[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] DNSSEC



merc1984@xxxxxx:
> On Mon, Sep 1, 2014, at 11:54, Mike Cardwell wrote:
> > The exit nodes do the DNS requests. The client doesn't see an IP address.
> > It connects to the Tor SOCKS interface and says, "connect me to hostname
> > example.com on port N". It doesn't look up the IP address of
> > "example.com"
> > and *then* connect to it. Hidden services don't have IP addresses and
> > DNS resolution isn't involved in routing connections to them.
> 
> So when I request to connect to example.com, that request goes all the
> way to the exit node, which then is supposed to do the DNS lookup? 
> Again, this is impossible, as .onion domains would be bypassed. 

This is the development mailing list for Tor. Please refrain from
posting more questions until you have a better understanding of the way
Tor works:
https://www.torproject.org/docs/documentation.html.en#UpToSpeed

Everything you want to know about Tor design is available:
https://gitweb.torproject.org/torspec.git

-- 
Lunar                                             <lunar@xxxxxxxxxxxxxx>

Attachment: signature.asc
Description: Digital signature

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev