John Heidemann / Papers / T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended)

T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended)
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin and Nikita Somaiya
USC/Information Sciences Institute

Citation

Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin and Nikita Somaiya. T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended). Technical Report ISI-TR-2014-693. USC/Information Sciences Institute. [PDF] [alt PDF] [Code]

Abstract

DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and size limitations that constrain policy and operational choices. We propose T-DNS to address these problems. It uses TCP to smoothly support large payloads and to mitigate spoofing and amplification for DoS. T-DNS uses transport-layer security (TLS) to provide privacy from users to their DNS resolvers and optionally to authoritative servers. Expectations about DNS suggest connections will balloon client latency and overwhelm server with state, but our evaluation shows costs are modest: end-to-end latency from TLS to the recursive resolver is only about 9% slower when UDP is used to the authoritative server, and 22% slower with TCP to the authoritative. With diverse traces we show that frequent connection reuse is possible (60–95% for stub and recursive resolvers, although half that for authoritative servers), and after connection establishment, we show TCP and TLS latency is equivalent to UDP. With conservative timeouts (20 s at authoritative servers and 60 s elsewhere) and conservative estimates of connection state memory requirements, we show that server memory requirements match current hardware: a large recursive resolver may have 24k active connections requiring about 3.6 GB additional RAM. We identify the key design and implementation decisions needed to minimize overhead: query pipelining, out-of-order responses, TLS connection resumption, and plausible timeouts.

Bibtex Citation

@techreport{Zhu14b,
  author = {Zhu, Liang and Hu, Zi and Heidemann, John and Wessels, Duane and Mankin, Allison and Somaiya, Nikita},
  title = {T-{DNS}: Connection-Oriented {DNS} to Improve Privacy and Security (extended)},
  institution = {USC/Information Sciences Institute},
  year = {2014},
  sortdate = {2014-06-01},
  project = {ant, retrofuture, lacrend, tdns},
  jsubject = {chronological},
  number = {ISI-TR-2014-693},
  month = jun,
  jlocation = {johnh: pafile},
  keywords = {network outage detection, hurricane sandy},
  url = {https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14b.html},
  pdfurl = {https://ant.isi.edu/%7ejohnh/PAPERS/Zhu14b.pdf},
  otherurl = {ftp://ftp.isi.edu/isi-pubs/tr-693.pdf},
  myorganization = {USC/Information Sciences Institute},
  copyrightholder = {authors},
  blogurl = {https://ant.isi.edu/blog/?p=508},
  datasetlurl = {https://ant.isi.edu/datasets/all.html},
  codeurl = {https://ant.isi.edu/software/tdns/index.html}
}
Copyright © by John Heidemann