-
Couldn't load subscription status.
- Fork 238
Open
Labels
Description
Duplicated from email thread.
Context:
In our study [1], we have evaluated if DNS over TLS (DoT) and DNS over
HTTPS (DoH) resolvers support EDNS(0) padding to protect users’ privacy
against traffic analysis. Through our measurements, we found that your
resolver does not pad DNS responses, even if DNS queries are padded.
This leaves your users unprotected against traffic analysis attacks. To
tackle this privacy problem, it is recommended to pad DNS responses to
multiples of 468 bytes. There is some guidance for resolvers
specifically for padding with RFC 8467 and for privacy in general with
RFC 8932.
Explanation of the Problem:
In general, DoT and DoH promise to improve privacy of DNS by encrypting
DNS messages. While encryption is beneficial for users’ privacy,
websites or mobile apps can still be identified with traffic analysis
attacks solely by encrypted DNS traffic [1]. The resulting privacy
leakage through message size patterns is already discussed in the
standards for both protocols (see RFC 8484 and RFC 7858). As a
protection, it is recommended to pad DNS messages to a uniform size.
That is, resolvers should pad DNS responses to multiples of 468 bytes to
protect their users against traffic analysis attacks.