During normal operation after bootstrapping.
For bootstrapping. As of 0.2.8.1-alpha, each release has a different list of fallback directory mirrors. If they're not whitelisted, initial bootstrap will be delayed for around 10 seconds, then tor will try an authority.
Shouldn't be required, all connections go through a 3-hop circuit that starts at a guard.
Yes, this kind of whitelisting of addresses used by tor worked quite well when I was testing the fallback directory mirror and IPv6 client bootstrap features. (I would block or allow certain addresses, then make sure tor behaved sensibly.)
Server DNS names are sent to the Tor Client as part of the SOCKS 5 protocol. The Tor Client sends the server name to the Exit. Then DNS resolution is performed by the Exit. So technically, there are no DNS packets until the Exit queries its DNS servers for the server name provided by the client. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F |
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays