This page describes at a high level the progress in various areas of DNS Privacy work (most recent activity at the top) mainly focussed on DNS-over-TLS.
- DPRIVE WG at IETF just re-chartered to cover adding confidentiality to recursive to authoritative exchanges.
- Interesting presentations from the DNS WG @ RIPE 76
- The Stubby Windows installer and macOS GUI App are both updated to use the getdns 1.4.2rc1 and stubby 0.2.3rc1 releases.
- Unbound 1.7.1 now supports authentication of DNS-over-TLS using PKIX certificates!
- Thanks to Matthew Vance for a docker image combining Stubby and Unbound.
- Android announcement about the DNS-over-TLS support in Android P Developer preview.
- We are excited about the new proposal for for Oblivious DNS to hide queries from resolver operators
- Cloudflare now running an open recursive resolver with DNS-over-TLS and DNS-over-HTTPS! Details on the Test Servers page.
- The latest release of dnsdist includes support for DNS-over-TLS - thanks PowerDNS folks!
- RFC8310 is now published: Usage Profiles for DNS over TLS and DNS over DTLS
- Write up of the IETF101 Hackathon work on DoH.
- First version of Recommendations for DNS Privacy Operators is now published as a IETF draft for review.
- Videos from the DNS Privacy Workshop 2018 are now available on You Tube on the DNS Privacy Project Channel
- ISC announce the next version of BIND 9 will include QNAME minimisation
- Also, 3 of the dnsovertls(N).sinodun.com servers are running BIND 9.12 and are now padding responses!
- Live traffic for a subset of Test servers now available
- Interactive map of the DNS Privacy test server locations now available
- Another new test server using Knot resolver - thanks the folks at dns.neutopia.org
- Nice talks at FOSDEM yesterday from Stephane Bortzmeyer on DNS Privacy and Willem Toorop on Stub resolvers
- The getdns and stubby packages are now available in LEDE OpenWRT!
- Latest release of Knot Resolver does TLS forwarding upstream!
- We are now using a new and improved getdns based monitoring plugin for our Test Server Monitoring dashboard which can test more server capabilities!
- Two more Test servers now listen on port 443: dnsovertls.sinodun.com and dnsovertls1.sinodun.com
- Thanks to the Knot Resolver folks for quick fixes to some issues with DNS-over-TLS support - the latest release (1.5.1) seems much more stable!
- We note that dnscrypt.org is now re-directed to this site due to changes in the DNSCrypt project status
- We also have additional documentation on automating certificate renewal
- Check out the interesting privacy work and products coming out of the Tenta project - in particular their Tenta browser, open source DNS resolver and comparison of DNS-over-TLS vs DNSCrypt!
- 2 new test servers:
- dnsovertls3.sinodun.comwhich supports TLS 1.3 and TLS 1.2 (thanks again to Surfnet for hosting)!
- Version 1.3.0 of getdns (to be release Dec 21st) will support TLS 1.3 when linked against OpenSSL 1.1.1, so build stubby against that to that if you want to test out TLS 1.3!
- dns.bitgeek.in based in India - many thanks Sairam Kunala!
- dnsovertls3.sinodun.comwhich supports TLS 1.3 and TLS 1.2 (thanks again to Surfnet for hosting)!
- Windows Installer is updated to use the getdns 1.2.1rc-1 and Stubby 0.2.0 releases!
- We now have an alpha release of a prototype StubbyManager GUI for macOS. This is a work in progress!
- Quad9 is now added to the Test servers pages
- Excellent blog post by Stephane Bortzmeyer about the new Quad9 service. (Note that Quad9 have not themselves announced official DNS-over-TLS support)
- Also a blog post from Alex Band on configuring Stubby with Quad9.
- Work at the IETF Hackathon on DANE verification of DNS-over-TLS servers. Congrats to the DNS team who won overall best contribution!
- Check out a new docker image providing Stubby using Quad9
- We have three new test servers added during October - thanks to Lars de Bruin and Gerold Krötlinger!
- The first release of a Windows installer for the Stubby CLI tool is announced. Please test! (A GUI is on the way.....)
- The DNS Privacy Workshop will again be co-located with NDSS in San Diego - February 2018.
- We have a new DNS Privacy server in South America - Thank you NIC Chile!
- We talked at OARC 27 about DNS Privacy clients. You tube video available.
- Jan Zorz has written an excellent article about his experience trying to set up DNS Privacy. We got lots of useful feedback from him and are working on the issues he found! Thanks Jan.
- We are very pleased to announce that the OTF is now generously funding work by dnsprivacy.net!
- We are pleased to announce that there is now an official Homebrew formula for Stubby!
- Stubby now has its own source code repository.
- The IETF EDU Privacy Tutorial is happening again at IETF 99! Slides are here: DNS Privacy Tutorial.
- We have a new DNS Privacy server in Asia!! See Experimental DNS-over-TLS Servers
- We are talking on 6th July about getdns, Stubby and DNS Privacy at AFNIC JCSA!
- Here is our presentation from RMLL!
- NEW! We now have live monitoring of the Experimental DNS Privacy servers
- A short video on our work at the IETF Hackathons is now available!
- We have several new Experimental DNS-over-TLS servers now
- The DNS Privacy Tutorial is going to be given again at IETF 99 in Prague
- Here's a presentation on DNS-over-QUIC from OARC (slides, video - got to 8:04 hrs in)
- Here's our presentations on dnsprivacy.net at OARC (slides, video - go to 6:45 hrs in) and RIPE (slides, video)
- The dnsprivacy.org website content has now been migrated to its own server after being hosted on portal.sinodun.com.
- New Internet Draft on DNS in dedicated QUIC Connections and lots of interesting drafts around DNS over HTTP getting discussion
- Latest 1.1.0 release of getdns includes Stubby!
- The DNS Privacy team is highlighted in the IETF Hackathon Videos
- We'll be talking at both the RMLL conference (5th July) and at JCSA in Paris (6th July) about DNS Privacy
- We are proud to add Salesforce as supporters of the DNS Privacy project!
- Great work at the IETF 98 Hackathon on DNS Privacy. In particular see Stephane Borztmeyer's blog on his DNS-over-TLS monitoring plug-in.
- Proceedings from the NDSS DNS Privacy workshop are available here.
- Thanks to Matthew Ford from ISOC for a great write up of the workshop.
- We'll be talking at OARC about dnsprivacy.net
- We are very pleased to announce a new donation from NLnet Foundation to support work on Stubby. Thank you for your generous support!!
- Preliminary agenda published for NDSS DNS Privacy Workshop (26th Feb, San Diego)
- DNS Privacy will be a topic at the IETF 98 Hackathon - please come along!
- Planning under way for the NDSS DNS Privacy workshop on 26th February in San Diego
- https://datatracker.ietf.org/doc/draft-ietf-dprive-dtls-and-tls-profiles/ has cleared WGLC
- 1.0.0 release of getdns (which supports DNS-over-TLS)
- Knot resolver 1.2.0 released with improved DNS-over-TLS support
- Warren Kumari has provided a Docker container for easy deployment of a DNS-over-TLS server!
- Improved usability for Stubby planned for the 1.1.0-alpha3 release
- The content of this site is now available via the dnsprivacy.org site.
- CoreDNS now offers DNS-over-HTTPS (as well as DNS-over-TLS). Also see dingo if interested in DNS-over-HTTPS clients.
- DNS Privacy Tutorial, which got coverage in both Heise and two articles in The Register: The_Register_22Nov, The_Register_6Dec IETF 97 EDU team held a
- More work at the Hackathon on Knot Resolver DNS Privacy implementation, TCP support in BIND and Stubby. A further DNS Privacy test server made available thanks to dkg.
- DPRIVE working group discussed a possible re-charter to focus work on the Resolver to Authoritative problem.
- DNS-over- HTTP(S) BOF held
- 2 more test DNS Privacy resolvers made available (Thanks to Surfnet for resources!)
- getdns version 1.1.02-alpha released with a prototype implementation of Stubby - a DNS Privacy stub resolver
- https://datatracker.ietf.org/doc/draft-ietf-dprive-dtls-and-tls-profiles/ moved into Working Group Last Call
- https://datatracker.ietf.org/doc/draft-mayrhofer-dprive-padding-profile/ was published to propose specific policies for padding DNS packets
- https://datatracker.ietf.org/doc/draft-ietf-dnssd-privacy/ adopted by the DNS-SD working group
- https://datatracker.ietf.org/doc/draft-ietf-dprive-dnsodtls/ passed WGLC with status 'Experimental' and was submitted to IESG for review
- WGLC starts for https://datatracker.ietf.org/doc/draft-ietf-dprive-dnsodtls/
- https://datatracker.ietf.org/doc/draft-bortzmeyer-dprive-step-2/ was published as a first step in describing the Resolver to Authoritative problem
- OARC made a test DNS Privacy server available - many thanks!
- Presentation in the RIPE DNS working group on experimental deployments of DNS Privacy servers.
- RFC7858 Published: Specification for DNS over Transport Layer Security (TLS)
- Work at the IETF Hackathon in Buenos Aires to start implementing TLS in Knot resolver
- getdns 1.0.0b1 release!
- RFC7816 Published: DNS Query Name Minimisation to Improve Privacy
- EDNS0 Keepalive draft approved for publication as RFC7828
- 5966bis draft approved for publication as RFC7766
- Authentication and (D)TLS Profile for DNS-over-TLS and DNS-over-DTLS draft adopted by DPRIVE
- Testing of FreeBSD implementation of TCP Fast Open. Reported bug in linux client implementation of TFO (now fixed) and made feature request to OpenSSL to support client side TFO.
- Started work on Unbound patch to support TFO on Linux, FreeBSD and OS X.
- Produced first version of Authentication and (D)TLS Profile for DNS-over-TLS and DNS-over-DTLS draft for submission to DPRIVE working group
- Client side EDNS0 keepalive option implemented in getdns
- SPKI pinset TLS authentication available in getdns
- Attended IETF 94.
- Participated in Hackathon including getdns implementation of EDNS0 Padding option
- Last call review of DNS-over-TLS
- Agreed to start work on combined draft for (D)TLS Authentication mechanisms
- Attended OARC Fall Workshop. Presentationed onUsing TLS for DNS privacy in practice.
- Attended ICANN in Dublin, presented on DNSSEC for Legacy applications including discussing DNS privacy features of getdns.
- Addition of TLS authentication using hostname to getdns
- IETF 93
- Work on getnds TLS authentication during Hackathon
- Working group presentations on 59966-bis draft and https://tools.ietf.org/html/draft-ietf-dnsop-edns-tcp-keepalive-02
- 0.3 release of getdns including
- New transport list options allowing user to flexibly specify an ordered list of accepted transport options from TLS, STARTTLS, TCP, UDP
- Ability to configure idle timeout associated with TCP connections
- 0.2 release of getdns including STARTTLS
- Release of version 0.1.8 of getdns including TLS and TLS with fallback to TCP
- Work started in getdns to implement dns-over-tls - Demo given at IETF92 in Dallas of proof-of-concept code.
- Publication of updated set of patches in the dns-over-tls repository
- Publication of https://tools.ietf.org/html/draft-ietf-dnsop-5966bis-01
- Changed to using DNS-over-TLS instead of T-DNS
- Extend LDNS and NSD patches to include options to use the TO bit (for experimental inter-op testing)
- Publish LDNS code into repository for review
- getdns work put on hold, instead start work on Unbound server patch
- Presenting at IETF 91
- Started work on T-DNS in getdns
- Implementation of TCP Fast open support (linux only) in getdn for stub mode in 0.1.5 release.
- Testing of 0.1.5 getdns codebase which implements TCP pipelining.
- POC implementation of TCP Fast Open in ldns, Unbound and NSD.
- Patch released to implement STARTTLS in NSD.
- Released patch to ldns for connection re-use.
- Continued helping to implement switch to ldns for stub mode in getdns.
- Basic support for synchronous API implemented and per query namespaces also supported. (Note DNSSEC stub validation is still done by unbound at this point....)
- Creating patch for ldns/drill to support connection reuse for TCP. Using this from synchronous stub mode in getdns to demonstrate connection re-use.
- Work on TCP related drafts
- Working on getnds
- Added a new test to verify which transport queries are actually sent over
- Helping to implement the switch to ldns for stub mode
- Working on support for pipelining of TCP queries
- Attended IETF 90 in Toronto and gave a demo of sending queries from drill to Unbound using T-DNS
- Started looking at pipelining multiple queries from drill to Unbound
- Extending test framework to test multiple scenarios for drill <-> Unbound
- Finished patch to drill to add extra options:
- -l will send a single query over TLS
- -L will send a single query over TLS after negotiating an upgrade using a STARTTLS/CH/TXT query
- Finished patch to Unbound to support 'upgrade_tls' configure option. This enables unbound to receive a a STARTTLS/CH/TXT query, send a STARTTLS/CH/TXT response when configured properly, upgrade to SSL and then receive a query over SSL.
- Started work on Unbound <-> NSD hop
- Completing implementation in Unbound to get drill <-> Unbound hop working
- Implemented a patch to drill to support T-DNS for a single DNS query
- Discussions on the class to be used for the dummy query. The resolver -> authoritative hop might be better implemented with a IN class query.
- Start work on Unbound - understand current SSL-upstream implementation
- From Willem: LDNS does not have support for asynchronous operation so in the short term it will probably be used in getdns just in synchronous mode so that the implementation of TDNS can continue.
- Further work on test framework
- Current getdns stub implementation cannot support sending of CH class queries as it uses libunbound which denies the query and never sends it onwards. Discussed in getnds meeting 19th May that further implementation of T-DNS in getdns will have to wait until libunbound is replaced with ldns for the stub mode. Current understanding is that Willem is going to tackle this in the next few weeks.
- Identified need to support CH class in getdns for dummy STARTTLS query. Start on implementation of this.
- This implementation highlighted the need for getdns to gracefully handle refused queries that have no associated data.
- Created test harness to create a dummy STARTTLS query
- Agreed that initial implementations will use the dummy CH class query (not the TO bit)
- Forked getdns. Familiarisation with getdns code base - get it to install and run!
- Kick off meetings with T-DNS and getdns teams
- Creation of project issue tracker and wiki site
- Reading of relevant drafts and documentation - capture any early technical questions