Privacy Extensions for DNS-SD
draft-ietf-dnssd-privacy-05
Document | Type |
Expired Internet-Draft
(dnssd WG)
Expired & archived
|
|
---|---|---|---|
Authors | Christian Huitema , Daniel Kaiser | ||
Last updated | 2024-02-28 (Latest revision 2018-10-15) | ||
Replaces | draft-huitema-dnssd-privacy | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Proposed Standard | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Dead WG Document | |
Document shepherd | (None) | ||
IESG | IESG state | Expired | |
Consensus boilerplate | Yes | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
DNS-SD (DNS Service Discovery) normally discloses information about both the devices offering services and the devices requesting services. This information includes host names, network parameters, and possibly a further description of the corresponding service instance. Especially when mobile devices engage in DNS Service Discovery over Multicast DNS at a public hotspot, a serious privacy problem arises. We propose to solve this problem by a two-stage approach. In the first stage, hosts discover Private Discovery Service Instances via DNS-SD using special formats to protect their privacy. These service instances correspond to Private Discovery Servers running on peers. In the second stage, hosts directly query these Private Discovery Servers via DNS-SD over TLS. A pairwise shared secret necessary to establish these connections is only known to hosts authorized by a pairing system. Revisions of this draft are currently considered in the DNSSD working group.
Authors
Christian Huitema
Daniel Kaiser
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)