{"id":491,"date":"2014-05-10T15:46:30","date_gmt":"2014-05-10T22:46:30","guid":{"rendered":"http:\/\/ant.isi.edu\/blog\/?p=491"},"modified":"2025-08-26T16:08:04","modified_gmt":"2025-08-26T23:08:04","slug":"new-talk-t-dns-connection-oriented-dns-to-improve-privacy-and-security-given-at-dns-oarc","status":"publish","type":"post","link":"https:\/\/ant.isi.edu\/blog\/?p=491","title":{"rendered":"new talk  \u201cT-DNS: Connection-Oriented DNS to Improve Privacy and Security\u201d given at DNS-OARC"},"content":{"rendered":"<p>John Heidemann gave the talk &#8220;T-DNS: Connection-Oriented DNS to Improve Privacy and Security\u201d given at the Spring DNS-OARC meeting in Warsaw, Poland on May 10, 2014. \u00a0Slides are available at\u00a0<a href=\"http:\/\/www.isi.edu\/~johnh\/PAPERS\/Heidemann14c.html\">http:\/\/www.isi.edu\/~johnh\/PAPERS\/Heidemann14c.html<\/a>.<\/p>\n<figure id=\"attachment_492\" aria-describedby=\"caption-attachment-492\" style=\"width: 300px\" class=\"wp-caption alignright\"><a href=\"http:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2014\/05\/Heidemann14c_icon.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-492 size-medium\" src=\"http:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2014\/05\/Heidemann14c_icon-300x225.png\" alt=\"don't fear connections for DNS\" width=\"300\" height=\"225\" srcset=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2014\/05\/Heidemann14c_icon-300x225.png 300w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2014\/05\/Heidemann14c_icon.png 639w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-492\" class=\"wp-caption-text\">don&#8217;t fear connections for DNS<\/figcaption><\/figure>\n<p>From the abstract:<\/p>\n<blockquote><p><span style=\"color: #000000;\">This talk will discuss\u00a0<\/span><em style=\"color: #000000;\">connection-oriented DNS<\/em><span style=\"color: #000000;\">\u00a0to improve DNS security and privacy. DNS is the canonical example of a connectionless, single packet, request\/response protocol, with UDP as its dominant transport. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose\u00a0<\/span><em style=\"color: #000000;\">t-DNS<\/em><span style=\"color: #000000;\">\u00a0to address these problems: it uses TCP to smoothly support large payloads and mitigate spoofing and amplification for DoS. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS resolvers and optionally to authoritative servers.<\/span><\/p>\n<p style=\"color: #000000;\">Traditional wisdom is that connection setup will balloon latency for clients and overwhelm servers. We provide data to show that these assumptions are overblown&#8211;our model of end-to-end latency shows\u00a0<em>TLS to the recursive resolver is only about 5-24% slower<\/em>, with UDP to the authoritative server. End-to-end latency is 19-33% slower with TLS to recursive and TCP to authoritative. Experiments behind these models show that after connection establishment, TCP and TLS latency is equivalent to UDP. Using diverse trace data we show that frequent connection reuse is possible (60-95% for stub and recursive resolvers, although half that for authoritative servers). With conservative timeouts (20 s at authoritative servers and 60 s elsewhere) we show that : a large recursive resolver may have 25k active connections consuming about 9 GB of RAM. These results depend on specific design and implementation decisions&#8211;query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts.<\/p>\n<p style=\"color: #000000;\">We hope to solicit feedback from the OARC community about this work to understand design and operational concerns if T-DNS deployment was widespread. The work in the talk is by Liang Zhu, Zi Hu, and John Heidemann (all of USC\/ISI), Duane Wessels and Allison Mankin (both of Verisign), and Nikita Somaiya (USC\/ISI).<\/p>\n<p style=\"color: #000000;\">A technical report describing the work is at\u00a0<a style=\"color: #000070;\" href=\"http:\/\/ant.isi.edu\/~johnh\/PAPERS\/Zhu14a.pdf\">http:\/\/www.isi.edu\/\u00a0johnh\/PAPERS\/Zhu14a.pdf<\/a>\u00a0and the protocol changes are described as<a style=\"color: #000070;\" href=\"http:\/\/datatracker.ietf.org\/doc\/draft-hzhwm-start-tls-for-dns\/\">http:\/\/datatracker.ietf.org\/doc\/draft-hzhwm-start-tls-for-dns\/<\/a>.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>John Heidemann gave the talk &#8220;T-DNS: Connection-Oriented DNS to Improve Privacy and Security\u201d given at the Spring DNS-OARC meeting in Warsaw, Poland on May 10, 2014. \u00a0Slides are available at\u00a0http:\/\/www.isi.edu\/~johnh\/PAPERS\/Heidemann14c.html. From the abstract: This talk will discuss\u00a0connection-oriented DNS\u00a0to improve DNS security and privacy. DNS is the canonical example of a connectionless, single packet, request\/response protocol, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[280],"tags":[94,63,58,67,74,41,93,91,18,92,57,38],"class_list":["post-491","post","type-post","status-publish","format-standard","hentry","category-presentations","tag-denial-of-service","tag-dns","tag-isi","tag-lacrend","tag-modeling","tag-predict","tag-privacy","tag-protocols","tag-security","tag-tls","tag-usc","tag-workshop"],"_links":{"self":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=491"}],"version-history":[{"count":4,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/491\/revisions"}],"predecessor-version":[{"id":2270,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/491\/revisions\/2270"}],"wp:attachment":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}