[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Running an exit? Please secure your DNS with DNSCrypt+Unbound



Hi,

Although I cannot say how secure this configuration is but you can run this kind of setup client side as well. So:

Bind --> DNSCrypt Proxy --> Tor --> DNSCrypt Compatible Server

The secret here is to force DNSCrypt to run over TCP only which can then be redirected through a Tor TransPort. This allows you to do several types of queries that tors own DNS port cannot do (such as SRV for xmpp). Dual stackers beware as you will default to IPv6 if you use this setup. You will need to block UDP port 443 as DNSCrypt proxy checks if it is available annoyingly leaving you exposed.

Again I cannot provide analysis as to whether this is secure as DNSCrypt could be sending personally identifiable information without my knowledge as I haven't read the source code for DNSCrypt.

Regards,
spaceman

Attachment: pgpKURzXRrTsS.pgp
Description: PGP signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays