Skip to content

Support for EDNS(0) Padding Option #111

@imbushuo

Description

@imbushuo

Duplicated from email thread.

Context:
In our study [1], we have evaluated if DNS over TLS (DoT) and DNS over 
HTTPS (DoH) resolvers support EDNS(0) padding to protect users’ privacy 
against traffic analysis. Through our measurements, we found that your 
resolver does not pad DNS responses, even if DNS queries are padded. 
This leaves your users unprotected against traffic analysis attacks. To 
tackle this privacy problem, it is recommended to pad DNS responses to 
multiples of 468 bytes. There is some guidance for resolvers 
specifically for padding with RFC 8467 and for privacy in general with 
RFC 8932.

Explanation of the Problem:
In general, DoT and DoH promise to improve privacy of DNS by encrypting 
DNS messages. While encryption is beneficial for users’ privacy, 
websites or mobile apps can still be identified with traffic analysis 
attacks solely by encrypted DNS traffic [1]. The resulting privacy 
leakage through message size patterns is already discussed in the 
standards for both protocols (see RFC 8484 and RFC 7858). As a 
protection, it is recommended to pad DNS messages to a uniform size. 
That is, resolvers should pad DNS responses to multiples of 468 bytes to 
protect their users against traffic analysis attacks.

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions