Warning
This post was published 82 days ago. The information described in this article may have changed.
Hey everyone. I wrote a proposal on PIR-DNSSEC. Took me some time. It is not a final version, but would appreciate comments, feedback etc from anyone!
I’d like comments on specific stuff addressed on HackMD directly: https://hackmd.io/@CPerezz/ryQoCKmLi
And for general comments or feedback feel free to use the forum replies.
::success The following document is my attempt to explain as much as possible all my ideas and thoughts on the concept of PIR-DNSSEC.
The TLDR, PIR-DNSSEC is the endgoal for the DNS protocol. We currently have DNS-over-TLS and DNSSEC. This grants authentication and spoofing & cache poisoning protection.
But DNS lacks privacy. Specially since major DNS operators and resolvers like Google, have unprecedented power to mass surveil the world through every single DNS lookup that arrives to them.
> If you already know how DNS and DNSSEC work or simply don’t care, you can directly skip to PIR-DNSSEC section
The Domain Name System (DNS) is the global distributed database responsible for translating human-readable domain names (such as ethereum.org
) into numerical IP addresses (such as 3.124.100.143
) that computers use to communicate with each other. It is often compared to a phone book—though, unlike a traditional phone book, DNS is hierarchical, decentralized, and extensively cached.
Hierarchical structure:
.org
, .org
, .net
, country-code TLDs, and others.ethereum.org
), followed by possible subdomains (e.g., sub.ethereum.org
), and so forth.Distributed database:
Caching:
Record types:
A user attempts to visit a domain, say www.ethereum.org
. The computer checks its local DNS cache or sends a query to a configured DNS resolver (which could be the user’s ISP’s (hopefully not) DNS server or a public DNS server like 1.1.1.1).
If the resolver does not have the domain’s record cached, it will send a query up the chain, starting from the DNS root servers (.
), then to the TLD server (.org
), then to the authoritative name servers for ethereum.org
.
The authoritative name server for the domain returns the IP address (or other relevant record) for www.ethereum.org
to the resolver.
The resolver then returns the answer to the user’s application, which can now open a direct connection to the specified IP address.
The resolver and potentially the local machine will cache this answer for the record’s TTL. Future lookups for www.ethereum.org
during the TTL will be answered immediately from cache. Hence, saving up all the time it takes to send a request-response through the wire.
Lack of authentication: The DNS response is not cryptographically signed or verified in a standard DNS implementation. This leaves DNS traffic vulnerable to spoofing (e.g., DNS cache poisoning, man-in-the-middle attacks).
Lack of privacy: Queries are sent unencrypted (in the traditional DNS protocol over port 53), so anyone on the path can see which domains are being requested and respond with altered data if they have the capability.
SLack of security: The DNS response can suffer man-in-the-middle attacks. Meaning an attacker can intercept the DNS communications sent by the user and craft a fake response with a poisoned record that tricks the user into visiting a website that isn’t the one he expects.
No built-in data integrity: The DNS protocol was originally designed in a more trusted and smaller network environment (The OG Internet/ARPANET). Therefore, it did not include built-in data integrity checks aside from basic checksums, which are insufficient for preventing targeted forgery.
DNS Security Extensions (DNSSEC) is a set of extensions that adds authentication and data integrity to the DNS protocol using public-key cryptography. Its main goal is to protect clients from forged or manipulated DNS data, such as in man-in-the-middle or cache poisoning attacks.
Chain of trust
Each DNS zone (root, TLD, domain, etc.) has a key pair, consisting of a private key used to sign the zone’s resource records (RRs) and a public key stored in the zone’s DNSKEY record.
A parent zone (imagine .org
in ethereum.org
) holds a Delegation Signer (DS) record containing a cryptographic hash of the child zone’s public key (in this case, www.ethereum.org
).
The root zone (the top one) has its public key widely trusted and distributed in what is known as a trust anchor.
Signed resource records DNSSEC introduces new record types (e.g., RRSIG, DNSKEY, DS, NSEC/NSEC3) to provide signatures and proof of non-existence.
Verification When a resolver (that supports DNSSEC) queries for a domain, it requests not only the DNS records but also the associated signatures. (Meaning, it doesn’t just do a DNS request. But also a DNSSEC one).
Opt-in nature DNSSEC is optional; zones can choose to sign their data or not. Resolvers can be configured in “best effort” mode, where they look for DNSSEC records but gracefully handle domains that are not yet signed.
Fallback behavior If a resolver does not support DNSSEC, it will ignore DNSSEC records and proceed with plain DNS.
Partial deployment TLDs and many second-level domains have gradually adopted DNSSEC, but it is not enforced for all domains. This partial deployment model means non-DNSSEC zones still work as usual.
PIR-DNSSEC is a proposed system that combines DNS Security Extensions (DNSSEC) with Private Information Retrieval (PIR) to provide both authentication and privacy for DNS queries. In plain DNSSEC, clients can verify that a DNS response has not been tampered with, but the actual queries are still visible to the DNS resolver and potentially to on-path observers. By integrating PIR, a user can retrieve DNS records without revealing which specific record they need—even to the DNS server—while still benefiting from the authenticity guarantees of DNSSEC.
::info Even if the server logs all queries, the design of PIR means each query looks statistically similar to any other query. The server cannot link a specific client request to a specific domain. This is a significant departure from standard DNS or DNS-over-TLS, where the DNS resolver itself always knows your exact lookup. And it’s also one of the main focuses of this work. To grant full privacy even to the extend of major DNS controllers.
