| draft-arkko-dinrg-centralization-dns-00.txt | draft-arkko-dinrg-centralization-dns.txt | |||
|---|---|---|---|---|
| Network Working Group J. Arkko | ||||
| Internet-Draft Ericsson | ||||
| Expires: 19 November 2021 | ||||
| Mitigation Options against Centralization in DNS Resolvers | ||||
| draft-arkko-dinrg-centralization-dns-00 | ||||
| Abstract | ||||
| Centralization and consolidation of various Internet services are | ||||
| major trends. While these trends have some benefits - for instance | ||||
| in deployment of new technology - they also have serious drawbacks in | ||||
| terms of resilience, privacy, and other aspects. | ||||
| This extended abstract is a submission to the Decentralized Internet | ||||
| Infrastructure Research Group (DINRG) workshop on Centralization in | ||||
| the Internet. | ||||
| The extended abstract focuses on the question of centralization | ||||
| related to DNS resolver services. | ||||
| Status of This Memo | ||||
| This Internet-Draft is submitted in full conformance with the | ||||
| provisions of BCP 78 and BCP 79. | ||||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | ||||
| and may be updated, replaced, or obsoleted by other documents at any | ||||
| time. It is inappropriate to use Internet-Drafts as reference | ||||
| material or to cite them other than as "work in progress." | ||||
| This Internet-Draft will expire on 19 November 2021. | ||||
| Copyright Notice | ||||
| Copyright (c) 2021 IETF Trust and the persons identified as the | ||||
| document authors. All rights reserved. | ||||
| This document is subject to BCP 78 and the IETF Trust's Legal | ||||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | ||||
| license-info) in effect on the date of publication of this document. | ||||
| Please review these documents carefully, as they describe your rights | ||||
| and restrictions with respect to this document. Code Components | ||||
| extracted from this document must include Simplified BSD License text | ||||
| as described in Section 4.e of the Trust Legal Provisions and are | ||||
| provided without warranty as described in the Simplified BSD License. | ||||
| Table of Contents | ||||
| 1. Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . 2 | ||||
| 2. Informative References . . . . . . . . . . . . . . . . . . . 4 | ||||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 7 | ||||
| 1. Abstract | ||||
| Centralization and consolidation of various Internet services are | ||||
| major trends. While these trends have some benefits - for instance | ||||
| in deployment of new technology - they also have serious drawbacks in | ||||
| terms of resilience, privacy, and other aspects. This extended | ||||
| abstract focuses on the question of centralization related to DNS | ||||
| [RFC1035] resolver services. | ||||
| DNS resolver services are also a good example of centralization and | ||||
| approaches to dealing with it. The approaches may be applicable in | ||||
| other contexts as well. | ||||
| DNS resolver services have evolved in recent years largely due to two | ||||
| trends: | ||||
| * Availability of new technology protect the communications relating | ||||
| to queries with TLS [RFC7858] [RFC8484] | ||||
| [I-D.ietf-dprive-dnsoquic]. | ||||
| * Introduction of general-purpose resolver services in the Internet, | ||||
| such as Google's 8.8.8.8 and Cloudflare's 1.1.1.1 service. | ||||
| It is interesting that privacy of DNS queries has only surfaced as an | ||||
| issue in recent years [RFC7626] [RFC8324]. The original DNS | ||||
| protocols had no support whatsover for security, and later designs | ||||
| such as DNSSEC addressed another problem, reliability of the | ||||
| information, but not privacy. Yet, DNS queries reveal potentially | ||||
| the users' entire browsing histories. | ||||
| However, even when DNS queries are hidden inside communications, any | ||||
| DNS resolvers still have the potential too see the users' actions. | ||||
| This is particularly problematic, given that commonly used large | ||||
| public or operator resolver services are an obviously attractive | ||||
| target, for both attacks and for commercial or other use of | ||||
| information visible to them of the users. The use of information | ||||
| garnered from centralized services is particularly concerning in | ||||
| light of possible pervasive surveillance [RFC7258]. | ||||
| While these services are run by highly competent organizations and | ||||
| for the benefit of users, in general, it is undesirable to create | ||||
