Internet DRAFT - draft-rintaro-eds
draft-rintaro-eds
Network Working Group R. Kobayashi
Internet-Draft Hyogo Prefectural Ono High School
Expires: December 3, 2021 June 1, 2021
Effective DNS Service
draft-rintaro-eds-00
Abstract
In DNS Queries over HTTPS [RFC8484], the port that communicates with
DNS would change from UDP to TCP 443. This change causes a new
problem that makes it difficult to identify which is the name
resolution request, so it is difficult to use web filtering, parental
controls and so on. Furthermore, a user-agent in a HTTP header that
is necessary for HTTPS communications could be a data used to track
users. In summary, DNS Queries over HTTPS has some problems that
affect users' security and privacy. This draft proposes a system
that is set mediation servers between client side and DNS servers.
With this proposal, it is expected that those two problems will be
solved.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on December 3, 2021.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
Kobayashi Expires December 3, 2021 [Page 1]
Internet-Draft Effective DNS Service June 2021
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 2
2. Proposed Solution . . . . . . . . . . . . . . . . . . . . . . 3
2.1. The structure of Effective DNS Service . . . . . . . . . 3
2.2. Web filtering . . . . . . . . . . . . . . . . . . . . . . 3
3. Additional Considerations . . . . . . . . . . . . . . . . . . 4
3.1. Safety EDS and Third-party EDS . . . . . . . . . . . . . 4
3.2. EDS Certification system . . . . . . . . . . . . . . . . 4
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 4
5. Security Considerations . . . . . . . . . . . . . . . . . . . 4
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
6.1. Normative References . . . . . . . . . . . . . . . . . . 4
6.2. Informative References . . . . . . . . . . . . . . . . . 5
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction
In Effective DNS Service, there is a new server that mediates between
client side and DNS servers. Between client side and mediation
servers (hereinafter called EDS server) is HTTPS encryption. The
FQDN posted from client side is analyzed in an EDS server. After
analyzing in the EDS server, when the FQDN posted from client side is
matched with the FQDN that is blacklisted, EDS server does not send a
DNS request, and is returned to client side with a 403 Error and
error messages. If the FQDN is not blacklisted, EDS server starts to
communicate with the EDS server by using DNS over HTTPS. In
consequence, we can set web filtering by using EDS. Moreover, it is
impossible to track user by user-agent because all EDS servers use
the same user-agent.
1.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Many of the specialized terms used in this specification are defined
in DNS Terminology [RFC7719].
Kobayashi Expires December 3, 2021 [Page 2]
Internet-Draft Effective DNS Service June 2021
2. Proposed Solution
2.1. The structure of Effective DNS Service
DNS servers
| |
,''''''''''''''''''''''|'|'''''''''''''''''''''''`.
| Effective DNS Service server (EDS server) |
| .......................... |
| :Web Filtering (Optional): |
| : +----------+ : |
| : | Black | : |
| : | List | : |
| : +----------+ : |
| :...........|.|..........: |
| | | |
`'''''''''''''''''''''|'|'''''''''''''''''''''''''
Client side
We can realize fast Internet connections because the number of
servers is not limited. I accessed the local DNS server and measured
the response time by using w/- - write-out. The total response time
was 0.2 sec. However, the total response time of the Heroku server
in the United States was 1.2 sec. Therefore, the response time is
dependant on the location of the EDS server, so EDS servers need to
be dispersed widely across the world.
2.2. Web filtering
I tested the web-filtering feature in EDS. First, I created an array
that has FQDN needs to block. This array is as a blacklist. Second,
when the FQDN is posted from client side, check whether the FQDN is
blacklisted or not. Then, make a judgement on starting communication
with DNS server or returning a 403 Error.
//Node.js v14
//[example: web filtering black list]
const blacklist = ["www.example.com", "www.rintaro.tech"]
if (blacklist.includes(FQDN) == false) {
res.send(kakunouko);
console.log(kakunouko);
}else{
res.status(403);
res.send({code: 403, error: "EDS sever blocked DNS request because
the FQDN was blacklisted."})
console.log(403)
Kobayashi Expires December 3, 2021 [Page 3]
Internet-Draft Effective DNS Service June 2021
3. Additional Considerations
3.1. Safety EDS and Third-party EDS
EDS server should be a distributed system and EDS servers should be
set in many countries. These EDS servers are managed by a
professional organization directly, and being officially certified by
this organization as "Safety EDS". The closest EDS server is set as
the default EDS server on browsers, and Safety EDS servers are
secured by the organization. By protecting some EDS servers with an
official organization, we can assure users' security. To stand up to
the crush of demand, all EDS servers are based on AnyCast. In
addition to Safety EDS, users can create independent EDS servers as
"Third-party EDS". Every EDS server must have "EDS certificate" for
a safe connection.
3.2. EDS Certification system
There are two institutions: PA and CA that manage EDS certification.
An owner applies for certification to PA, and PA also applies it to
CA. CA will issue the certification, and they store it in a
repository. The users check the server's certification, and verify
the validity by using the repository. By these structures that is
similar to SSL certification, we can run this system much more
safely.
4. IANA Considerations
This document has no IANA actions.
5. Security Considerations
Effective DNS Service also uses HTTPS. This mitigates classic
amplification attacks for UDP-based DNS. [RFC8484]
About Third-party EDS, the security of connection will be depend on
owners' skills. If these servers are for an unspecified large number
of people, the feature that users can report the server to a
certification organization will be needed.
6. References
6.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
Kobayashi Expires December 3, 2021 [Page 4]
Internet-Draft Effective DNS Service June 2021
[RFC7719] Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS
Terminology", RFC 7719, DOI 10.17487/RFC7719, December
2015, <https://www.rfc-editor.org/info/rfc7719>.
6.2. Informative References
[RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS
(DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018,
<https://www.rfc-editor.org/info/rfc8484>.
Author's Address
Rintaro Kobayashi
Hyogo Prefectural Ono High School
518 Nishihommachi-cho
Ono city, Hyogo 6751375
Japan
Email: k.rintaro1@icloud.com
URI: https://www.rintaro.tech
Kobayashi Expires December 3, 2021 [Page 5]