My idea is designed to protect the exit node against a DNS attack from the owner of the DNS server. Not from the ISP or an attacker monitoring the traffic going in and out of the ISP data center.
On 12/09/2017 19:38, Ralph Seichter wrote:
On 12.09.17 21:17, jpmvtd261@laposte.net wrote:
My idea is to make more DNS queries than necessary, in order to hide the useful DNS queries among useless DNS queries.
I'm not sure what you are trying to accomplish. Usually, a DNS query is followed by an outbound connection to the returned IP address. Your ISP can always monitor these connections from your exit node, no matter what additional "query noise" you might introduce.
This is not fiction. One of my ISPs sends me automated tickets every once in a while, about network scans that abuse my exit nodes. Not only are connections recorded, they are analysed for patterns.
-Ralph