| Internet architectures or infrastructure that collects massive amount | ||||
| of information about users in few locations. Over longer time | ||||
| scales, the danger is that it will not be possible to withstand legal | ||||
| or commercial pressures to employ such information base in a way that | ||||
| is actually not in line with the interests of the users. | ||||
| The full paper for the workshop will discuss the reasons for | ||||
| centralization in the DNS case, the problems it causes, and outlines | ||||
| a number of directions for solutions. | ||||
| Solutions address the privacy problems either by reducing the | ||||
| centralization, reducing the information given to the centralized | ||||
| solutions, or make it hard to use the information collected in the | ||||
| centralized solutions. The solution directions include: | ||||
| * Avoidance of centralized resolvers, and the introduction of | ||||
| sufficiently large number of resolvers (e.g., in ISP networks). | ||||
| * Improved practices, expectations, and contracts (e.g., [RFC8932], | ||||
| Mozilla's trusted recursive resolver requirements [MozTRR]) | ||||
| * Discovery mechanisms. These may enable a bigger fraction of DNS | ||||
| query traffic to move to encrypted protocols, and may also help | ||||
| distributed queries to different parties to avoid concentrating | ||||
| all information in one place. The IETF working group ADD is | ||||
| addressing these mechanisms. | ||||
| * Service distribution through making users employ several services | ||||
| such that only part of information is available in each service | ||||
| (e.g,, [I-D.arkko-abcd-distributed-resolver-selection]). | ||||
| * Splitting information generated by queries into parts that are | ||||
| handled by different parties in a way that either part is useless | ||||
| for data collection (unless the parties co-operate). Oblivious | ||||
| DNS ([Oblivious]) is an example of this. | ||||
| * Confidential computing mechanisms that set up technical boundaries | ||||
| for even service or server hardware owners to peek into the DNS | ||||
| resolver process (e.g., [PDoT] [I-D.arkko-dns-confidential]). For | ||||
| the base confidential computing technology, see, e.g., [CC] | ||||
| [CCC-Deepdive] [SGX] [Efficient] [Innovative] [Mem] | ||||
| [I-D.ietf-rats-architecture] [I-D.ietf-rats-eat]. | ||||
| Addressing the resiliency problems associated with centralization is | ||||
| harder. This further discussed in | ||||
| [I-D.arkko-arch-infrastructure-centralisation]. | ||||
| 2. Informative References | ||||
| [CC] Rashid, F.Y., "What Is Confidential Computing?", IEEE | ||||
| Spectrum, https://spectrum.ieee.org/computing/hardware/ | ||||
| what-is-confidential-computing , May 2020. | ||||
| [CCC-Deepdive] | ||||
| Confidential Computing Consortium, ., "Confidential | ||||
| Computing Deep Dive v1.0", | ||||
| https://confidentialcomputing.io/whitepaper-02-latest , | ||||
| October 2020. | ||||
| [Chautauquan] | ||||
| "The Chautauquan", Volume 3, Issue 9, p. 543 , June 1883. | ||||
| [Efficient] | ||||
| Suh, G.E., Clarke, D., Gasend, B., van Dijk, M., and S. | ||||
| Devadas, "Efficient memory integrity verification and | ||||
| encryption for secure processors", Proceedings. 36th | ||||
| Annual IEEE/ACM International Symposium on | ||||
| Microarchitecture, MICRO-36, San Diego, CA, USA, pp. | ||||
| 339-350, doi: 10.1109/MICRO.2003.1253207 , 2003. | ||||
| [I-D.arkko-abcd-distributed-resolver-selection] | ||||
| Arkko, J., Thomson, M., and T. Hardie, "Selecting | ||||
| Resolvers from a Set of Distributed DNS Resolvers", Work | ||||
| in Progress, Internet-Draft, draft-arkko-abcd-distributed- | ||||
| resolver-selection-01, 9 March 2020, | ||||
| <https://www.ietf.org/archive/id/draft-arkko-abcd- | ||||
| distributed-resolver-selection-01.txt>. | ||||
| [I-D.arkko-arch-infrastructure-centralisation] | ||||
| Arkko, J., "Centralised Architectures in Internet | ||||
| Infrastructure", Work in Progress, Internet-Draft, draft- | ||||
| arkko-arch-infrastructure-centralisation-00, 4 November | ||||
| 2019, <https://www.ietf.org/archive/id/draft-arkko-arch- | ||||
| infrastructure-centralisation-00.txt>. | ||||
| [I-D.arkko-dns-confidential] | ||||
| Arkko, J. and J. Novotny, "Privacy Improvements for DNS | ||||
| Resolution with Confidential Computing", Work in Progress, | ||||
| Internet-Draft, draft-arkko-dns-confidential-01, 10 March | ||||
| 2021, <https://www.ietf.org/archive/id/draft-arkko-dns- | ||||
| confidential-01.txt>. | ||||
| [I-D.arkko-farrell-arch-model-t-redux] | ||||
| Arkko, J. and S. Farrell, "Internet Threat Model | ||||
