[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Should new exit relays be probed for public DNS resolvers



It’s not a threat model issue. It’s more of a let’s make Tor less dependent on a few public resolvers. Running our own resolvers just makes more sense at such a scale.

Cordially,
Nathaniel Suchy (they/them)

Sent from ProtonMail Mobile


On Thu, Mar 5, 2020 at 1:59 AM, Alec Muffett <alec.muffett@xxxxxxxxx> wrote:
Hey Nathaniel,

What's your threat model here? What would you want to achieve?

On Wed, 4 Mar 2020, 17:24 Nathaniel Suchy, <nathanielsuchy@xxxxxxxxxxxxxx> wrote:
There has been discussion over the past several years that the Tor network should not use public DNS resolver as it has security implications on the Tor network (https://medium.com/@nusenu/who-controls-tors-dns-traffic-a74a7632e8ca). Should new Tor Exit Relays be probed and not included in the consensus until they're running their own DNS resolver and not relying on a public one?
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Attachment: publicKey - nathanielsuchy@protonmail.com - 556d8844.asc
Description: application/pgp-keys

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays