[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
PSI patch anti dns-leaking
- To: or-talk@xxxxxxxxxxxxx
- Subject: PSI patch anti dns-leaking
- From: Noiano <noiano@xxxxxxxxxxx>
- Date: Sun, 24 Feb 2008 10:11:01 +0100
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sun, 24 Feb 2008 04:11:22 -0500
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=lavabit; d=lavabit.com; b=HMr8zfnwB1gICk3pAD+efdPJJ7nLgfp01g1rrdW/RkFgK9jZi0+nmhuFGyq8uZXb9mP3e3SfDCu8aCqM2H7jB5rU0sBPAswAZIkohqAeiRib3T4FpecVtZKTWx8cygT5mARPhc1UQEOijrpad5JtW6cqJHsi1hKGNCsrkg9sSw8=; h=Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:X-Enigmail-Version:OpenPGP:Content-Type;
- Openpgp: id=AB10E8D2; url=hkp://keyserver.linux.it
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.6 (X11/20071022)
Hello everybody
some time ago I submitted a request through the psi flyspry bug tracking
system asking the devs to resolve the dns-leaking problem. Since the
devs seems not to have decided when to fix this bug a good gui, hannes,
has developed a patch that acts as a workaround for the problem. You can
download the patch from here
http://www.opendylan.org/~hannes/XXX/psi-socks-no-dns-leaking.diff . In
tor logs you won't see any message saying tor has been given an host to
resolve but I tested myself the patch sniffing the traffic by wireshark
and I found no dns request.
Noiano
Attachment:
signature.asc
Description: OpenPGP digital signature