[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures

  • Conference paper
  • First Online:
Computer Security – ESORICS 2024 (ESORICS 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14983))

Included in the following conference series:

  • 562 Accesses

Abstract

Encrypted DNS protocols—DNS-over-TLS (DoT), DNS-over-HTTPS (DoH), and DNS-over-QUIC (DoQ), have been standardized and widely embraced by the industry to enhance the security and privacy of DNS transmissions. As more software and devices support encrypted DNS protocols, adopting encrypted DNS is fast becoming the prevailing trend in domain name resolution. Despite this growing trend, the dependencies within the encrypted DNS infrastructures remain largely unexplored. Key questions arise regarding the server components and third-party DNS providers that encrypted DNS servers rely on during the resolution process. Understanding these dependencies is essential for gaining a comprehensive view of the encrypted DNS ecosystem and revealing potential vulnerabilities or points of centralization that could impact the robustness and reliability of DNS services.

This paper analyzes the dependencies from two critical aspects: the server components and the DNS resolution process. To this end, we perform large-scale measurements on encrypted DNS infrastructures and distinguish the role of servers. Based on the classification results, we extract fingerprints to identify the server components and measure the upstream DNS resolver leveraging the resolution footprints. Our findings show that (i) an encrypted DNS resolver can encompass multiple components that cooperate in the resolution process; (ii) despite the dispersed nature of encrypted DNS entrances, 75.24% of all encrypted DNS resolvers rely on the top 10 DNS providers. The concentration of query forwarding towards specific upstream resolvers signifies a growing concern related to dependencies and centralization in encrypted DNS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 49.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 64.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. AdGuard DNS — ad-blocking DNS server. https://adguard-dns.io/en/public-dns.html

  2. Alexa top 1m domains list. https://s3.amazonaws.com/alexa-static/top-1m.csv.zip

  3. BuiltWith top 1m rank. https://builtwith.com/top-1m

  4. CIDR report. https://www.cidr-report.org/as2.0/

  5. Cisco umbrella top 1m domains list. https://www.trisul.org/devzone/doku.php/cisco_umbrella_top-1m_domains_list

  6. Cloudflare radar. https://radar.cloudflare.com/

  7. DNS over HTTPS (aka DoH). https://www.chromium.org/developers/dns-over-https/

  8. dnspython. https://github.com/rthalley/dnspython, original-date: 2011-08-24T11:36:39Z

  9. Encrypt DNS traffic \(\cdot \) cloudflare 1.1.1.1 docs. https://developers.cloudflare.com/1.1.1.1/encryption/

  10. Encrypted DNS. https://quad9.net/de/support/set-up-guides/encrypted-dns

  11. Firefox DNS-over-HTTPS | Firefox Help. https://support.mozilla.org/en-US/kb/firefox-dns-over-https

  12. Majestic million. https://majestic.com/reports/majestic-million

  13. Microsoft Edge Privacy Whitepaper - Microsoft Edge Development | Microsoft Docs. https://docs.microsoft.com/en-us/microsoft-edge/privacy-whitepaper/

  14. A research-oriented top sites ranking hardened against manipulation - tranco. https://tranco-list.eu/

  15. Secure transports for DNS | public DNS | google for developers. https://developers.google.com/speed/public-dns/docs/secure-transports

  16. Routeviews prefix to AS mappings dataset (pfx2as) for IPv4 and IPv6 (2008). https://www.caida.org/catalog/datasets/routeviews-prefix2as/

  17. B-root offers experimental support for DNS over TLS (2023). https://b.root-servers.org/news/2023/02/28/tls.html

  18. New addresses for b.root-servers.net (2023). https://b.root-servers.org/news/2023/05/16/new-addresses.html

  19. Böttger, T., et al.: An empirical study of the cost of DNS-over-HTTPS. In: Proceedings of the Internet Measurement Conference, pp. 15–21. IMC ’19, Association for Computing Machinery. https://doi.org/10.1145/3355369.3355575

  20. Deccio, C., Davis, J.: DNS privacy in practice and preparation, pp. 138–143. CoNEXT ’19, Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3359989.3365435

  21. Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: 22nd USENIX Security Symposium (USENIX Security 13), pp. 605–620. USENIX Association, Washington, D.C. (2013). https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/durumeric

  22. García, S., Bogado, J., Hynek, K., Vekshin, D., Čejka, T., Wasicek, A.: Large scale analysis of DoH deployment on the internet. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) Computer Security – ESORICS 2022. ESORICS 2022. LNCS, vol. 13556. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-17143-7_8

