Hi,
I've realized the meaning of your "anonymous" DNS:
I see you're also running two tor "exits". I write "exit" in inverted commas because you're only allowing port 53 open:
172.98.193.43 corresponds to https://atlas.torproject.org/#details/5E56738E7F97AA81DEEF59AF28494293DFBFCC...
162.248.241.94 does not correspond to a relay.
You also have https://atlas.torproject.org/#details/A5DEC503F0345C6AEB9B268FE0A642BF603192...
It's the same deal. In the latter I suspect this is a "private" resolver or something. Or maybe you just copied your torrc or something.
Either way, this is really cryptic and odd. Opening port 53 only in your exit policy is not beneficial to the Tor network. Why can't you open more ports? I will thus say this: however you're thinking Tor works... it probably doesn't.
Furthermore, I don't think you should be mixing the resolver and the exit in this way. I don't know what the particulars are but it seems like something that would be easy to mis-configure. As a result I think you're putting your users in danger, even if it's not actively intended to be malicious.
Someone else might be concerned with how you've configured this resolver e.g. how does it handle DNSSEC? I don't think it is handling it. That's another topic, though.
Finally: if someone decides to report these to Bad Exits, then I wouldn't blame them, frankly.
Regards
Dennis Emory Hannon:
No attitude or hurt feelings. What's different from my servers compared to others? Probably nothing at all..this is just a hobby of mine. One would think if I wanted to collect information I would just run an exit node myself since I have the resources.
For those that want an alternative no logging DNS: 172.98.193.42
162.248.241.94
For those that don't, No worries at all, we'll be here if you change your mind. :D
Cheers!
-Dennis
https://www.linkedin.com/in/dennis-hannon-52236019/ +1 (585) 735-5996
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays