论文标题
保存布莱恩的隐私:通过反向DNS的隐私暴露的危险
Saving Brian's Privacy: the Perils of Privacy Exposure through Reverse DNS
论文作者
论文摘要
鉴于隐私的重要性,如今已设计了许多互联网协议(例如,使用TLS作为机密性)。但是,在协议设计时预见所有隐私问题是具有挑战性的,并且当发生协议范围的互动时,可能几乎是不可能的。当DHCP交换伴随着对全局DNS的自动更改(例如,动态添加分配的IP地址的主机名)时,一个显然不太了解的交互作用。正如我们将证明的那样,这是一种隐私风险:即使有其他机制限制了局外人的跟踪(例如,阻止ping),也可能能够从互联网上几乎从任何地方推断出设备的存在和网络动态。 我们提出了这一风险的第一项研究。我们确定在反向DNS记录中揭示客户端标识符的网络,并研究客户的存在与所述记录之间的关系。我们的结果表明了一个很强的联系:在10个案例中有9例中,记录最多持续了一个小时,以选择学术,企业和ISP网络。我们还通过跟踪Brian随着时间的流逝的人拥有的设备来展示如何学习客户模式和网络动态,从而揭示了由COVID-19引起的工作模式的转变,以及通过确定赛义徒步旅行的好时机。
Given the importance of privacy, many Internet protocols are nowadays designed with privacy in mind (e.g., using TLS for confidentiality). Foreseeing all privacy issues at the time of protocol design is, however, challenging and may become near impossible when interaction out of protocol bounds occurs. One demonstrably not well understood interaction occurs when DHCP exchanges are accompanied by automated changes to the global DNS (e.g., to dynamically add hostnames for allocated IP addresses). As we will substantiate, this is a privacy risk: one may be able to infer device presence and network dynamics from virtually anywhere on the Internet -- and even identify and track individuals -- even if other mechanisms to limit tracking by outsiders (e.g., blocking pings) are in place. We present a first of its kind study into this risk. We identify networks that expose client identifiers in reverse DNS records and study the relation between the presence of clients and said records. Our results show a strong link: in 9 out of 10 cases, records linger for at most an hour, for a selection of academic, enterprise and ISP networks alike. We also demonstrate how client patterns and network dynamics can be learned, by tracking devices owned by persons named Brian over time, revealing shifts in work patterns caused by COVID-19 related work-from-home measures, and by determining a good time to stage a heist.