  23. Hoffman, P., McManus, P.: DNS queries over HTTPS (DoH). https://doi.org/10.17487/RFC8484, https://www.rfc-editor.org/info/rfc8484

  24. Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., Hoffman, P.E.: Specification for DNS over Transport Layer Security (TLS). RFC 7858 (2016). https://doi.org/10.17487/RFC7858, https://www.rfc-editor.org/info/rfc7858

  25. Huitema, C., Dickinson, S., Mankin, A.: DNS over Dedicated QUIC Connections. RFC 9250 (2022). https://doi.org/10.17487/RFC9250, https://www.rfc-editor.org/info/rfc9250

  26. Kosek, M., Doan, T.V., Granderath, M., Bajpai, V.: One to rule them all? A first look at DNS over QUIC. In: Hohlfeld, O., Moura, G., Pelsser, C. (eds.) PAM 2022. LNCS, vol. 13210, pp. 537–551. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-98785-5_24

    Chapter  Google Scholar 

  27. Kührer, M., Hupperich, T., Bushart, J., Rossow, C., Holz, T.: Going wild: large-scale classification of open DNS resolvers. In: Proceedings of the 2015 Internet Measurement Conference, pp. 355–368. IMC ’15, Association for Computing Machinery, New York, NY, USA (2015). https://doi.org/10.1145/2815675.2815683

  28. Li, R., et al.: A longitudinal and comprehensive measurement of DNS strict privacy. IEEE/ACM Trans. Netw. 1–16 (2023). https://doi.org/10.1109/TNET.2023.3262651

  29. Li, R., et al.: A longitudinal and comprehensive measurement of DNS strict privacy. IEEE/ACM Trans. Networking 31(6), 2793–2808 (2023). https://doi.org/10.1109/TNET.2023.3262651

  30. Luo, M., Yao, Y., Xin, L., Jiang, Z., Wang, Q., Shi, W.: Measurement for encrypted open resolvers: applications and security. Comput. Netw. 213, 109081 (2022). https://doi.org/10.1016/j.comnet.2022.109081, https://www.sciencedirect.com/science/article/pii/S1389128622002183

  31. Nisenoff, A., Sharma, R., Feamster, N.: User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers, pp. 3117–3133 (2023). https://www.usenix.org/conference/usenixsecurity23/presentation/nisenoff-awareness

  32. Park, J., Jang, R., Mohaisen, M., Mohaisen, D.: A large-scale behavioral analysis of the open DNS resolvers on the internet. IEEE/ACM Trans. Netw. 30(1), 76–89 (2022). https://doi.org/10.1109/TNET.2021.3105599

  33. Partridge, C., Allman, M.: Addressing ethical considerations in network measurement papers: Abstract. In: Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, pp. 33. NS Ethics ’15, Association for Computing Machinery, New York, NY, USA (2015). https://doi.org/10.1145/2793013.2793014

  34. Schomp, K., Callahan, T., Rabinovich, M., Allman, M.: On measuring the client-side DNS infrastructure. In: Proceedings of the 2013 conference on Internet measurement conference, pp. 77–90. IMC ’13, Association for Computing Machinery (2013). https://doi.org/10.1145/2504730.2504734

  35. Wan, G., et al.: On the origin of scanning: the impact of location on internet-wide scans. In: Proceedings of the ACM Internet Measurement Conference, pp. 662–679. IMC ’20, Association for Computing Machinery (2020). https://doi.org/10.1145/3419394.3424214

  36. Xu, C., et al.: Measuring the centrality of DNS infrastructure in the wild 13(9), 5739. https://doi.org/10.3390/app13095739

  37. Zirngibl, J., Buschmann, P., Sattler, P., Jaeger, B., Aulbach, J., Carle, G.: It’s over 9000: analyzing early QUIC deployments with the standardization on the horizon. In: Proceedings of the 21st ACM Internet Measurement Conference, pp. 261–275. IMC ’21, Association for Computing Machinery, New York, NY, USA (2021). https://doi.org/10.1145/3487552.3487826

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their valuable comments and helpful suggestions. This work is supported by the Scaling Program of the Institute of Information Engineering, CAS (No. E3Z0191101, No. E3Z0041101).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yujia Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, B. et al. (2024). From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures. In: Garcia-Alfaro, J., Kozik, R., Choraś, M., Katsikas, S. (eds) Computer Security – ESORICS 2024. ESORICS 2024. Lecture Notes in Computer Science, vol 14983. Springer, Cham. https://doi.org/10.1007/978-3-031-70890-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-70890-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-70889-3

  • Online ISBN: 978-3-031-70890-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics