NDSS, 25 February 2020
Encrypted DNS Privacy?
A Traffic Analysis Perspective
Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso
Encrypted DNS Privacy? A Traffic Analysis Perspective Sandra - - PowerPoint PPT Presentation
Encrypted DNS Privacy? A Traffic Analysis Perspective Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso NDSS, 25 February 2020 Encrypted DNS > Privacy? Can encrypting DNS protect users from tra ffi
NDSS, 25 February 2020
Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso
2
encrypted.
sufficient to prevent traffic analysis attacks.
3
Recursive Resolver Client Name Servers Destination Host Query: google.com? Response: 172.217.168.4 google.com? g
l e . c
? google.com? HTTP requests and responses
172.217.168.4
4
Recursive Resolver Client Name Servers Destination Host Query: google.com? Response: 172.217.168.4 google.com? g
l e . c
? google.com? HTTP requests and responses
Encrypted
172.217.168.4
5
Recursive Resolver Client Name Servers Destination Host Query: google.com? Response: 172.217.168.4 google.com? g
l e . c
? google.com? HTTP requests and responses
Encrypted
172.217.168.4
6
Recursive Resolver Client Name Servers Destination Host Query: google.com? Response: 172.217.168.4 google.com? g
l e . c
? google.com? HTTP requests and responses
Encrypted
172.217.168.4
DNS-over-TLS (DoT) DNS-over-HTTPS (DoH)
7
Recursive Resolver Client Name Servers Destination Host Query: google.com? Response: 172.217.168.4 google.com? g
l e . c
? google.com? HTTP requests and responses
Encrypted
172.217.168.4
8
DNS-over-HTTPS traffic Adversary Goal: Determine webpage visited by the client from DNS-over-HTTPS traffic. Client Recursive Resolver
9
10
DNS-over-HTTPS traffic Directionality
Timing Size Headers Adversary Client Recursive Resolver
11
DNS-over-HTTPS traffic Visit webpage
Adversary Client Recursive Resolver
12
DNS-over-HTTPS traffic Visit webpage
N-gram features Adversary Client Recursive Resolver
13
Client Recursive Resolver DNS-over-HTTPS traffic Visit webpage
Selenium +
Adversary
14
Set of webpages visited by user Set of webpages known to the adversary
15
Set of webpages visited by user Set of webpages known to the adversary
1,500 pages
16
Set of webpages visited by user Set of webpages monitored by adversary
17
Set of webpages visited by user Set of webpages monitored by adversary
5,000 pages 50 pages
18
Study the uniqueness of DoH traffic when only the first L TLS records have been observed (set of 5,000 pages).
19
Adversary strategy: Block on first query?
domain name lengths are also blocked!
censored website list, but also blocks ~86,000 domains in the Alexa top 1M list
20
DNS-over-HTTPS traffic Visit webpage
Selenium +
Adversary’s training setup
Adversary Client Recursive Resolver
21
Time (Dynamic Nature of websites) Location Infrastructure
22
23
24
EDNS0: Extension mechanisms for DNS, specifies a padding option1
1RFC7830 2RFC8467
Padding of DNS queries: We implemented the recommended padding strategy2 on Cloudflare’s DoH client. Pad query to multiples
Client Resolver
Query with padding Pad query
25
Padding of DNS responses: Cloudflare’s resolver pads responses to multiples of 128 bytes. Recommended strategy: Pad to multiples
Client Resolver
Response with padding Pad response
26
EDNS0-128 EDNS0-468 Perfect Padding DNS over Tor Cloudflare’s response padding strategy Recommended response padding strategy Keep all TLS record sizes constant Cloudflare’s DNS over Tor service EDNS0-128-adblock User-side measure (ad-blocker usage)
27
0.001
90 70 45 34 7 3.5
28
0.001
90 70 45 34 7 3.5 Fixed cell sizes Repacketization
29
Sent + received bytes (from TLS records)
30
Recursive Resolver Client Name Servers Destination Host Query: google.com? Response: 172.217.168.4 google.com? g
l e . c
? google.com? HTTP requests and responses
Encrypted
172.217.168.4
DNS-over-TLS (DoT) DNS-over-HTTPS (DoH)
31
32
33
34
presence of encrypted DNS.
sufficient.
Code and datasets at: https://github.com/spring-epfl/doh_traffic_analysis Get in touch: sandra.siby@epfl.ch @sansib
35
36
pcap file
TLS record sizes
Uni-grams: (24), (-58)…. Bi-grams: (24, -58), (-58, 63)… Uni-grams: (24), (-58)… Bi-grams: (24, -58), (-58, 173)… Burst sizes Single record sizes Counts
37
Censoring adversary: Identify webpages as fast as possible Consequences of blocking based on domain length Minimum collateral damage Maximum censor gain Most popular website Censor blocking strategy
38
Adversary strategy: High confidence guessing?
confidence.
39
Confusion graph of misclassified labels
Pages in a cluster are misclassified as each other
Clusters in confusion graph?
40
DoT traffic looks different from DoH traffic:
AAAA in DoH)
in DoT (more ‘bare-bones’ than DoH)
Does this traffic variability account for better protection in DoT?