::
::info PIR systems can reduce or eliminate side-channel leaks too, which might reveal which record is being fetched (e.g., by query size or request timing). This is specially crucial if we’re trying to hide sensitive or private domain lookups from powerful adversaries, including the operator of the DNS server itself.
::
End-to-End Integrity + Confidentiality By combining DNSSEC with PIR, users get integrity and privacy (nobody can see which specific domain is being queried). This offers a more complete security solution than using DNSSEC or standard encrypted DNS (like DNS-over-TLS or DNS-over-HTTPS) alone.
Defense Against Multiple Threat Vectors With standard DNSSEC, on-path attackers cannot forge DNS replies, but they can still see the queries and potentially block them or perform traffic analysis. PIR-DNSSEC makes eavesdropping or direct observation of domain queries impractical, thereby thwarting passive surveillance and metadata analysis.
Applicability in High-Privacy Contexts In scenarios where privacy is paramount—such as corporate environments, whistleblower platforms, or sensitive government or military networks—the combined approach ensures that both data authenticity and user anonymity are maintained at the DNS resolution layer.
The internet’s foundational protocols were designed primarily for connectivity and openness rather than privacy. DNS, in particular, was established in an era when simply resolving names to IP addresses was the main goal; little attention was paid to preventing operators or on-path observers from monitoring or altering the queries themselves. Today, major DNS operators—especially root operators and large public resolvers—have unprecedented visibility into people’s online activities, because they effectively see every domain lookup. This information can reveal not just browsing patterns but also insights into personal habits, corporate interests, and national behaviors.
By introducing robust privacy measures into DNS (e.g., via PIR-DNSSEC), we move closer to an internet where anonymity and privacy could become default. If DNS queries become truly opaque to service providers and network adversaries, one key element of online tracking and surveillance is eliminated.
This could reduce or, in some narrower cases, potentially eliminate the need for certain anonymity tools like Tor—at least where DNS lookups are concerned—since Tor itself currently handles domain resolution in a more circuit-based way. Ensuring DNS privacy and authenticity is a critical step toward a more comprehensive approach to internet anonymity.
This could specially help with exit-nodes in the Tor network. Which are the ones in charge of performing DNS Lookups such that even this can be made with complete privacy, reducing significanly the attack surface on identification of users.
PIR techniques—whether computational or information-theoretic—are well-known for introducing additional computational and bandwidth overhead. Likewise, DNSSEC relies on cryptographic operations (e.g., signature verification, key retrieval) that add their own overhead. When combining these two, several performance and privacy trade-offs emerge:
Layering PIR on Top of DNSSEC
.org
key implies we’re validating something under .org
).
For every DNS record retrieved, validating the RRSIG (signature) using the DNSKEY is a known overhead. In a PIR context, you might also need to perform these verifications in a way that does not leak which key is being used for which record (or, alternatively, you reveal it only on the client side after retrieving the keys via PIR).
One approach is to design the PIR scheme so that clients retrieve multiple keys (or entire sets of keys) in a single query, hiding the specific key needed. This could amortize overhead across multiple queries but increases data download size.
Running multiple authoritative servers that each store a copy of the DNS zone or DNSSEC data can increase reliability and share the computational load of handling PIR queries. However, ensuring that none of these servers collude (if relying on information-theoretic PIR) is an additional challenge.
DNSSEC deployment already requires key management, signing infrastructure, and resolver configuration. Adding PIR on top might complicate the deployment and require specialized servers and code.
A naive PIR approach might require large amounts of data to be transmitted, or specialized data structures that must be carefully designed for DNS.
For large zones or high query volumes, a carefully optimized approach is needed.
Widespread adoption would require many DNS servers to support PIR. In an incremental approach, only specific resolvers or authoritative servers might offer it, limiting overall benefit until critical mass is reached.
PIR-DNSSEC should ideally still serve clients that only support DNSSEC without PIR, or plain DNS. Striking the right balance of backward compatibility is non-trivial.
If you’re interested on this or want to further discuss, share ideas etc.. you can contact me by email to the following address: pir-dnssec_contact@proton.me
Thanks! Feedback is welcole!
🏷️ dns, pir, dnssec, project-proposalYou sold me the idea with this TLDR:
“The TLDR, PIR-DNSSEC is the endgoal for the DNS protocol. We currently have DNS-over-TLS and DNSSEC. This grants authentication and spoofing & cache poisoning protection.
But DNS lacks privacy. Specially since major DNS operators and resolvers like Google, have unprecedented power to mass surveil the world through every single DNS lookup that arrives to them.“
Couple general comments:
Again, super cool idea! :)
Adding PIR to anything is strictly good, it’s a powerful way of retrieving data. The problem isn’t figuring out how to use PIR, it’s developing a PIR scheme that actually works.
Multiple dev teams have requested PIR for retrieving leaves from relatively small merkle trees (order of 2**20
maybe). This has been an open problem for years, it’s one of the only things preventing Semaphore from scaling. Right now we have to always load the entire anonymity set, but with PIR we can retrieve leaves to construct a merkle path without downloading the whole tree. Last I looked the SOTA was insufficient for even this case: a small append only set of field elements.
The DNS has on the order of 2**32
public records that change frequently (not append only) where queries need to be resolved sub-second with minimal bandwidth. Is there an existing PIR scheme that could handle this? (and if so can we get merkle tree path retrievals using it 🙏?)
I was thinking using PIR to retrieve merkle path of large merkle tree from the server, but it requires queries, making it probably inefficient and also fragile when the merkle tree is updated. I found some interesting recent ORAM paper(https://eprint.iacr.org/2023/274.pdf) to address this problem. (ORAM is PIR + functionality to write to the database)