| Evolution: Background and Principles", Work in Progress, | ||||
| Internet-Draft, draft-arkko-farrell-arch-model-t-redux-01, | ||||
| 22 February 2021, <https://www.ietf.org/archive/id/draft- | ||||
| arkko-farrell-arch-model-t-redux-01.txt>. | ||||
| [I-D.iab-dedr-report] | ||||
| Arkko, J. and T. Hardie, "Report from the IAB Workshop on | ||||
| Design Expectations vs. Deployment Reality in Protocol | ||||
| Development", Work in Progress, Internet-Draft, draft-iab- | ||||
| dedr-report-01, 2 November 2020, | ||||
| <https://www.ietf.org/archive/id/draft-iab-dedr-report- | ||||
| 01.txt>. | ||||
| [I-D.ietf-dprive-dnsoquic] | ||||
| Huitema, C., Mankin, A., and S. Dickinson, "Specification | ||||
| of DNS over Dedicated QUIC Connections", Work in Progress, | ||||
| Internet-Draft, draft-ietf-dprive-dnsoquic-02, 22 February | ||||
| 2021, <https://www.ietf.org/archive/id/draft-ietf-dprive- | ||||
| dnsoquic-02.txt>. | ||||
| [I-D.ietf-rats-architecture] | ||||
| Birkholz, H., Thaler, D., Richardson, M., Smith, N., and | ||||
| W. Pan, "Remote Attestation Procedures Architecture", Work | ||||
| in Progress, Internet-Draft, draft-ietf-rats-architecture- | ||||
| 12, 23 April 2021, <https://www.ietf.org/archive/id/draft- | ||||
| ietf-rats-architecture-12.txt>. | ||||
| [I-D.ietf-rats-eat] | ||||
| Mandyam, G., Lundblade, L., Ballesteros, M., and J. | ||||
| O'Donoghue, "The Entity Attestation Token (EAT)", Work in | ||||
| Progress, Internet-Draft, draft-ietf-rats-eat-09, 7 March | ||||
| 2021, <https://www.ietf.org/archive/id/draft-ietf-rats- | ||||
| eat-09.txt>. | ||||
| [Innovative] | ||||
| Ittai, A., Gueron, S., Johnson, S., and V. Scarlata, | ||||
| "Innovative Technology for CPU Based Attestation and | ||||
| Sealing", HASP'2013 , 2013. | ||||
| [Mem] Henson, M. and S. Taylor, "Memory encryption: a survey of | ||||
| existing techniques", ACM Computing Surveys volume 46 | ||||
| issue 4 , 2014. | ||||
| [MozTRR] Mozilla, ., "Security/DOH-resolver-policy", | ||||
| https://wiki.mozilla.org/Security/DOH-resolver-policy , | ||||
| 2019. | ||||
| [Oblivious] | ||||
| Schmitt, P., "Oblivious DNS: Practical privacy for DNS | ||||
| queries", Proceedings on Privacy Enhancing Technologies | ||||
| 2019.2: 228-244 , 2019. | ||||
| [PDoT] Nakatsuka, Y., Paverd, A., and G. Tsudik, "PDoT: Private | ||||
| DNS-over-TLS with TEE Support", Digit. Threat.: Res. | ||||
| Pract., Vol. 2, No. 1, Article 3, | ||||
| https://dl.acm.org/doi/fullHtml/10.1145/3431171 , February | ||||
| 2021. | ||||
| [RFC1035] Mockapetris, P.V., "Domain names - implementation and | ||||
| specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, | ||||
| November 1987, <https://www.rfc-editor.org/info/rfc1035>. | ||||
| [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | ||||
| Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | ||||
| 2014, <https://www.rfc-editor.org/info/rfc7258>. | ||||
| [RFC7626] Bortzmeyer, S., "DNS Privacy Considerations", RFC 7626, | ||||
| DOI 10.17487/RFC7626, August 2015, | ||||
| <https://www.rfc-editor.org/info/rfc7626>. | ||||
| [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | ||||
| and P. Hoffman, "Specification for DNS over Transport | ||||
| Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | ||||
| 2016, <https://www.rfc-editor.org/info/rfc7858>. | ||||
| [RFC8324] Klensin, J., "DNS Privacy, Authorization, Special Uses, | ||||
| Encoding, Characters, Matching, and Root Structure: Time | ||||
| for Another Look?", RFC 8324, DOI 10.17487/RFC8324, | ||||
| February 2018, <https://www.rfc-editor.org/info/rfc8324>. | ||||
| [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS | ||||
| (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, | ||||
| <https://www.rfc-editor.org/info/rfc8484>. | ||||
| [RFC8932] Dickinson, S., Overeinder, B., van Rijswijk-Deij, R., and | ||||
| A. Mankin, "Recommendations for DNS Privacy Service | ||||
| Operators", BCP 232, RFC 8932, DOI 10.17487/RFC8932, | ||||
| October 2020, <https://www.rfc-editor.org/info/rfc8932>. | ||||
| [SGX] Hoekstra, M.E., "Intel(R) SGX for Dummies (Intel(R) SGX | ||||
| Design Objectives)", Intel, | ||||
| https://software.intel.com/content/www/us/en/develop/ | ||||
| blogs/protecting-application-secrets-with-intel-sgx.html , | ||||
| September 2013. | ||||
| Author's Address | ||||
| Jari Arkko | ||||
| Ericsson | ||||
| Email: jari.arkko@ericsson.com | ||||
| End of changes. 1 change blocks. | ||||
| lines changed or deleted | lines changed or added | |||
This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||