[tor-bugs] #34004 [Core Tor/Tor]: Support for full DNS and DNSSEC resolution

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Apr 27 09:00:18 UTC 2020


#34004: Support for full DNS and DNSSEC resolution
--------------------------+------------------------------------
 Reporter:  chrisss404    |          Owner:  (none)
     Type:  enhancement   |         Status:  needs_review
 Priority:  Medium        |      Milestone:  Tor: 0.4.4.x-final
Component:  Core Tor/Tor  |        Version:
 Severity:  Major         |     Resolution:
 Keywords:  DNS, DNSSEC   |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+------------------------------------

Comment (by cypherpunks):

 Thanks for the great patch.

 It is one big step forward to giving more reliability and control to
 client of what plaintext information, addresses of contacted hosts you may
 share with exit relays. Less trust must be given to exit relay, because
 they could lie to you in DNS response without your knowledge! DNSSEC gives
 a way to verify.

 Also it will make client connections through exit servers more reliable.
 Because many of them fail at not so unimportant low rates, that makes them
 "unusable" (for tbb ) or any domain name based connections. discussed
 beforehand #32864

 It will take of load and bandwidth off exit relays witch is the overall
 lowest advertised bandwidth in tor consensus to date.

 SESSION_GROUP_DNS_LOOKUP will ensure, that if you look up hostname from
 socksport request to .torproject.org, it will not be send to the resolver
 over the same exit circuit the than resolved ip connection stream is going
 to use. If a clearnet resolver may be used.
 This gives the exit node or anyone monitoring it, no clue about what host
 you may contacted, if not does deep packet inspection and the IP not have
 a single mapped domain and no reverse dns record to it or used protocol
 exposes it. (like http host header| | tls without esni)

 My only concern is the privacy gain that one may like or think to earn
 from using onion resolvers with this solution configured with
 DNSResolverNameservers.

 1.

 SESSION_GROUP_DNS_LOOKUP along with default isolation effectively allows
 to let two streams or lets call it domain name resolution lookups to share
 the same circuit.

 Example Scenario:

 TBB user visits .torproject.org and in new tab visits .cock.li

 Without
 {{{
 DNSResolver
 }}}

 tor will open two destination isolated circuits each attaching stream
 resolving its domain through exit.
 exit will not learn both destinations.

 With enabled
 {{{
 DNSResolver 1
 }}}

 tor will open two destination isolated circuits each resolving its domain
 beforehand through stream to configured DNSResolverNameservers through
 same resolver circuit.
 exit will not learn both destinations. Bonus Exit will not learn domain
 name.
 Resolver will learn, a user that first contacted .torproject.org may got a
 mail address from .cock.li too.
 even if Resolver is contact with the default onionresolvers. Because, the
 first stream of resolver MAY can share the same circuit. The resolver
 owner will not know the ip or country of the request but knows that both
 came from the same client (individual)!
 Effectively ignoring and erasing the isolation flags of socksport,
 decreasing the isolation level.
 Allowing resolver to learn activity profiles over time, by correlating dns
 requests.



 it is even worse if the client should use the same resolver as before the
 two isolated exit servers. because now there is a connection between these
 two. i hope to have made it clear with the example.

 Note: I only did a quick look over it. That is what came up to my mind.
 Not tested it out actually yet.

 ''sogar wenn der client denselben resolver verwenden sollte wie zuvor die
 beiden isoliert verwendeten exit server, ist es schlechter. da nun ein
 Zusammenhang zwischen diesen beiden besteht. ich hoffe es mit dem Beispiel
 deutlich gemacht zu haben.''

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/34004#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list