[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #34004 [Core Tor/Tor]: Support for full DNS and DNSSEC resolution
#34004: Support for full DNS and DNSSEC resolution
--------------------------+------------------------
Reporter: chrisss404 | Owner: (none)
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Core Tor/Tor | Version:
Severity: Major | Resolution:
Keywords: DNS, DNSSEC | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------+------------------------
Comment (by chrisss404):
I added the implementation here:
https://github.com/torproject/tor/pull/1869
For the DNS connections I introduced a new session group:
SESSION_GROUP_DNS_LOOKUP
https://github.com/torproject/tor/blob/153f81f340ea84bc5df7471b2d0a7bfbf3ad318c/src/core/or/or.h#L990
Then I setup the connection as follows:
dns_conn->entry_cfg.session_group = SESSION_GROUP_DNS_LOOKUP;
dns_conn->entry_cfg.isolation_flags = ISO_DEFAULT;
dns_conn->entry_cfg.ipv4_traffic = 1;
dns_conn->entry_cfg.ipv6_traffic = 1;
dns_conn->entry_cfg.dns_request = 0;
dns_conn->entry_cfg.onion_traffic = 1;
dns_conn->entry_cfg.use_cached_ipv4_answers = 0;
dns_conn->entry_cfg.use_cached_ipv6_answers = 0;
https://github.com/torproject/tor/blob/153f81f340ea84bc5df7471b2d0a7bfbf3ad318c/src/core/or/dns_resolver.c#L458
Can you please help me to determine if this approach is prone to
correlation attacks?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/34004#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs