2019
DOI: 10.2478/popets-2019-0028
|View full text |Cite
|
Sign up to set email alerts
|

Oblivious DNS: Practical Privacy for DNS Queries

Abstract: Virtually every Internet communication typically involves a Domain Name System (DNS) lookup for the destination server that the client wants to communicate with. Operators of DNS recursive resolvers-the machines that receive a client's query for a domain name and resolve it to a corresponding IP address-can learn significant information about client activity. Past work, for example, indicates that DNS queries reveal information ranging from web browsing activity to the types of devices that a user has in their… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 36 publications
0
25
0
Order By: Relevance
“…If DNS requests or destination IP addresses are obfuscated, such as for an external adversary outside a VPN, for a local adversary without Wi-Fi network access, or through DNS over TLS (DoT) [23], DNS over HTTPS (DoH) [22], or Oblivious DNS (ODNS) [35], then device fingerprinting would have to be performed using traffic rate characteristics [2,36]. Our STP algorithm (Section 6) protects against user activity inference from traffic rates independent of the device identification technique employed by the adversary.…”
Section: Device Fingerprinting and Traffic Demultiplexingmentioning
confidence: 99%
See 1 more Smart Citation
“…If DNS requests or destination IP addresses are obfuscated, such as for an external adversary outside a VPN, for a local adversary without Wi-Fi network access, or through DNS over TLS (DoT) [23], DNS over HTTPS (DoH) [22], or Oblivious DNS (ODNS) [35], then device fingerprinting would have to be performed using traffic rate characteristics [2,36]. Our STP algorithm (Section 6) protects against user activity inference from traffic rates independent of the device identification technique employed by the adversary.…”
Section: Device Fingerprinting and Traffic Demultiplexingmentioning
confidence: 99%
“…While requiring a VPN raises threshold for adoption, personal VPN usage is becoming more common due to increased privacy awareness [19] and availability of non-enterprise VPN services, such as home routers with built-in VPN [34] and Google's Project Fi VPN [26]. Alternatively, specific categorical metadata could also be protected by existing protocols, such as obfuscating DNS via DNS over TLS (DoT) [23], DNS over HTTPS (DoH) [22], or Oblivious DNS (ODNS) [35]. DoT, DoH, and ODNS traffic may still need to be shaped separately from non-DNS traffic to prevent web domain inference from packet lengths and other rate characteristics [23].…”
Section: Obfuscating Categorical Metadatamentioning
confidence: 99%
“…Schmitt et al [41] propose a resolution mechanism to anonymize users' DNS queries by decoupling the link between users and their DNS queries. More specifically, the mechanism introduces an entity, called an Oblivious DNS (ODNS) resolver, residing between the user and the traditional recursor.…”
Section: Related Workmentioning
confidence: 99%
“…However, for DNSCrypt and DNSCurve, the recursive resolver remains aware of what names a client queries for, which has privacy implications as it allows the recursor to learn about the websites that the client visits and when it visits them. Schmitt et al [33] proposed oblivious DNS, which prevents a resolver from associating queries to the clients that sent them, and, thus, prevents a recursor from learning a client's browsing behavior.…”
Section: Related Workmentioning
confidence: 99%