I'm wondering whether clients, using tor's DNSPort as upstream DNS server, were "accidentally protected" against exploits trying to take advantage of this vulnerability. (or the other way around: where exits in a "lucky" position to compromise all their clients by providing them special DNS responses)
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk