Thanks for working on this! The DNS leak issue seems to be a major problem for the project. My only concern is that there is a reason the Tor developers haven't found a solution yet or decided not to tie it into Tor itself. <br>
<br>Does any developer [Tor or not] want to comment on this patch? Maybe someone could explain more about what exactly it does.<br><br><div class="gmail_quote">On Sun, Feb 24, 2008 at 4:11 AM, Noiano <<a href="mailto:noiano@lavabit.com">noiano@lavabit.com</a>> wrote:<br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Hello everybody<br>
some time ago I submitted a request through the psi flyspry bug tracking<br>
system asking the devs to resolve the dns-leaking problem. Since the<br>
devs seems not to have decided when to fix this bug a good gui, hannes,<br>
has developed a patch that acts as a workaround for the problem. You can<br>
download the patch from here<br>
<a href="http://www.opendylan.org/%7Ehannes/XXX/psi-socks-no-dns-leaking.diff" target="_blank">http://www.opendylan.org/~hannes/XXX/psi-socks-no-dns-leaking.diff</a> . In<br>
tor logs you won't see any message saying tor has been given an host to<br>
resolve but I tested myself the patch sniffing the traffic by wireshark<br>
and I found no dns request.<br>
<font color="#888888"><br>
Noiano<br>
<br>
<br>
</font></blockquote></div><br>