2016
DOI: 10.17487/rfc7830
|View full text |Cite
|
Sign up to set email alerts
|

The EDNS(0) Padding Option

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 2 publications
(3 reference statements)
0
12
0
Order By: Relevance
“…To explore this issue, we ran a set of tests with different resolvers. In our tests, we observed three basic approaches to padding among several recursive resolvers: 1) always pad responses, 2) never pad responses, and 3) pad responses when the client sends the EDNS(0) option, indicating padding (12) [41]. For recursive resolvers that pad, we found two padding approaches: using fixed block size padding (128 or 468 octets) or variable amounts of padding.…”
Section: Comparison Of Recursive Resolvers the Ability To Identifymentioning
confidence: 89%
See 1 more Smart Citation
“…To explore this issue, we ran a set of tests with different resolvers. In our tests, we observed three basic approaches to padding among several recursive resolvers: 1) always pad responses, 2) never pad responses, and 3) pad responses when the client sends the EDNS(0) option, indicating padding (12) [41]. For recursive resolvers that pad, we found two padding approaches: using fixed block size padding (128 or 468 octets) or variable amounts of padding.…”
Section: Comparison Of Recursive Resolvers the Ability To Identifymentioning
confidence: 89%
“…By contrast, DNS messages have historically been constrained to be less than 512 bytes when transmitted over UDP (which is by far the most common method) [44]. DNS Extensions now allow DNS messages over 512 bytes [41], and DNSSEC often generates messages over 512 bytes [57]. However, the DNSSEC deployment is still relatively low [7,8].…”
Section: Insights Of Dot Trafficmentioning
confidence: 99%
“…Motivated by our exchange with Cloudflare after responsible 1 disclosure, we evaluate existing traffic analysis defenses: the standardized EDNS0 padding [23] and the use of Tor [24]. We find that in our setup, contrary to what was suggested by Cloudflare engineers, EDNS padding strategies cannot completely deter our attack.…”
Section: Introductionmentioning
confidence: 93%
“…is a specification to increase the functionality of the DNS protocol [65]. One of the options is the addition of padding [23] by both DNS clients and resolvers in order to prevent sizecorrelation attacks on encrypted DNS. The recommended padding policy is to pad DNS requests to the nearest multiple of 128 bytes and DNS responses to the nearest multiple of 468 bytes [66].…”
Section: Edns(0) Padding Edns (Extension Mechanisms For Dns)mentioning
confidence: 99%
“…Even with encrypted messages, a well-positioned party may be able to glean certain details from an analysis of message timings and sizes. Clients and servers may consider the use of a padding method to address privacy leakage due to message sizes [RFC7830]. Since traffic analysis can be based on many kinds of patterns and many kinds of classifiers, simple padding schemes alone might not be sufficient to mitigate such an attack.…”
Section: Security Considerationsmentioning
confidence: 99%