[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Please do not use 9.9.9.9 as your DNS on an exit relay





2017-11-23 18:23 GMT+00:00 Toralf Förster <toralf.foerster@xxxxxx>:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> On 11/23/2017 03:10 AM, Dave Warren wrote:
> > One note, 9.9.9.10 does no filtering, but sadly also doesn't enforce
> > DNSSEC. It has the same privacy policy and similar.
> The former is good, the later not a problem, b/c DNSSEC validation has to be made by the client nevertheless.
>
> I do persoanlly use 9.9.9.10 together with dnsmasq (whihc does the DNSSEC job) at my desktop b/c I couldn't get DNSSEC woring with the DNS servs of my ADSL provider here in Hamburg.
>
> - --
> Toralf
> PGP C4EACDDE 0076E94E
> -----BEGIN PGP SIGNATURE-----
>
> iI0EAREIADUWIQQaN2+ZSp0CbxPiTc/E6s3eAHbpTgUCWhcSCRccdG9yYWxmLmZv
> ZXJzdGVyQGdteC5kZQAKCRDE6s3eAHbpTjRxAPwMNZQCFk7av7cyMbRCjCyqIPq4
> 91jnvwX6lLXnL9bEywEAhaZgeF3oFKvRENSMJls/NeSHm/jfCXGjrQ/0/yaGChQ=
> =zma+
> -----END PGP SIGNATURE-----

I wrote something kinda related to this thread to help a few friends; w.i.p.
https://openbsd-br.org/pub/egypcio/debian-unbound-socat-tor.sh

you are invited to read the code before running/testing. feel free to modify, or w/e.

SHA256 (debian-unbound-socat-tor.sh)
23a74b162af7b219827c84be669083a4595d6fee15c585ac73ce10d17cece9b5


--
Vinícius Zavam
keybase.io/egypcio/key.asc
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays