[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.



#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--------------------------+----------------------------------
 Reporter:  cypherpunks   |          Owner:  (none)
     Type:  enhancement   |         Status:  closed
 Priority:  Medium        |      Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:  not a bug
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+----------------------------------
Changes (by teor):

 * priority:  High => Medium
 * resolution:   => not a bug
 * status:  reopened => closed
 * type:  task => enhancement
 * milestone:   => Tor: unspecified


Comment:

 Replying to [comment:4 indigotime]:
 > >Tor itself should reroute the tcp port 53 request to TorDNS system to
 prevent linking.
 > No, no and no.
 >
 > It's just need to include DNSCrypt and DNS-over-TLS resolvers into Tor
 Browser (Orbot, Orfox).

 Tor Browser uses the exit to resolve DNS queries.

 The users using port 53 are running applications that don't support
 SOCKS5, or are not doing DNS.

 There's really nothing Tor can do to reliably fix applications.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26042#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs