OARC 28 (San Juan)

America/Puerto_Rico
209-BC (Centro de Convenciones de Puerto Rico)

209-BC

Centro de Convenciones de Puerto Rico

100 Calle Guamaní San Juan 00907 Puerto Rico
Keith Mitchell (DNS-OARC), Ray Bellis (Internet Systems Consortium, Inc.)
Description

 

DNS-OARC is traveling to San Juan, Puerto Rico for its 28th Workshop!

DNS-OARC is a non-profit, membership organization that seeks to improve the security, stability, and understanding of the Internet's DNS infrastructure. Part of these aims are achieved through workshops.

The workshops are open to OARC members and to all other parties interested in DNS operations and research, with attendees from ICANN61 particularly welcome this time around - as OARC 28 takes place just before this in the same venue. Attendance is free for OARC Members and Sponsors. There are charges for other attendees and late registrations.

We are thankful to our Host and sponsors for supporting OARC 28.


HOST

ICANN


SOCIAL EVENT

Salesforce     DNS-OARC


 

Jabber: xmpp:dns-operations@conference.dns-oarc.net

Webcast: https://plus.google.com/+DnsoarcNetPlus

 

 

Twitter hashtag: #OARC28

Sponsors: We have various sponsor opportunities for OARC workshops.

If your organization is interested in sponsoring OARC workshops, please see our Sponsor Benefits or e-mail sponsor@dns-oarc.net for more information.

DNS-OARC Conduct Policy
Participants
  • Adiel Akplogan
  • Alejandro Acosta
  • Alexandra Kulikova
  • Anand Buddhdev
  • Andrew Sullivan
  • Artem Gavrichenkov
  • Baher Esmat
  • Barry Greene
  • Bill Snow
  • Brad Verd
  • Brian Conry
  • Brian Hartvigsen
  • Brian Somers
  • Carl Clements
  • Cathy Petersen
  • Christian Petrasch
  • Daniel Hanks
  • Darren Kara
  • Dave Knight
  • David Lawrence
  • David Soltero
  • Denesh Bhabuta
  • Dmitry Kohmanyuk
  • Dominic Marks
  • Duane Wessels
  • Eduardo Duarte
  • Edward Han
  • Erwin Lansing
  • Francisco Arias
  • Frederico Augusto de Carvalho Neves
  • Geoff Huston
  • Gonzalo ROMERO
  • Herbert Faleiros
  • Jaap Akkerhuis
  • Jacob Zack
  • Jacques Latour
  • James Mitchell
  • James Richards
  • Jan Horak
  • Jaromír Talíř
  • Jeff Herman
  • JEFFREY OSBORN
  • Jerry Lundström
  • Jianfang Xiao
  • Joao Luis Silva Damas
  • Joe Abley
  • Joe Crowe
  • John Crain
  • Jorge Cano
  • Jurong Li
  • Karl Reuss
  • Kazunori Fujiwara
  • Keith Mitchell
  • Ken Hansen
  • Larry Campbell
  • Laura Roberts
  • Liam Hynes
  • Manu Bretelle
  • Manuel Godoy
  • Martin Hoffmann
  • Mats Dufberg
  • Matt Larson
  • Matt Weinberg
  • Matthew Pounsett
  • Mauricio Vergara Ereche
  • Merike Kaeo
  • Michele Neylon
  • Miles McCredie
  • Mingkai Zhang
  • Nathanael Jean-Francois
  • Norm Ritchie
  • Ondrej Sury
  • Pallavi Aras
  • Patrick Jones
  • Paul Hoffman
  • Paul Schmitt
  • Paul Wouters
  • Peter DeVries
  • Peter Janssen
  • Peter Koch
  • Petr Špaček
  • Piet Barber
  • Qi Zhao
  • Ralf Weber
  • Ralph Dolmans
  • Ray Bellis
  • Robert Edmonds
  • Robert Martin-Legene
  • Robert Tate
  • Roger Murray
  • Roy Arends
  • Rubens Kuhl
  • Samuel Weiler
  • Shane Kerr
  • Shumon Huque
  • Steven Carr
  • Susan Graves
  • Suzanne Woolf
  • Tim April
  • Ulrich Wisser
  • Vicky Risk
  • Vincent Levigneron
  • Warren Kumari
  • Wes Hardaker
  • Yuedong Zhang
Support - Help
  • Thursday, March 8
    • 8:30 AM 9:30 AM
      Registration 1h 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico

      OARC Members Only

    • 9:30 AM 11:00 AM
      OARC Business 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Mr Keith Mitchell (DNS-OARC)
      • 9:30 AM
        Introduction from OARC Chairman 5m
        Speakers: Duane Wessels (Verisign), Mr Keith Mitchell (DNS-OARC)
        Slides
      • 9:35 AM
        OARC Status Report 30m
        Speaker: Mr Keith Mitchell (DNS-OARC)
        Slides
      • 10:05 AM
        OARC Software Update 20m
        Speaker: Mr Jerry Lundström (DNS-OARC)
        Slides
      • 10:25 AM
        OARC Systems Update 20m
        Speaker: Mr Keith Mitchell (DNS-OARC)
        Slides
      • 10:45 AM
        OARC Governance Update/Discussion 15m
        A chance to update OARC Members on governance developments with OARC Board representation since the AGM, and a chance for any feedback/discussion.
        Speakers: Duane Wessels (Verisign), Mr Keith Mitchell (DNS-OARC)
        Document
        Slides
    • 11:00 AM 11:30 AM
      Morning Coffee Break 30m 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
    • 11:30 AM 12:30 PM
      Public Workshop: Operations and Infrastructure 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Ralph Dolmans (NLnet Labs)
      • 11:30 AM
        DNS infrastructure at Facebook 30m
        At Facebook, we leverage the DNS for multiple purpose, internally, we use it to access servers via hostnames, service discovery and load balancing. Externally, our authoritative nameservers are helping us in steering the traffic of the people using our products to a point of presence that will provide them with the best experience. With constant churn in our infrastructure, cluster coming up and down, machines being re-provisioned, traffic patterns, maintenances, capacity and potential outages, keeping DNS mapping up to date, accurate and with minimal to no operator intervention is challenging, so it is to ensure consistent and fast distribution of those maps across our fleet of DNS servers. This talk will explain how we have set up a pipeline that, by leveraging multiple simple and self contained components, open-source software and some python glue, keeps our DNS mapping up to date across all our nameservers.
        Speaker: Mr Manu Bretelle (Facebook)
        Slides
      • 12:00 PM
        Disappearing Choice of Recursive DNS Services in Home Networks 30m
        Virtually all client devices in homes connected to the Internet obtain recursive DNS server settings automatically. A home LAN can be expected to provide DHCP service, and DHCP can be expected to provide DNS servers that provide some minimal baseline of DNS service. While many Internet users are completely unaware of the critical service that the DNS provides, a technically savvy user capable of making an informed choice of recursive DNS providers frequently encounters friction actually making that choice due to two factors: 1) Some client operating systems make it impossible to override the DNS server settings obtained from DHCP. For instance, Android does not allow obtaining IP address assignments from DHCP while using static, user chosen DNS servers. 2) The gateway device that provides the DHCP server for the home is increasingly not a retail off-the-shelf appliance, but a device leased from the ISP that runs firmware approved by the ISP. Large ISPs in particular appear to be restricting or removing the ability for the subscriber to configure the DNS server settings in the gateway devices that they provide to customers. That is, this functionality *only* appears to be disappearing from ISP-branded hardware, not from retail gateway devices, which have retained this basic customization feature continuously since they first appeared on the market. This presentation will mainly focus on the second factor, because even if all client devices supported manual DNS server configuration, it would be very tedious to statically configure every device in one's home, and tedium is a form of friction. Are there workarounds for the technically savvy user? Yes, but there are tradeoffs in terms of extra expenses or technical quality. For instance, any technical workaround that requires purchasing additional hardware is a workaround that is unavailable to users who cannot afford that additional expense. Why are some ISPs doing this? Are there arguably legitimate security reasons for this? Can/should these ISPs be convinced to stop in the interest of consumer choice?
        Speaker: Robert Edmonds (Fastly, Inc.)
        Slides
    • 12:30 PM 2:00 PM
      Lunch 1h 30m 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
    • 2:00 PM 4:00 PM
      Public Workshop: DNSSEC 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Robert Edmonds (Fastly, Inc.)
      • 2:00 PM
        DNSSEC for a Complex Enterprise Network 30m
        This talk will give an overview of our planning and efforts so far to deploy DNSSEC for a large enterprise with a complex infrastructure, involving the services of several managed DNS providers. It will start by outlining our specific requirements and design choices (e.g. signing algorithms, authenticated denial mechanisms, signing of dynamically generated records, key rollover schedules, scaling and performance considerations, etc.). Many prominent managed DNS providers have significant limitations in the extent of their DNSSEC support. We will survey DNSSEC capabilities in several of the managed DNS providers, pointing out where they excel, and where they fall short, based on testing we've performed. We will discuss relevant discussions with the vendors and the status of several feature enhancement requests that we've made. A key challenge is the requirement for supporting multiple distinct DNS providers simultaneously, which further complicates the planned implementation, and we will outline several strategies around this. One additional desired goal of this talk is to stimulate a community discussion of what capabilities need to be widely available in DNS providers for successful DNSSEC deployment at many large enterprises.
        Speakers: Pallavi Aras (Salesforce), Shumon Huque (Salesforce)
      • 2:30 PM
        Measuring Efficiency of Aggressive Use of DNSSEC-Validated Cache (RFC 8198) 30m
        In this presentation we will analyze data from real recursors to quantify impact of RFC 8198 on real traffic. Was is worth the effort, or is it waste of energy to implement it?
        Speaker: Mr Petr Špaček (CZ.NIC)
        Slides
      • 3:00 PM
        The Curious Case of the Crippling DS record 30m
        When a DNSSEC Key Signing Key (KSK) is rolled, the Delegation Signer (DS) records in the parent are updated as well. A DS record contains the "Digest Type" used to produce the digest over the KSK. Care must be taken when "rolling" the digest type during a KSK roll. It may well cause the entire zone to become bogus. My presentation will show how a Top Level Domain went unreachable due to an obscure requirement in the standard and will show inconsistencies between validator implementations.
        Speaker: Roy Arends (ICANN)
        Slides
      • 3:30 PM
        Negative Trust Anchors 30m
        This presentation will go over some of the issues and basic processes that happen at a large ISP in regards to implementing Negative Trust Anchors. This will include going over: - How to determine DNSSEC is broken. - Determine severity of allowing failed site to stay in state - Process on when to put in an NTA - Basic automation efforts around implementation of NTA
        Speaker: Mr Joseph Crowe (Comcast)
        Slides
    • 4:00 PM 4:30 PM
      Afternoon Coffee Break 30m 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
    • 4:30 PM 5:30 PM
      Public Workshop: Software 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Anand Buddhdev (RIPE NCC)
      • 4:30 PM
        BIND 9 Past, Present, and Future 30m
        BIND 9 is now 17 years old, the latest stable version 9.12 was releases in December and the BIND 9 Team has adopted changes to adapt to the ever change Internet landscape.
        Speaker: Mr Ondrej Sury (Internet Systems Consortium)
        Slides
      • 5:00 PM
        There is always time for DNS 30m
        # Background Over the last two years I've been working on reducing the duplicated code that exists between OARC software. This created a bunch of helper libraries, code that can be added as a git submodule to each software, to handle PCAPs, config files and more. These libraries also helped creating drool, DNS Replay Tool, and whatever functionality that was missing got added and more helper libraries was created. # Problems While developing drool I ran into a rather tricky problem, how do you easily configure different scenarios such as read from PCAP A and send to target B but also target C and maybe only for some queries or copies... and so on. In the long run the configure language would more or less become a script language. I have also not been so happy about the dynamic loadable plugins design in dnscap, they are not easy for anyone to make and a bit of a hassle to package. Thoughts here have been to replace it with some integration to some kind of script engine. # Solution(?) Many other DNS and packet generating software are using Lua in some form so I took a week to try it out and see if I could put a script engine in drool to tie together all the components. This gave birth to **dnsjit**! And I will present more details on how it works and what the future plans.
        Speaker: Mr Jerry Lundström (DNS-OARC)
        Slides
    • 7:00 PM 9:00 PM
      OARC 28 Social Event Offsite

      Offsite

      Venue details provided to registered delegates. OARC 28 Delegate Badge required to attend the social event.

      Venue details provided to registered delegates. OARC 28 Delegate Badge required to attend the social event.

    • 9:00 AM 9:30 AM
      Registration 30m 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
    • 9:30 AM 11:00 AM
      Public Workshop: Key Rolling 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Shumon Huque (Salesforce)
      • 9:30 AM
        Update on root KSK rollover (or, We're really doing it this time) 30m
        After the root KSK roll originally intended for 11 October 2017 was postponed because of newly available trust anchor data reported by RFC 8145-capable resolvers, ICANN undertook an investigation to better understand that data and develop a plan for going forward. ICANN has collected community feedback and will publish that plan in early February. This presentation covers ICANN's findings regarding the RFC 8145 resolver data as well as next steps, and offers an important venue for ICANN to collect additional community feedback from DNS-OARC members and workshop attendees.
        Speaker: Matt Larson (ICANN)
        Slides
      • 10:00 AM
        KSK Sentinel 30m
        The KSK Roll is coming -- but we still don't have good visibility into what the effects will be. KSK Sentinel (draft-ietf-dnsop-kskroll-sentinel) provides a way to measure what the **user** effect will be (and also allows mass measurement, using ads).
        Speaker: Warren Kumari (N/A)
        Slides
      • 10:30 AM
        Testing Resolver Implementations of RFC 5011 for the Root KSK Roll 30m
        As part of the assessment of the risk of rolling the root zone’s KSK, Verisign commissioned us to performe tests of the implementation of RFC 5011 support in past and present releases of the three open source DNS resolvers Unbound, Bind, and Knot Resolver with regards to the possible sequences of the roll of the root trust anchor. They kindly allowed us to share our findings. The presentation will first show our methodology—we used CZnic’s Deckard to simulate the full time period of a key roll—and the various scenarios we tested, covering both successful key rolls and possible aborts after starting, as well as typical operational occurrences such as installation after the key roll started, resolver restarts during the roll, or non-writeable state directories. It will then discuss our findings for each of the resolvers and show how their RFC 5011 support developed over the various releases. As a conclusion, we will try to assess what these findings may mean for the success of a root KSK roll.
        Speaker: Mr Martin Hoffmann (Open Netlabs BV)
        Slides
    • 11:00 AM 11:30 AM
      Morning Coffee Break 30m 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
    • 11:30 AM 12:30 PM
      Public Workshop: Measurement 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Mr Piet Barber (Verisign)
      • 11:30 AM
        Identifying DNS Open Resolvers in IPv6 15m
        *Introduction* As all of you know, having DNS servers considered Open Resolvers is very negative, both for those who leave the service open, for the Internet and for online security. To read about Open Resolvers I recommend reading this link: https://www.certsi.es/blog/dns *Identifying a DNS Open Resolvers in IPv6 (open DNS servers)* Identifying Open Resolvers servers or open DNS servers in the world of IPv4 is easy, due to the short length of the IPv4 space (2 ** 32) it is relatively easy to run check every IP. In the world of IPv6 it is virtually impossible to verify each IP address, I mean, to test IP by IP. If we try this test can last thousands of years *How is a DNS Open Resolver identified?* A recursive DNS server should only answer queries to its own clients (yes, there are few exceptions) and should reject any other. For example, the DNS servers of the ACME ISP should only respond to queries from their own clients, to no one else. Our test consist in querying a domain name (such as www.lacnic.net) to a list of DNS servers, if the DNS server responds with a response then it is considered Open Resolver, if it returns a rejection (Query refused) or simply timed out it is not an Open Resolver. *How we find the list IPv6 resolvers?* Lacnic manages a server that can be called: Reverse Root Server, specifically the letter "D", that is, d.ip6-servers.arpa. Many queries looking information for reverse DNS goes throughout this server, in general this server ONLY receives queries from DNS servers. This is where they get IPv6 addresses from DNS queries. Since this server does not allow recursion every IP that queries this device can be considered a resolver. *Procedure & Algorithm:* .- In the server, we captured over 2.5 millions packets. We captured only v6 packets, filtered by port 53 and destined only to the IP address of the server. .- Malformed packets, errors, etc. were discarded. .- From the IPv6 addresses obtained in step 2 a list of unicast IP addresses is created (that is, duplicates are deleted) .- Finally we got a list of over 800.000 resolvers (not Open resolvers yet) A python script takes each IPv6 address from the list gotten in item 4, and queries the FQDN www.lacnic.net, verifies recursion and the status of the response. In the case of an Open Resolver, the IP is registered .- Some manual verification is also performed, I mean, we take some results (text file) and manually check the results. *What is going to be shown* In case this paper is accepted for presentation we are going to show some this mechanism accompanied with some results & statistics *Similar publications* https://labs.ripe.net/Members/luuk_hendriks/finding-open-dns-resolvers-on-ipv6 Partial raw data: http://stats.labs.lacnic.net/BORRAR-v6-resolvers.txt
        Speaker: Mr Alejandro Acosta (LACNIC)
        Slides
      • 11:45 AM
        Using DITL data to look at leaked queries 30m
        The DITL data collected at DNS-OARC can be used for a variety of research. Here, I analyze QNAMEs in queries to the roots during the DITL 2017 to look at the prevalence of collisions for strings from earlier collision studies (such as "corp" and "home") as well as leakage from TLDs that are not expected to be in the root zone at all. This required looking at the entire dataset, collecting just the QNAMEs, sampling for likely leaked TLDs, and then ranking the data to show which TLDs that were not in the root zone were most commonly seen in the dataset. In order to do this research, DNS-OARC set up a new server and I created new software to efficiently sample the data. The DITL data cannot be moved from DNS-OARC systems, and because looking at the QNAMEs is quite space-intensive, tradeoffs had to be made in the analysis. I describe that software (which has been published) and show how it can be used by other researchers who are using DNS-OARC systems to analyze various DITL data. As a complement to the DITL-based research, I ran similar tests on L-root data kept at ICANN. In this research, I found some significant leaks that appear much more often during DITL than at other times. I show that L-root data can be used as a reasonable substitute for DITL data for some research, and suggest that data from other root servers might also be used in this fashion.
        Speaker: Paul Hoffman (ICANN)
        Slides
      • 12:15 PM
        Field measurement of Anycast DNS root traffic delivery 15m
        Using queries issued by our test environment targetted at the root servers we analyse DNS traffic observed at the resolver used by the client, the anycast nodes at which the queries arrived and correlate this to the geographical location of the originating client to analyse the effectiveness of the routing system in delivering traffic to the closest Anycast node. As a by-product we take a casual, but quantitative, look at the various undelegated TLDs in use by the client's environment DNS environment.
        Speakers: Mr Geoff Huston (APNIC), Mr Joao Luis Silva Damas (Bond Internet Systems)
        Slides
    • 12:30 PM 2:00 PM
      Lunch 1h 30m 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
    • 1:15 PM 1:55 PM
      PGP Key Signing Session 40m 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Speaker: Matthew Pounsett
      keyring
    • 2:00 PM 3:00 PM
      Public Workshop: Protocol Development 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Ralph Dolmans (NLnet Labs)
      • 2:00 PM
        Additional Truncated Response 30m
        Recently, L. Song, 宋林健, of BII proposed the use of Additional Truncated Responses (draft-song-atr-large-resp-00) as way to improve resolution success rates for clients in the presence of large DNS responses. We are using our large distributed measurement platform to evaluate the effect of the proposed behaviour by implementing a modified DNS server that implements ATR behaviour. This talk will present our findings.
        Speakers: Mr Geoff Huston (APNIC), Mr Joao Luis Silva Damas (Bond Internet Systems)
        Slides
      • 2:30 PM
        Evaluation and consideration of multiple responses 15m
        Three drafts proposed authoritative servers to respond additional resource records to pre-populate resolvers' cache. The author made an authoritative server patch to add additional A/AAAA/NSEC RR in additional section when the server receives A or AAAA query. This talk reports evaluation result of multiple responses and considerations. It contains brief introduction of multiple response proposals, experimental authoritative server implementation, experiment setup, experiment result of BIND 9, Unbound, Knot Resolver. It also discusses the effectiveness of multiple response drafts.
        Speaker: Mr Kazunori Fujiwara (Japan Registry Services Co., Ltd)
        Slides
      • 2:45 PM
        ODNS: Oblivious DNS 15m
        It is well known that DNS leaks information that an Internet user may want to keep private, such as the websites she is visiting, user identifiers, MAC addresses, and the subnet in which she is located. This information can be visible to a 3rd party eavesdropping on the communication between a client and a recursive resolver, or even between a recursive resolver and an authoritative server. As this information is sent to each DNS server, DNS operators can also see clients’ information. While there has been some previous work on increasing privacy in DNS infrastructure, such as DNS Query Name Minimization and DNS-Over-TLS, these approaches do not fully solve the problem. Both of these are steps in the right direction, but neither prevent DNS operators from learning information which domains specific users are interested in. Our work is concerned with a powerful adversary that has the capabilities to: 1) eavesdrop on communications between clients and recursive resolvers, and between recursive resolvers and authoritative name servers, 2) request data (via subpoena/warrant) from any number of DNS operators, 3) maliciously access data at any DNS server. To address this type of attacker, we present Oblivious DNS (ODNS), which is a new design of the DNS ecosystem that allows current DNS servers to remain unchanged and increases privacy for data in motion and at rest. In the ODNS system, both the client is modified with a local resolver, and there is a new authoritative name server for .odns. To prevent an eavesdropper from learning information, the DNS query must be encrypted; the client generates a request for www.foo.com, generates a session key k, encrypts the requested domain, and appends the TLD domain .odns, resulting in {www.foo.com}k.odns. The client forwards this, with the session key encrypted under the .odns authoritative server’s public key ({k}PK) in the “Additional Information” record of the DNS query to the recursive resolver, which then forwards it to the authoritative name server for .odns. The authoritative server decrypts the session key with his private key, and then subsequently decrypts the requested domain with the session key. The authoritative server then forwards the DNS request to the appropriate name server, acting as a recursive resolver. While the name servers see incoming DNS requests, they do not know which clients they are coming from; additionally, an eavesdropper cannot connect a client with her corresponding DNS queries. As this is ongoing work, we have some future work to continue in this direction. We are starting to implement a prototype of ODNS to evaluate its feasibility; additionally, we plan to measure its performance overhead in comparison to current DNS performance. Our prototype will also provide a way to evaluate the design’s security and performance.
        Speakers: Annie Edmundson (Princeton University), Paul Schmitt (Princeton University)
        Slides
    • 3:00 PM 3:30 PM
      Afternoon Coffee Break 30m 209-BC Foyer

      209-BC Foyer

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
    • 3:30 PM 4:30 PM
      Public Workshop: Privacy 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Shumon Huque (Salesforce)
      • 3:30 PM
        The Effect of DNS on Tor’s Anonymity 30m
        Previous attacks that link the sender and receiver of traffic in the Tor network ("correlation attacks") have generally relied on analyzing traffic from TCP connections. The TCP connections of a typical client application, however, are often accompanied by DNS requests and responses. This additional traffic presents more opportunities for correlation attacks. Our work quantifies how DNS traffic can make Tor users more vulnerable to correlation attacks. We investigate how incorporating DNS traffic can make existing correlation attacks more powerful and how DNS lookups can leak information to third parties about anonymous communication. We (i) develop a method to identify the DNS resolvers of Tor exit relays; (ii) develop a new set of correlation attacks (DefecTor attacks) that incorporate DNS traffic to improve precision; (iii) analyze the Internet-scale effects of these new attacks on Tor users; and (iv) develop improved methods to evaluate correlation attacks. First, we find that there exist adversaries that can mount DefecTor attacks: for example, Google's DNS resolver observes almost 40% of all DNS requests exiting the Tor network. We also find that DNS requests often traverse ASes that the corresponding TCP connections do not transit, enabling additional ASes to gain information about Tor users' traffic. We then show that an adversary that can mount a DefecTor attack can often determine the website that a Tor user is visiting with perfect precision, particularly for less popular websites where the set of DNS names associated with that website may be unique to the site. We also use the Tor Path Simulator (TorPS) in combination with traceroute data from vantage points co-located with Tor exit relays to estimate the power of AS-level adversaries that might mount DefecTor attacks in practice.
        Speaker: Laura Roberts (Princeton University)
        Slides
      • 4:00 PM
        Analyzing and Mitigating Privacy with the DNS Root Service 30m
        Processing of all DNS requests start at the root of the DNS tree and make use of either cached data from previous requests, or by traversing the DNS tree for the missing information. When \emph{QNAME minimization} is not in use, queries forwarded to the parental nodes in the DNS tree may leak private DNS query data. In this paper we examine 31 days during the month of January 2017 of queries sent from two recursive resolvers placed in two residential networks to the DNS root server operated by \isi's, analyzing the leaked QNAMEs for an impact on the network's privacy. We then compare a few DNS privacy preserving techniques against the privacy analysis against these networks.
        Speaker: Wes Hardaker (USC/ISI)
        Slides
    • 4:30 PM 5:30 PM
      Lightning Talks 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Anand Buddhdev (RIPE NCC)
      • 4:30 PM
        Algorithm Rollover what is the safest approach 10m
        Speaker: Mr Frederico Augusto de Carvalho Neves (Nic.br)
        Slides
      • 4:40 PM
        DITL Anonymization 10m
        Speaker: Paul Hoffman (ICANN)
        Slides
      • 4:50 PM
        BIND testing with Meltdown Spectre 10m
        Results of testing different versions of BIND with Meltdown / Spectre patches installed on Redhat 7 servers.
        Speaker: Peter DeVries (Quotient Inc)
        Slides
      • 5:00 PM
        Processing DITL data quickly at USC/ISI 10m
        I can present either screenshots or a live demo about how we process B-Root specific DITL data with infrastructure at USC/ISI. I'll describe the format we store data in, how it enables us to rapidly perform analysis on it, and how we can do bulk processing of DNS requests after it has been converted to our textual saved format.
        Speaker: Wes Hardaker (USC/ISI)
        Slides
      • 5:10 PM
        gTLD Name Collisions 2012, next round 10m
        [See attached PPTX]
        Speaker: Mr Rubens Kuhl (NIC.br)
        Slides
      • 5:20 PM
        EDNS Compliance - Deprecating workarounds 10m
        The major open-source DNS server vendors has a plan to deprecate workarounds for broken EDNS implementations in servers. In this lightning talk, we (CZ.NIC, ISC, PowerDNS, NLnet Labs) will announce our plan to remove the workarounds from our DNS servers.
        Speakers: Mr Ondrej Sury (Internet Systems Consortium), Mr Petr Špaček (CZ.NIC), Ralph Dolmans (NLnet Labs)
        Slides
    • 5:30 PM 5:40 PM
      Close 209-BC

      209-BC

      Centro de Convenciones de Puerto Rico

      100 Calle Guamaní San Juan 00907 Puerto Rico
      Convener: Mr Keith Mitchell (DNS-OARC)