2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.18
|View full text |Cite
|
Sign up to set email alerts
|

Connection-Oriented DNS to Improve Privacy and Security

Abstract: The Domain Name System (DNS) seems ideal for connectionless UDP, yet this choice results in challenges of eavesdropping that compromises privacy, source-address spoofing that simplifies denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and reply-size limits that constrain key sizes and policy choices. We propose T-DNS to address these problems. It uses TCP to smoothly support large payloads and to mitigate spoofing and amplification for DoS. T-DNS us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
61
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 89 publications
(61 citation statements)
references
References 47 publications
0
61
0
Order By: Relevance
“…DNS-over-TLS protects privacy of DNS queries and prevents man-in-the-middle (MiTM) attacks against DNS responses. [39] also demonstrated the * Work done while visiting University of California, Irvine, as a US-UK Fulbright Cyber Security Scholar. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 88%
See 2 more Smart Citations
“…DNS-over-TLS protects privacy of DNS queries and prevents man-in-the-middle (MiTM) attacks against DNS responses. [39] also demonstrated the * Work done while visiting University of California, Irvine, as a US-UK Fulbright Cyber Security Scholar. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 88%
“…We do not consider Denial-of-Service (DoS) attacks on RecRes, since these do not help to achieve either adversary's goal of learning clients' DNS queries. Connection-oriented RecRes-s can defend against DoS attacks using cookie-based mechanisms to prevent SYN flooding [39].…”
Section: Adversary Model and Requirements 31 Adversary Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the design, TLS should be used between the client and the recursive resolver (scenario (2) in Figure 1) or, if the recursive DNS resolver is not trusted, then for end-to-end security, between the client and the name server (scenario (1) in Figure 1). The main difference between the two proposals is that [32], integrated into unbound, uses a non-DNS port for secure connections, and does not support out of order processing of the DNS requests; the technical report, [35], contains more details on the evaluation and implementation.…”
Section: Dns-over-tlsmentioning
confidence: 99%
“…In this work we focus on the proposals which aim to provide privacy to DNS packets by employing encryption, [3,4,8,21,27,32,34,35]. These proposals are on a standardisation track of the IETF and are already supported by some DNS resolvers software, e.g., unbound, [31], and by the public DNS operators, e.g., OpenDNS [28].…”
Section: Introductionmentioning
confidence: 99%