> On 24 Oct 2019, at 01:04, Dan Wing <[email protected]> wrote:
>
> I like draft-ietf-dprive-bcp-op overall. A few comments related to
> fingerprinting:
>
> 1. In https://tools.ietf.org/html/draft-ietf-dprive-bcp-op-04#section-5.2.4
> it mentions fingerprinting client OS by IPv4 TTL or IPv6 Hoplimit and TLS
> parameters. The protocol between those, TCP, isn't listed, but TCP
> parameters (window size, ECN support, SACK) are also reasonably unique to an
> operating system or the application that initiated the TCP connection.
>
> 2. What does 'tracking of TCP sessions' mean in this context?
>
> 3. OS fingerprinting is also possible via the DNS queries themselves,
> especially easy if the OS has built-in captive portal and
> Internet-connectivity detection mechanisms. For example, Apple iOS 13.1
> queries both http://captive.apple.com/hotspot-detect.html and
> http://netcts.cdn-apple.com, Windows 10 queries
> http://www.msftncsi.com/ncsi.txt, and not sure about Android. iOS 13.1 and
> Windows 10 query DNS names unique to those purposes, so far as I am aware.
>
> OSs also fingerprint themselves by periodic checking for new OS versions
> which is usually another unique DNS query (MacOS queries swscan.apple.com
> whereas iOS appears to use su.itunes.apple.com, not sure about Windows; Linux
> would be fingerprintable down to the distribution).
>
> Should the I-D recommend discarding that DNS correlation data?
>
> 4. A user's machine can also be fingerprinted based on its DNS queries when
> it joins a network (IMAP accounts, instant messaging accounts) and its
> periodic 3rd and 1st party software update checks, but I guess that is sort
> of covered by the reference to RFC6973's Surveillance in Section 5.3?
Hi Dan,
Thanks very much for these points. Does rewording the section as below better
cover this?
"DNS Privacy Threats:
* Fingerprinting of the client OS via various means including: IP
TTL/Hoplimit, TCP parameters (e.g. window size, ECN support, SACK), OS specific
DNS query patterns (e.g. for network connectivity, captive portal detection or
OS specific updates).
* Fingerprinting of the client application or TLS library by e.g. TLS
version/Cipher suite combinations or other connection parameters.
* Correlation of queries on multiple TCP session originating from the same IP
address
* Correlating of queries on multiple TLS sessions originating from the same
client, including via session resumption mechanisms"
Best regards
Sara.
_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy