SlideShare a Scribd company logo
Seminar: Network and
Communication Privacy
Presenter: Sabbir Ahmmed
DNS Privacy And Confidential DNS
DNSCurve: Usable security for DNS
DNS Review
Image Credit: [5]
DNS Review
Image Credit: [5]
DNS Vulnerabilities
● Three important questions
○ How do attackers target DNS in general?
○ How do attackers spy on your DNS queries?
○ How do attackers forge DNS responses?
Image Credit: [5]
DNSSEC
● Limitations
○ availability/confidentiality
○ responses are authenticated but not encrypted
○ DNSSEC only signs RRs
○ does not protect against DoS attacks directly
○ DNSSEC cannot protect against false assumptions
Introduction to DNSCurve
● Uses elliptic-curve cryptography [1], not RSA
● Daniel J. Bernstein
● Uses a particular elliptic curve, Curve25519
○ 1 chance in 1000000000000000000000000000 !
○ 3000-bit RSA
● What does DNSCurve do for me?
○ confidentiality
○ integrity
○ availability
○ other aspects
DNSCurve Protocol
uz5………………………………...51-byte 255-bit public key
DNSCurve Protocol
● What are sent to the server?
DNSCurve Protocol
● How does the server open the box?
DNSCurve Protocol
● What does the server send back?
DNSCurve Protocol
DNSCurve Protocol
● Speedups
○ The server
○ The cache
● Computing Curve25519 shared secrets for ten million servers : 10 mins
DNSCurve: How to get it
● Simply upgrade your DNS cache
○ dnscache /BIND
○ PowerDNS Recursor /nominum
○ MaraDNS /Unbound
● No extra cache configuration is required.
● No extra firewall configuration is required
● Network bandwidth remains essentially unchanged
● ISP's DNS vs. Cache DNS (side benefits)
● Daily copies of root zone (side benefits)
Implementations
● CurveDNS
○ allows DNS administrators to protect existing
installations without patching
● DNSCrypt from OpenDNS
○ protects the channel between OpenDNS and its users
● Curve-Protect
○ for common services like DNS, SSH, HTTP, and
SMTP
References and bibliography
1. http://dnscurve.org/index.html
2. "Curve25519: new Diffie–Hellman speed records", 2006, Daniel J. Bernstein
3. NSA: The Case for Elliptic Curve Cryptography
4. Adam Langley: What a difference a prime makes
5. CURVEPROTECT SOFTWARE (EXPERIMENTAL)
6. DNS Cache Poisoning: Definition and Prevention
Conclusion
The slides are published under a permissive license (Creative Commons: BY-SA)

More Related Content

PDF
Container Security via Monitoring and Orchestration - Container Security Summit
PPTX
Leveraging AWS
PDF
Node in Real Time - The Beginning
PPTX
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
PDF
Arbiter volumes in gluster
PDF
why novoserve
PDF
Rook: Storage for Containers in Containers – data://disrupted® 2020
PDF
Gluster as Block Store in Containers
Container Security via Monitoring and Orchestration - Container Security Summit
Leveraging AWS
Node in Real Time - The Beginning
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Arbiter volumes in gluster
why novoserve
Rook: Storage for Containers in Containers – data://disrupted® 2020
Gluster as Block Store in Containers

What's hot (18)

PDF
Core Network Services
PDF
Autentia OS - 20180210 - Docker y las películas de chinos
PPTX
The Docker Multitenancy Problem: A Journey through Infrastructure Hell
PDF
Containers > VMs
PDF
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
ODP
Design Summit - Smart State Analysis, aka VM Fleecing - Rich Oliveri
PDF
TANET 2018 - Insights into the reliability of open-source distributed file sy...
PDF
Monitoring your shiny new docker environment
PDF
Altitude SF 2017: Privacy protection by proxy
PDF
OSBConf 2015 | Scale out backups with bareos and gluster by niels de vos
PDF
Cassandra 2.1 boot camp, exercise
PDF
6cure DDoS Reflection
ODP
GlusterD - Daemon refactoring
PDF
Stackpath use case
PDF
XPDDS17: NoXS: Death to the XenStore - Filipe Manco, NEC
PPTX
Building High Performance Web Applications with the Windows Azure Platform
PDF
Cassandra 2.1 boot camp, Compaction
PDF
OmniXtend
Core Network Services
Autentia OS - 20180210 - Docker y las películas de chinos
The Docker Multitenancy Problem: A Journey through Infrastructure Hell
Containers > VMs
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Design Summit - Smart State Analysis, aka VM Fleecing - Rich Oliveri
TANET 2018 - Insights into the reliability of open-source distributed file sy...
Monitoring your shiny new docker environment
Altitude SF 2017: Privacy protection by proxy
OSBConf 2015 | Scale out backups with bareos and gluster by niels de vos
Cassandra 2.1 boot camp, exercise
6cure DDoS Reflection
GlusterD - Daemon refactoring
Stackpath use case
XPDDS17: NoXS: Death to the XenStore - Filipe Manco, NEC
Building High Performance Web Applications with the Windows Azure Platform
Cassandra 2.1 boot camp, Compaction
OmniXtend
Ad

Similar to DNSCurve (20)

PDF
Dns firewalls null-may2020
PDF
DNSSEC - Domain Name System Security Extensions
PPTX
How DNS works and How to secure it: An Introduction
PDF
RIPE 82: DNS Evolution
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
PDF
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
PDF
DNS Over HTTPS by Michael Casadevall
PDF
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
PPTX
Understanding DNS Security
PDF
ION Hangzhou - Why Deploy DNSSEC?
PPT
Dns protocol design attacks and security
PPT
13_526_topic19xfhgjfhsfgdhfjhfbvbdfs.ppt
PPTX
dnssec_networking_improvement_for_security.pptx
PPTX
The History of DNS
PDF
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
PDF
NANOG 82: DNS Evolution
PDF
getdns PyCon presentation
PDF
Information Security, Network Security, Cache Poisoning
PDF
Introduction DNSSec
Dns firewalls null-may2020
DNSSEC - Domain Name System Security Extensions
How DNS works and How to secure it: An Introduction
RIPE 82: DNS Evolution
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNS Over HTTPS by Michael Casadevall
2nd ICANN APAC-TWNIC Engagement Forum: DNS Oblivion
Understanding DNS Security
ION Hangzhou - Why Deploy DNSSEC?
Dns protocol design attacks and security
13_526_topic19xfhgjfhsfgdhfjhfbvbdfs.ppt
dnssec_networking_improvement_for_security.pptx
The History of DNS
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
NANOG 82: DNS Evolution
getdns PyCon presentation
Information Security, Network Security, Cache Poisoning
Introduction DNSSec
Ad

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hybrid model detection and classification of lung cancer
PPTX
Tartificialntelligence_presentation.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Modernising the Digital Integration Hub
O2C Customer Invoices to Receipt V15A.pptx
Module 1.ppt Iot fundamentals and Architecture
A novel scalable deep ensemble learning framework for big data classification...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
cloud_computing_Infrastucture_as_cloud_p
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Enhancing emotion recognition model for a student engagement use case through...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Chapter 5: Probability Theory and Statistics
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1 - Historical Antecedents, Social Consideration.pdf
WOOl fibre morphology and structure.pdf for textiles
Hybrid model detection and classification of lung cancer
Tartificialntelligence_presentation.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
OMC Textile Division Presentation 2021.pptx
Modernising the Digital Integration Hub

DNSCurve