[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
DNS related-ideas
- To: or-talk@xxxxxxxxxxxxx
- Subject: DNS related-ideas
- From: Watson Ladd <watsonbladd@xxxxxxxxx>
- Date: Tue, 16 May 2006 16:01:39 -0400
- Delivered-to: archiver@seul.org
- Delivered-to: or-talk-outgoing@seul.org
- Delivered-to: or-talk@seul.org
- Delivery-date: Tue, 16 May 2006 16:01:48 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:mime-version:content-transfer-encoding:message-id:content-type:to:from:subject:date:x-mailer; b=U9c4q2+LcIBf/26GQllflWL9APjdcrsJoubplOAy9znQaRStqeRuWNa7VduMZ4ljC7/jszrqXiJ05CkzT3Bytyp7X13VSSveLDV+yj+5DoUFaJ9p1Qx0v1cnJjeo3x/RyqMu/EdNeL05sKivIcwekUjhxv7N2Vt4avCuPJzxCck=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Does Tor currently use DNSSEC when looking up nodes? This would
eliminate need for a special directory of nodes and keys as DNSSEC is
a PKI structure. We could also do something like pool.ntp.org does to
get random nodes. A lookup for pool.tor.eff.org would return the DNS
data of a random node, simplifying node lookup and reduce memory
requirements for clients.
Sincerely,
Watson Ladd
"Those who would give up Essential Liberty to purchase a little
Temporary Safety deserve neither Liberty nor Safety."
-- Benjamin Franklin