Evaluation of Two Privacy-Preserving Protocols for the DNS
The rise of new Internet services, especially those related to the integration of people and physical objects to the net, makes visible the limitations of the DNS protocol. The exchange of data through DNS procedures flows today into hostile networks as clear text. Packets within this exchange can easily be captured by intermedi- ary nodes in the resolution path and eventually disclosed. Privacy issues may thus arise if sensitive data is captured and sold with malicious purposes. We evaluate in this paper two DNS privacy-preserving approaches recently presented in the literature. We discuss some benefits and limitations of these proposals, and we point out the necessity of additional measures to enhance their security.