> On 9 Nov 2018, at 20:18, nusenu <nusenu-lists@xxxxxxxxxx> wrote: > > teor: >> 1. If your exit's DNS fails, it will reject all exit requests in its descriptor. > > are you saying that > https://trac.torproject.org/projects/tor/ticket/21989 > is already implemented and released in an alpha version? This ticket is not yet implemented. But some kinds of DNS failures will cause Tor exits to reject all exit traffic, see ServerDNSTestAddresses and ServerDNSDetectHijacking in: https://www.torproject.org/docs/tor-manual.html.en > the affected relays show 0% failure rate at Arthur's DNS check page > https://arthuredelstein.net/exits/ I am not sure if this DNS check checks for hijacking. But it looks like the issue was an overlong or overbroad exit policy. T
Attachment:
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays