[tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue May 22 20:58:04 UTC 2018


#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--------------------------+----------------------------------
 Reporter:  cypherpunks   |          Owner:  (none)
     Type:  enhancement   |         Status:  closed
 Priority:  Medium        |      Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:  not a bug
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+----------------------------------
Changes (by teor):

 * priority:  High => Medium
 * resolution:   => not a bug
 * status:  reopened => closed
 * type:  task => enhancement
 * milestone:   => Tor: unspecified


Comment:

 Replying to [comment:4 indigotime]:
 > >Tor itself should reroute the tcp port 53 request to TorDNS system to
 prevent linking.
 > No, no and no.
 >
 > It's just need to include DNSCrypt and DNS-over-TLS resolvers into Tor
 Browser (Orbot, Orfox).

 Tor Browser uses the exit to resolve DNS queries.

 The users using port 53 are running applications that don't support
 SOCKS5, or are not doing DNS.

 There's really nothing Tor can do to reliably fix applications.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26042#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list