<p dir="ltr">That's my thought as well. At any rate, not using a cache for DNS queries would add even more latency to the network. </p>
<div class="gmail_quote">On Jul 9, 2016 10:01 AM, "Petrusko" <<a href="mailto:petrusko@riseup.net">petrusko@riseup.net</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor="#FFFFFF" text="#000000">
<br>
<blockquote type="cite">
<pre>It shouldn't affect unbound's ability to cache anything. However, I
personally think it is inappropriate to run a DNS cache on an exit
node, because that preserves a record on the exit node of what people
are using it for.
zw
</pre>
</blockquote>
Hey,<br>
I'm not an Unbound expert, I think Unbound doesn't log any DNS
queries...?<br>
What I know is only statistics can be given with the command
"unbound-control stats", only numbers are shown.<br>
In my unbound.conf, the only log config lines are :<br>
logfile: "/var/log/unbound.log"<br>
use-syslog: no<br>
<br>
And this /var/log/unbound.log doesn't exist on my system...<br>
Is there way to see DNS queries made by users ?<br>
<br>
For me, about privacy, it's not necessary a problem about "knowing
what are doing your Tor users", because if it's not you, it will be
your DNS resolvers... As read before, a lot of Tor exists are using
Google DNS :p (I think it's lol about privacy!)<br>
So the bad guy will know the DNS queries, but he doesn't know who
has made it (only exit IP is shown ?), so privacy is safe ?<br>
<pre cols="72">
--
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5</pre>
</div>
<br>_______________________________________________<br>
tor-relays mailing list<br>
<a href="mailto:tor-relays@lists.torproject.org">tor-relays@lists.torproject.org</a><br>
<a href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays" rel="noreferrer" target="_blank">https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</a><br>
<br></blockquote></div>