Skip to main content

DNS PRIVate Exchange
charter-ietf-dprive-00-02

The information below is for an older proposed charter
Document Proposed charter DNS PRIVate Exchange WG (dprive) Snapshot
Title DNS PRIVate Exchange
Last updated 2014-10-15
State IESG Review (Charter for Approval, Selected by Secretariat) Rechartering
WG State Proposed
IESG Responsible AD Éric Vyncke
Charter edit AD Brian Haberman
Send notices to warren@kumari.net, tjw.ietf@gmail.com

charter-ietf-dprive-00-02

The DNS PRIVate Exchange (DPRIVE) Working Group develops mechanisms to
provide confidentiality to DNS transactions, to address concerns
surrounding pervasive monitoring (RFC 7258).

The set of DNS requests that an individual makes can provide an
attacker with a large amount of information about that individual.
DPRIVE aims to deprive the attacker of this information. (The IETF
defines pervasive monitoring as an attack [RFC7258])

The primary focus of this Working Group is to develop mechanisms that
provide confidentiality between DNS Clients and Iterative Resolvers,
but it may also later consider mechanisms that provide confidentiality
between Iterative Resolvers and Authoritative Servers, or provide
end-to-end confidentiality of DNS transactions. Some of the results of
this working group may be experimental. The Working Group will also
develop an evaluation document to provide methods for measuring the
performance against pervasive monitoring; and how well the goal is met.
The Working Group will also develop a document providing example
assessments for common use cases.

DPRIVE is chartered to work on mechanisms that add confidentiality to
the DNS. While it may be tempting to solve other DNS issues while
adding confidentiality, DPRIVE is not the working group to do this.
DPRIVE will not work on any integrity-only mechanisms.

Examples of the sorts of risks that DPRIVE will address can be found
in [draft-bortzmeyer-dnsop-dns-privacy], and include both passive
wiretapping and more active attacks, such as MITM attacks. DPRIVE will
address risks to end users’ privacy (for example, which websites an
end user is accessing).

Some of the main design goals (in no particular order) are:

  • Provide confidentiality to DNS transactions (for the querier).

  • Maintain backwards compatibility with legacy DNS implementations.

  • Require minimal application-level changes.

  • Require minimal additional configuration or effort from applications or users