol3/ + papers.cfm?abstract_id=2167372>. + + [dagon-malware] + Dagon, D., "Corrupted DNS Resolution Paths: The Rise of a + Malicious Resolution Authority", ISC/OARC Workshop, 2007, + <https://www.dns-oarc.net/files/workshop-2007/Dagon- + Resolution-corruption.pdf>. + + [darkreading-dns] + Lemos, R., "Got Malware? Three Signs Revealed In DNS + Traffic", May 2013, + <https://www.darkreading.com/analytics/security- + monitoring/got-malware-three-signs-revealed-in-dns- + traffic/d/d-id/1139680>. + + [data-protection-directive] + European Parliament, "Directive 95/46/EC of the European + Parliament and of the Council of 24 October 1995 on the + protection of individuals with regard to the processing of + personal data and on the free movement of such data", + Official Journal L 281, pp. 31-50, November 1995, + <https://eur-lex.europa.eu/LexUriServ/ + LexUriServ.do?uri=CELEX:31995L0046:EN:HTML>. + + [day-at-root] + Castro, S., Wessels, D., Fomenkov, M., and K. Claffy, "A + Day at the Root of the Internet", ACM SIGCOMM Computer + Communication Review, Vol. 38, No. 5, + DOI 10.1145/1452335.1452341, October 2008, + <https://www.sigcomm.org/sites/default/files/ccr/ + papers/2008/October/1452335-1452341.pdf>. + + [denis-edns-client-subnet] + Denis, F., "Security and privacy issues of edns-client- + subnet", August 2013, + <https://00f.net/2013/08/07/edns-client-subnet/>. + + [ditl] CAIDA, "A Day in the Life of the Internet (DITL)", + <https://www.caida.org/projects/ditl/>. + + [dns-de-nat] + Orevi, L., Herzberg, A., Zlatokrilov, H., and D. Sigron, + "DNS-DNS: DNS-based De-NAT Scheme", January 2017, + <https://www.researchgate.net/publication/320322146_DNS- + DNS_DNS-based_De-NAT_Scheme>. + + [dns-footprint] + Stoner, E., "DNS Footprint of Malware", OARC Workshop, + October 2010, <https://www.dns-oarc.net/files/workshop- + 201010/OARC-ers-20101012.pdf>. + + [dns-over-encryption] + Lu, C., Liu, B., Li, Z., Hao, S., Duan, H., Zhang, M., + Leng, C., Liu, Y., Zhang, Z., and J. Wu, "An End-to-End, + Large-Scale Measurement of DNS-over-Encryption: How Far + Have We Come?", IMC '19: Proceedings of the Internet + Measurement Conference, pp. 22-35, + DOI 10.1145/3355369.3355580, October 2019, + <https://dl.acm.org/citation.cfm?id=3355369.3355580>. + + [dnsmezzo] Bortzmeyer, S., "DNSmezzo", <http://www.dnsmezzo.net/>. + + [DNSOP-RESOLVER] + Sood, P., Arends, R., and P. Hoffman, "DNS Resolver + Information Self-publication", Work in Progress, Internet- + Draft, draft-ietf-dnsop-resolver-information-01, 11 + February 2020, <https://datatracker.ietf.org/doc/html/ + draft-ietf-dnsop-resolver-information-01>. + + [DPRIVE-DNSOQUIC] + Huitema, C., Dickinson, S., and A. Mankin, "Specification + of DNS over Dedicated QUIC Connections", Work in Progress, + Internet-Draft, draft-ietf-dprive-dnsoquic-03, 12 July + 2021, <https://datatracker.ietf.org/doc/html/draft-ietf- + dprive-dnsoquic-03>. + + [EDDI] EDDI, "Encrypted DNS Deployment Initiative", + <https://www.encrypted-dns.org>. + + [fangming-hori-sakurai] + Zhao, F., Hori, Y., and K. Sakurai, "Analysis of Privacy + Disclosure in DNS Query", MUE '07: Proceedings of the 2007 + International Conference on Multimedia and Ubiquitous + Engineering, pp. 952-957, DOI 10.1109/MUE.2007.84, + ISBN 0-7695-2777-9, April 2007, + <https://dl.acm.org/citation.cfm?id=1262690.1262986>. + + [federrath-fuchs-herrmann-piosecny] + Federrath, H., Fuchs, K.-P., Herrmann, D., and C. + Piosecny, "Privacy-Preserving DNS: Analysis of Broadcast, + Range Queries and Mix-based Protection Methods", ESORICS + 2011, pp. 665-683, DOI 10.1007/978-3-642-23822-2_36, + ISBN 978-3-642-23822-2, 2011, <https://svs.informatik.uni- + hamburg.de/publications/2011/2011-09-14_FFHP_PrivacyPreser + vingDNS_ESORICS2011.pdf>. + + [getdns] "getdns", <https://getdnsapi.net>. + + [grangeia.snooping] + Grangeia, L., "Cache Snooping or Snooping the Cache for + Fun and Profit", 2005, + <https://www.semanticscholar.org/paper/Cache-Snooping-or- + Snooping-the-Cache-for-Fun-and- + 1-Grangeia/9b22f606e10b3609eafbdcbfc9090b63be8778c3>. + + [herrmann-reidentification] + Herrmann, D., Gerber, C., Banse, C., and H. Federrath, + "Analyzing Characteristic Host Access Patterns for Re- + Identification of Web User Sessions", Lecture Notes in + Computer Science, Vol. 7127, + DOI 10.1007/978-3-642-27937-9_10, 2012, <https://epub.uni- + regensburg.de/21103/1/Paper_PUL_nordsec_published.pdf>. + + [morecowbell] + Grothoff, C., Wachs, M., Ermert, M., and J. Appelbaum, + "NSA's MORECOWBELL: Knell for DNS", January 2015, <https:/ + /pdfs.semanticscholar.org/2610/2b99bdd6a258a98740af8217ba8 + da8a1e4fa.pdf>. + + [packetq] DNS-OARC, "A tool that provides a basic SQL-frontend to + PCAP-files", Release 1.4.3, commit 29a8288, October 2020, + <https://github.com/DNS-OARC/PacketQ>. + + [passive-dns] + Weimer, F., "Passive DNS Replication", 17th Annual FIRST + Conference, April 2005, + <https://www.first.org/conference/2005/papers/florian- + weimer-slides-1.pdf>. + + [pitfalls-of-dns-encryption] + Shulman, H., "Pretty Bad Privacy: Pitfalls of DNS + Encryption", WPES '14: Proceedings of the 13th Workshop on + Privacy in the Electronic Society, pp. 191-200, + DOI 10.1145/2665943.2665959, November 2014, + <https://dl.acm.org/citation.cfm?id=2665959>. + + [prism] Wikipedia, "PRISM (surveillance program)", July 2015, + <https://en.wikipedia.org/w/index.php?title=PRISM_(surveil + lance_program)&oldid=673789455>. + + [RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC + Text on Security Considerations", BCP 72, RFC 3552, + DOI 10.17487/RFC3552, July 2003, + <https://www.rfc-editor.org/info/rfc3552>. + + [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S. + Rose, "DNS Security Introduction and Requirements", + RFC 4033, DOI 10.17487/RFC4033, March 2005, + <https://www.rfc-editor.org/info/rfc4033>. + + [RFC4470] Weiler, S. and J. Ihren, "Minimally Covering NSEC Records + and DNSSEC On-line Signing", RFC 4470, + DOI 10.17487/RFC4470, April 2006, + <https://www.rfc-editor.org/info/rfc4470>. + + [RFC5155] Laurie, B., Sisson, G., Arends, R., and D. Blacka, "DNS + Security (DNSSEC) Hashed Authenticated Denial of + Existence", RFC 5155, DOI 10.17487/RFC5155, March 2008, + <https://www.rfc-editor.org/info/rfc5155>. + + [RFC5936] Lewis, E. and A. Hoenes, Ed., "DNS Zone Transfer Protocol + (AXFR)", RFC 5936, DOI 10.17487/RFC5936, June 2010, + <https://www.rfc-editor.org/info/rfc5936>. + + [RFC6269] Ford, M., Ed., Boucadair, M., Durand, A., Levis, P., and + P. Roberts, "Issues with IP Address Sharing", RFC 6269, + DOI 10.17487/RFC6269, June 2011, + <https://www.rfc-editor.org/info/rfc6269>. + + [RFC6891] Damas, J., Graff, M., and P. Vixie, "Extension Mechanisms + for DNS (EDNS(0))", STD 75, RFC 6891, + DOI 10.17487/RFC6891, April 2013, + <https://www.rfc-editor.org/info/rfc6891>. + + [RFC7413] Cheng, Y., Chu, J., Radhakrishnan, S., and A. Jain, "TCP + Fast Open", RFC 7413, DOI 10.17487/RFC7413, December 2014, + <https://www.rfc-editor.org/info/rfc7413>. + + [RFC7525] Sheffer, Y., Holz, R., and P. Saint-Andre, + "Recommendations for Secure Use of Transport Layer + Security (TLS) and Datagram Transport Layer Security + (DTLS)", BCP 195, RFC 7525, DOI 10.17487/RFC7525, May + 2015, <https://www.rfc-editor.org/info/rfc7525>. + + [RFC7624] Barnes, R., Schneier, B., Jennings, C., Hardie, T., + Trammell, B., Huitema, C., and D. Borkmann, + "Confidentiality in the Face of Pervasive Surveillance: A + Threat Model and Problem Statement", RFC 7624, + DOI 10.17487/RFC7624, August 2015, + <https://www.rfc-editor.org/info/rfc7624>. + + [RFC7626] Bortzmeyer, S., "DNS Privacy Considerations", RFC 7626, + DOI 10.17487/RFC7626, August 2015, + <https://www.rfc-editor.org/info/rfc7626>. + + [RFC7721] Cooper, A., Gont, F., and D. Thaler, "Security and Privacy + Considerations for IPv6 Address Generation Mechanisms", + RFC 7721, DOI 10.17487/RFC7721, March 2016, + <https://www.rfc-editor.org/info/rfc7721>. + + [RFC7754] Barnes, R., Cooper, A., Kolkman, O., Thaler, D., and E. + Nordmark, "Technical Considerations for Internet Service + Blocking and Filtering", RFC 7754, DOI 10.17487/RFC7754, + March 2016, <https://www.rfc-editor.org/info/rfc7754>. + + [RFC7816] Bortzmeyer, S., "DNS Query Name Minimisation to Improve + Privacy", RFC 7816, DOI 10.17487/RFC7816, March 2016, + <https://www.rfc-editor.org/info/rfc7816>. + + [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., + and P. Hoffman, "Specification for DNS over Transport + Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May + 2016, <https://www.rfc-editor.org/info/rfc7858>. + + [RFC7871] Contavalli, C., van der Gaast, W., Lawrence, D., and W. + Kumari, "Client Subnet in DNS Queries", RFC 7871, + DOI 10.17487/RFC7871, May 2016, + <https://www.rfc-editor.org/info/rfc7871>. + + [RFC7873] Eastlake 3rd, D. and M. Andrews, "Domain Name System (DNS) + Cookies", RFC 7873, DOI 10.17487/RFC7873, May 2016, + <https://www.rfc-editor.org/info/rfc7873>. + + [RFC7929] Wouters, P., "DNS-Based Authentication of Named Entities + (DANE) Bindings for OpenPGP", RFC 7929, + DOI 10.17487/RFC7929, August 2016, + <https://www.rfc-editor.org/info/rfc7929>. + + [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol + Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, + <https://www.rfc-editor.org/info/rfc8446>. + + [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS + (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, + <https://www.rfc-editor.org/info/rfc8484>. + + [RFC8499] Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS + Terminology", BCP 219, RFC 8499, DOI 10.17487/RFC8499, + January 2019, <https://www.rfc-editor.org/info/rfc8499>. + + [RFC8744] Huitema, C., "Issues and Requirements for Server Name + Identification (SNI) Encryption in TLS", RFC 8744, + DOI 10.17487/RFC8744, July 2020, + <https://www.rfc-editor.org/info/rfc8744>. + + [RFC8890] Nottingham, M., "The Internet is for End Users", RFC 8890, + DOI 10.17487/RFC8890, August 2020, + <https://www.rfc-editor.org/info/rfc8890>. + + [RFC8932] Dickinson, S., Overeinder, B., van Rijswijk-Deij, R., and + A. Mankin, "Recommendations for DNS Privacy Service + Operators", BCP 232, RFC 8932, DOI 10.17487/RFC8932, + October 2020, <https://www.rfc-editor.org/info/rfc8932>. + + [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based + Multiplexed and Secure Transport", RFC 9000, + DOI 10.17487/RFC9000, May 2021, + <https://www.rfc-editor.org/info/rfc9000>. + + [ripe-qname-measurements] + de Vries, W., "Making the DNS More Private with QNAME + Minimisation", April 2019, + <https://labs.ripe.net/Members/wouter_de_vries/make-dns-a- + bit-more-private-with-qname-minimisation>. + + [sidn-entrada] + Hesselman, C., Jansen, J., Wullink, M., Vink, K., and M. + Simon, "A privacy framework for 'DNS big data' + applications", November 2014, + <https://www.sidnlabs.nl/downloads/ + yBW6hBoaSZe4m6GJc_0b7w/2211058ab6330c7f3788141ea19d3db7/ + SIDN_Labs_Privacyraamwerk_Position_Paper_V1.4_ENG.pdf>. + + [thomas-ditl-tcp] + Thomas, M. and D. Wessels, "An Analysis of TCP Traffic in + Root Server DITL Data", DNS-OARC 2014 Fall Workshop, + October 2014, <https://indico.dns- + oarc.net/event/20/session/2/contribution/15/material/ + slides/1.pdf>. + + [tor-leak] Tor, "Tor FAQs: I keep seeing these warnings about SOCKS + and DNS information leaks. Should I worry?", + <https://www.torproject.org/docs/ + faq.html.en#WarningsAboutSOCKSandDNSInformationLeaks>. + + [yanbin-tsudik] + Yanbin, L. and G. Tsudik, "Towards Plugging Privacy Leaks + in Domain Name System", June 2010, + <https://arxiv.org/abs/0910.2472>. + +Appendix A. Updates since RFC 7626 + + Many references were updated. Discussions of encrypted transports, + including DoT and DoH, and sections on DNS payload, authentication of + servers, and blocking of services were added. With the publishing of + [RFC7816] on QNAME minimization, text, references, and initial + attempts to measure deployment were added to reflect this. The text + and references on the Snowden revelations were updated. + + The "Risks Overview" section was changed to "Scope" to help clarify + the risks being considered. Text on cellular network DNS, blocking, + and security was added. Considerations for recursive resolvers were + collected and placed together. A discussion on resolver selection + was added. + +Acknowledgments + + Thanks to Nathalie Boulvard and to the CENTR members for the original + work that led to this document. Thanks to Ondrej Sury for the + interesting discussions. Thanks to Mohsen Souissi and John Heidemann + for proofreading and to Paul Hoffman, Matthijs Mekking, Marcos Sanz, + Francis Dupont, Allison Mankin, and Warren Kumari for proofreading, + providing technical remarks, and making many readability + improvements. Thanks to Dan York, Suzanne Woolf, Tony Finch, Stephen + Farrell, Peter Koch, Simon Josefsson, and Frank Denis for good + written contributions. Thanks to Vittorio Bertola and Mohamed + Boucadair for a detailed review of the -bis. And thanks to the IESG + members for the last remarks. + +Contributions + + Sara Dickinson and Stephane Bortzmeyer were the original authors of + the document, and their contribution to the initial draft of this + document is greatly appreciated. + +Author's Address + + Tim Wicinski (editor) + Elkins, WV 26241 + United States of America + + Email: tjw.ietf@gmail.com |