[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?



Unbound does cache DNS entries, but there was also serious discussion about whether or not the cache is a privacy risk/anonymity leak, but I feel it's worth the trade-off since public DNS servers do the same thing.

On Sun, Oct 16, 2016 at 2:23 PM, Petrusko <petrusko@xxxxxxxxxx> wrote:
Humm, I've not checked on the torproject website, tuto how to build a
relay/exit...
It can be nice to link a tutorial : how to set up quickly and easily a
DNS resolver to increase privacy ?

May be exit operators can understand it's not really a big job to
apt-get install unbound (an example)
and use root DNS servers.
I've always read using root DNS is not very good for speed... but if I'm
not wrong Unbound (and others) have a cache ?



16/10/2016 12:52, Toralf Förster :
> Adding different nameserver= lines to /etc/resolv.conf than 8.8.8.8
> shouldn't be a big thing, or ?
--
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5



_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




--
Finding information, passing it along. ~SuperSluether
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays