[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] TAILS uses one DNS server from OpenDNS **WARNING **



On Sun, 2013-10-27 at 03:41 -0400, Michael Wolf wrote:
> On 10/27/2013 12:15 AM, communicationsystem@xxxxxxxxxxxxx wrote:
> > Tails uses one DNS server from OpenDNS.
> >      
> > What prevents a malicious party from signing up exit nodes at OpenDNS and logging traffic, blocking content, and/or redirecting traffic?
> 
> Assuming the malicious party runs the exit node, what prevents them from
> doing any of these things anyway?

OpenDNS authenticates by IP, so anyone using the exit node can change
the OpenDNS settings if the exit node operator hasn't made an account. 

The exit node operator can do all of those things, but anyone using Tor
can do them with OpenDNS.

-- 
Sent from Ubuntu

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk