{"id":2842,"date":"2016-02-09T17:51:20","date_gmt":"2016-02-09T17:51:20","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2842"},"modified":"2020-05-06T10:30:05","modified_gmt":"2020-05-06T17:30:05","slug":"ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/","title":{"rendered":"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)"},"content":{"rendered":"<p>In the previous blog on DNS privacy, we covered how the current DNS does not provide for any confidentiality of queries or responses.\u00a0 Pervasive Monitoring (PM) of clear-text DNS messages can reveal a great deal about a client.\u00a0 With a heightened awareness of Pervasive Monitoring, there is a sincere desire to preserve user\u2019s personal privacy when using DNS over the Internet.\u00a0 In this blog we will cover the work being done within the IETF to help mitigate the DNS privacy issues.<\/p>\n<h2 id=\"toc-hId-649848730\">IETF Work on DNS Privacy<\/h2>\n<p>The IETF is actively working on DNS privacy and confidentiality solutions.\u00a0 The IETF has formed a\u00a0<a href=\"https:\/\/datatracker.ietf.org\/wg\/dprive\/documents\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS PRIVate Exchange<\/a>\u00a0(dprive) working group.\u00a0 DNS privacy topics are also covered by the\u00a0<a href=\"https:\/\/datatracker.ietf.org\/wg\/dnsop\/documents\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS Operations<\/a>\u00a0(dnsop) working group.\u00a0 There is also an\u00a0<a href=\"https:\/\/mailarchive.ietf.org\/arch\/search\/?email_list=dns-privacy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IETF mailing list<\/a>\u00a0specifically for discussions about DNS Privacy (<a href=\"mailto:dns-privacy@ietf.org\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">dns-privacy@ietf.org<\/a>).\u00a0 You can subscribe to the mailing list\u00a0<a href=\"https:\/\/www.ietf.org\/mailman\/listinfo\/dns-privacy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.\u00a0 The archives for this mailing list can be found\u00a0<a href=\"http:\/\/www.ietf.org\/mail-archive\/web\/dns-privacy\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n<p>One of the primary IETF RFCs on this topic is DNS Privacy Considerations (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7626\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7626<\/a>).\u00a0 This RFC originally started as a\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/draft-bortzmeyer-dnsop-dns-privacy-02\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">draft<\/a>\u00a0authored by St\u00e9phane Bortzmeyer (AFNIC) which came out of the dnsop working group (but then it changed into a\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/draft-ietf-dprive-problem-statement-06\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">problem statement<\/a>,\u00a0which then became an RFC).\u00a0 This DNS Privacy RFC offers a good overview of the issues at hand and hints at some of the possible solutions.\u00a0 Another draft, albeit expired, that covered some of these same topics of monitoring DNS traffic is titled \u201c<a href=\"https:\/\/tools.ietf.org\/html\/draft-koch-perpass-dns-confidentiality-00\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Confidentiality Aspects of DNS Data, Publication, and Resolution<\/a>\u201d.<\/p>\n<h2 id=\"toc-hId-678477881\">Client Subnet in DNS Queries<\/h2>\n<p>Most DNS queries use UDP,\u00a0<a href=\"http:\/\/www.networkworld.com\/article\/2231682\/cisco-subnet\/cisco-subnet-allow-both-tcp-and-udp-port-53-to-your-dns-servers.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">but sometimes TCP<\/a>\u00a0can be used, when the query response is large for example.\u00a0 This choice is also influenced by the availability of\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Extension_mechanisms_for_DNS\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EDNS0<\/a>.\u00a0 Thus, another IETF draft germane to the discussion about DNS privacy is \u201c<a href=\"https:\/\/tools.ietf.org\/html\/draft-ietf-dnsop-edns-client-subnet-06\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Client Subnet in DNS Queries<\/a>\u201d.\u00a0 This draft proposal intends to include a masked IP address of the originating DNS client within the DNS query and place it into the EDNS0 OPT resource record.\u00a0 When a client uses a public recursive DNS server, a GSLB system may incorrectly assume that they are near each other.\u00a0 The aim of this technique is that it helps aid the resolution based on network topology geographical proximity information.\u00a0 The DNS servers will more precisely know about the client\u2019s location and be able to return resolutions that direct the connection to the nearest content to reduce latency and maximize end-user experience.\u00a0 The disadvantage of this technique is that it reveals information about the client\u2019s network location that could be pervasively monitored by recursive DNS servers or authoritative name servers.<\/p>\n<h2 id=\"toc-hId-707107032\">DNS Cookies<\/h2>\n<p>In recent years, we have witnessed an increase in DNS message amplification\u00a0<a href=\"\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\" target=\"_blank\" rel=\"noopener noreferrer\">attacks due to open DNS servers<\/a>.\u00a0 The attacker will send spoofed queries to a set of DNS servers that do not restrict queries.\u00a0 The DNS servers respond to those spoofed queries\u2019 fake source addresses with a large amount of response data.\u00a0 The result is a high-volume stream of DNS response packets destined for the spoofed IP address which leads to the victim\u2019s network.\u00a0 One proposed method to help thwart these types of attacks is to use DNS cookies.\u00a0 This draft proposes creation of a cookie OPT resource record (<a href=\"https:\/\/tools.ietf.org\/html\/rfc6891\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EDNS0 RFC 6891<\/a>) response data for either a client cookie or a server cookie to provide a lightweight DNS transaction security measure.\u00a0\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.os3.nl\/_media\/2013-2014\/courses\/rp2\/p64_report.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">This paper<\/a>\u00a0also further explains how DNS cookies would work between the client and the recursive name server and between the recursive name server and other DNS servers.\u00a0 This DNS cookie technique has been implemented by\u00a0<a href=\"https:\/\/www.isc.org\/downloads\/bind\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ISC<\/a>\u00a0in BIND 9.10.0b1 as the\u00a0<a href=\"https:\/\/kb.isc.org\/article\/AA-01138\/0\/BIND-9.10.0b1-Release-Notes.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Source Identity Token<\/a>\u00a0(SIT) feature.\u00a0 The benefit of this technique is that DNS cookies would provide a method of protecting against DNS packet amplification attacks.\u00a0 Unfortunately, this technique does not provide any privacy protection.<\/p>\n<h2 id=\"toc-hId-735736183\">DNS Minimization<\/h2>\n<p>A central issue in DNS privacy is that DNS queries contain the full Query Name (QNAME) on each recursive query.\u00a0 Therefore, each DNS server queried along the tree traversal would know the full question being asked by the client.\u00a0 This can contain more information than is required.\u00a0 For example, queries to TLD or root name servers should only be a query for a Name Server (NS) record for the authoritative DNS server for that queried domain.\u00a0 The concept is similar to only asking the specific question required at the moment without giving away the complete intent of the questioner.\u00a0 In this way, the answer is not provided too much information and provides for a \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Separation_of_duties\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">separation of duties<\/a>\u201d security measure.<\/p>\n<p>The IETF dnsop working group has created a draft, again authored by St\u00e9phane Bortzmeyer (AFNIC), titled \u201c<a href=\"https:\/\/tools.ietf.org\/html\/draft-ietf-dnsop-qname-minimisation-08\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS query name minimisation to improve privacy<\/a>\u201d.\u00a0 With this solution, the queries to the root name servers only contain a query for the Top Level Domain (TLD) that contains the domain name being looked up.\u00a0 The query to the TLD name server only contains a query for the NS record for the next-level down the zone tree structure for the organization\u2019s authoritative DNS server.\u00a0 Each subsequent query contains more specific information and only the authoritative name server observes the complete QNAME query.<\/p>\n<h2 id=\"toc-hId-764365334\">Encryption of DNS Requests<\/h2>\n<p>Other solutions to solving the DNS privacy conundrum involves performing encryption of the DNS packets to prevent traffic inspection and protecting against eavesdropping.\u00a0 At the 2014 IETF 89 meeting in London there was an \u201c<a href=\"https:\/\/www.ietf.org\/proceedings\/89\/dnse.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Encryption of DNS requests for confidentiality<\/a>\u201d (DNSE) Birds of a Feather (BOF) session where several options were discussed.<\/p>\n<h3 id=\"toc-hId--1759162476\">Confidential DNS<\/h3>\n<p>One draft proposal is titled \u201c<a href=\"https:\/\/tools.ietf.org\/html\/draft-wijngaards-dnsop-confidentialdns-03\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Confidential DNS<\/a>\u201d.\u00a0 This proposal defines the creation of a new ENCRYPT resource record type (RRType).\u00a0 The DNS server publishes encryption keys and the ENCRYPT RRType is used for each segment of the DNS query path.<\/p>\n<h3 id=\"toc-hId--1730533325\">TLS for DNS<\/h3>\n<p>Transport Layer Security (TLS) (and its predecessor Secure Sockets Layer (SSL)) is a popular technique for providing confidentiality to many types of communications applications.\u00a0 TLS is best known as the secure form of HTTP that uses public key cryptography to validate the authenticity of the site (but then uses symmetric cryptography for the encryption of the transmitted data).\u00a0 TLS can also be applied for collaboration applications and it is also possible to use TLS over TCP to provide security for DNS queries.<\/p>\n<p>There are several benefits to using TCP for DNS queries.\u00a0 UDP DNS queries are often spoofed and used for large-scale\u00a0<a href=\"\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS attacks<\/a>.\u00a0 TCP avoids the problems of DDoS attacks using open recursive DNS servers and allows for TLS encryption.\u00a0 These are all great benefits, but most DNS queries use UDP and so this TLS method of encryption with TCP may not apply to all DNS queries.\u00a0 Besides, TCP can end up being used anyway for larger DNS responses such as those containing more data (e.g.\u00a0<a href=\"http:\/\/www.internetsociety.org\/deploy360\/dnssec\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNSSEC<\/a>,\u00a0<a href=\"\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/\" target=\"_blank\" rel=\"noopener noreferrer\">DANE<\/a>,\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc7218\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">TLSA<\/a>, etc.).<\/p>\n<p>This IETF draft proposal titled \u201c<a href=\"https:\/\/tools.ietf.org\/html\/draft-ietf-dprive-start-tls-for-dns-01\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">TLS for DNS: Initiation and Performance Considerations<\/a>\u201d describes how TLS can be applied to protect the confidentially of DNS query payload data.<\/p>\n<h3 id=\"toc-hId--1701904174\">DNS over DTLS<\/h3>\n<p>Since most DNS queries utilize UDP, then using TLS for encryption may not be the best applicable for all situations.\u00a0 Thankfully, there may be an option of adding encryption to the typical UDP DNS queries.\u00a0 The Datagram Transport Layer Security (DTLS) protocol is a method of encrypting application payload data transported over UDP.<\/p>\n<p>The IETF draft proposal titled \u201c<a href=\"https:\/\/tools.ietf.org\/html\/draft-wing-dprive-dnsodtls-01\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS over DTLS (DNSoD)<\/a>\u201d describes how this might work.\u00a0 You might recognize the name Dan Wing, one of the authors of this draft.\u00a0 Dan Wing (along with Andrew Yourtchenko, both with Cisco) is an author of the Happy Eyeballs RFC (RFC 6555) that describes a technique to improve end-user experience for dual-protocol communications.<\/p>\n<h2 id=\"toc-hId-878881938\">More DNS Privacy Activity Expected in 2016<\/h2>\n<p>Judging from the activity in the area of DNS privacy, this will likely be a popular topic of discussion and action in 2016.\u00a0 There are many different solutions, some competing with each other.\u00a0 Many of these solutions are just early IETF drafts of concepts but a few of these ideas may make their way into the Internet Systems Consortium\u2019s (ISCs)\u00a0<a href=\"https:\/\/www.isc.org\/downloads\/bind\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">BIND software<\/a>\u00a0and appear on their\u00a0<a href=\"https:\/\/www.isc.org\/downloads\/bind\/bind-features\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">list of features<\/a>.\u00a0 In the meantime, we should consider how monitoring of our DNS traffic can leave us vulnerable to a loss of privacy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the previous blog on DNS privacy, we covered how the current DNS does not provide for any confidentiality of queries or responses.\u00a0 Pervasive Monitoring (PM) of clear-text DNS messages can reveal a great deal about a client.\u00a0 With a heightened awareness of Pervasive Monitoring, there is a sincere desire to preserve user\u2019s personal privacy [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":2577,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[108,30,15,48],"class_list":{"0":"post-2842","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-bind","9":"tag-dns","10":"tag-security","11":"tag-threat","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)<\/title>\n<meta name=\"description\" content=\"In the previous blog on DNS privacy, we covered how the current DNS does not provide for any confidentiality of queries or responses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)\" \/>\n<meta property=\"og:description\" content=\"In the previous blog on DNS privacy, we covered how the current DNS does not provide for any confidentiality of queries or responses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-09T17:51:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)\",\"datePublished\":\"2016-02-09T17:51:20+00:00\",\"dateModified\":\"2020-05-06T17:30:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/\"},\"wordCount\":1368,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/for-company-blogs_edited-1-2-1.jpg\",\"keywords\":[\"BIND\",\"DNS\",\"Security\",\"Threat\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/\",\"name\":\"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/for-company-blogs_edited-1-2-1.jpg\",\"datePublished\":\"2016-02-09T17:51:20+00:00\",\"dateModified\":\"2020-05-06T17:30:05+00:00\",\"description\":\"In the previous blog on DNS privacy, we covered how the current DNS does not provide for any confidentiality of queries or responses.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/for-company-blogs_edited-1-2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/for-company-blogs_edited-1-2-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"DNS is NOT a Transport Protocol!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)","description":"In the previous blog on DNS privacy, we covered how the current DNS does not provide for any confidentiality of queries or responses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/","og_locale":"en_US","og_type":"article","og_title":"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)","og_description":"In the previous blog on DNS privacy, we covered how the current DNS does not provide for any confidentiality of queries or responses.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/","og_site_name":"Infoblox Blog","article_published_time":"2016-02-09T17:51:20+00:00","article_modified_time":"2020-05-06T17:30:05+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)","datePublished":"2016-02-09T17:51:20+00:00","dateModified":"2020-05-06T17:30:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/"},"wordCount":1368,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","keywords":["BIND","DNS","Security","Threat"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/","name":"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","datePublished":"2016-02-09T17:51:20+00:00","dateModified":"2020-05-06T17:30:05+00:00","description":"In the previous blog on DNS privacy, we covered how the current DNS does not provide for any confidentiality of queries or responses.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/for-company-blogs_edited-1-2-1.jpg","width":660,"height":454,"caption":"DNS is NOT a Transport Protocol!"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ietf-proposed-solutions-for-improved-dns-privacy-part-2-of-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"IETF Proposed Solutions for Improved DNS Privacy (Part 2 of 2)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2842"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2842\/revisions"}],"predecessor-version":[{"id":3702,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2842\/revisions\/3702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2577"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}