[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers
That was my bug report, thanks for the quick turnaround on that one :3
My problem was that my infrastructure, including that tor exit node,
is puppetized. But a problem with that resulted in dhcp blitzing
/etc/resolv.conf and I kept putting in google dns out of sheer muscle
memory and I simply forgot to put it back.
It is pretty easy. This is the relevant configuration snippet from my
puppet manifest:
# setup internal DNS cache / resolver
include bind
bind::server::conf { '/etc/bind/named.conf':
directory => '/etc/bind',
listen_on_addr => [ 'any' ],
listen_on_v6_addr => [ 'any' ],
forwarders => [ '2001:4860:4860::8844',
'2001:1608:10:25::1c04:b12f', '2600::1' ],
allow_query => [ 'any' ],
statistics_file => '/etc/bind/named.stats',
recursion => 'yes',
extra_options => {
'forward' => 'only',
'auth-nxdomain' => 'no',
}
}
+ some other symlinks to account for the fact this isn't a RHEL box
like the module implicitly assumes.
I even have DNSSEC query validation setup, as the forwarders seem to support it.
Now I have named caching again. For those who are unclear, it helps a
LOT. From rndc stats:
++ Cache Statistics ++
[View: default]
53446329 cache hits
5246190 cache misses
15049168 cache hits (from query)
3044495 cache misses (from query)
The exit node in question sits between 10 and 20mb/s continuously, and
goes through a crazy amount of traffic. Something like 50T last month.
I even threw on a squid proxy on regular http and that's caching
something like 5-10% of all requests and overall http bandwidth.
Where it gets interesting is now that I've moved all of my DNS traffic
into a native ipv6 stack (outside of v4 local queries), I can say that
all the udp traffic I get is not legitimate/requested.
Which is looking to be a lot of traffic.
I got dinged with a nice udp DDoS the other day, and now its' even
more clear about what traffic is bad on tcpdump.
On Thu, Jan 8, 2015 at 9:04 AM, Nick Mathewson <nickm@xxxxxxxxxxxxx> wrote:
> Hi, all!
>
> While looking into a bug report, I noticed that an exit node was using
> one of Google's well-known public DNS servers for its own DNS server.
>
> No disrespect to the operators of Google's fine public DNS service,
> but my sense is that using it for a Tor exit node might not be the
> greatest idea for users' privacy, having one DNS provider that gets to
> see so many requests. It's probably a better idea to have your own
> local cacheing DNS server.
>
> Would anybody like to share a guide about how to set one of those up
> safely and migrate correctly?
>
> best wishes,
> --
> Nick
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays