[tor-bugs] #697 [Tor Relay]: Wrong DNS configuration could break navigation
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Thu Nov 11 17:15:39 UTC 2010
#697: Wrong DNS configuration could break navigation
------------------------------+---------------------------------------------
Reporter: amis | Type: defect
Status: new | Priority: minor
Milestone: Tor: unspecified | Component: Tor Relay
Version: 0.2.0.25-rc | Resolution: None
Keywords: dns | Parent:
------------------------------+---------------------------------------------
Changes (by nickm):
* keywords: => dns
* milestone: post 0.2.1.x => Tor: unspecified
Old description:
> On 0.2.0.26rc (add new version on reported version please),
>
> Hello,
>
> i've received one email who alert me.
>
> One user have received OpenDNS pages when he is using tor.
>
> OpenDNS is a company who resolve DNS for the others giving them
> filtering, security, ads, but no privacy.
>
> It appears that some nodes resolving DNS seems to have wrong DNS
> configured, blocking navigation.
>
> If one router making dns resolution is misconfigured it could break
> navigation of others.
>
> I think a DNS control need probably to be added making theses routers
> down.
>
> Perhaps using a downloadable list for phishing.
>
> ---------- Forwarded message ----------
> From: d
> Date: 2008/6/10 04:22
> Subject: Tor exit node policy
> Hello,
> I was browsing a phishing site using Tor recently and instead of the
> phish I saw an OpenDNS warning page (and apparently no way to bypass it).
> Yours was one of the exit nodes that was part of my Tor connection at the
> time.
> I wasn't able to identify exactly which exit node it was.
> Do you have Phish Filtering set up on your exit node, and if so is this
> a deliberate policy? I work in antiphishing and use Tor for some phish
> sites.
> Thank you,
> d
> ----------------------
>
> [Automatically added by flyspray2trac: Operating System: All]
New description:
On 0.2.0.26rc (add new version on reported version please),
Hello,
i've received one email who alert me.
One user have received OpenDNS pages when he is using tor.
OpenDNS is a company who resolve DNS for the others giving them filtering,
security, ads, but no privacy.
It appears that some nodes resolving DNS seems to have wrong DNS
configured, blocking navigation.
If one router making dns resolution is misconfigured it could break
navigation of others.
I think a DNS control need probably to be added making theses routers
down.
Perhaps using a downloadable list for phishing.
---------- Forwarded message ----------
From: d
Date: 2008/6/10 04:22
Subject: Tor exit node policy
Hello,
I was browsing a phishing site using Tor recently and instead of the
phish I saw an OpenDNS warning page (and apparently no way to bypass it).
Yours was one of the exit nodes that was part of my Tor connection at the
time.
I wasn't able to identify exactly which exit node it was.
Do you have Phish Filtering set up on your exit node, and if so is this a
deliberate policy? I work in antiphishing and use Tor for some phish
sites.
Thank you,
d
----------------------
[Automatically added by flyspray2trac: Operating System: All]
--
Comment:
We already check for DNS hijacking, but not for "I guess you don't really
want to visit that site" hijacking. I guess what we'd want here is some
kind of map from DNS providers to recommendations about how to tell them
to give you the real answers to your questions, plus an alert that you
seem to be using such a DNS provider. (We can't just do a test probe,
since there is no such thing as an address that will always be a hijacked
phishing address.)
Since the original bug was posted, the number of 3rd-party DNS providers
that filter their results for anti-phishing purposes has grown. This
isn't an small task.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/697#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list