[tor-relays] Don't use Google's DNS server

Petrusko petrusko at riseup.net
Tue May 17 08:20:24 UTC 2016


Nice software.
But you have to trust the public/open DNSCrypt resolvers ?
Or may be it's possible to build your own resolver, but it has to
resolve DNS queries with DNS roots servers, or another DNS resolver you
will trust?
Humm, the cat chasing its tail


Le 17/05/2016 01:51, Jesse V a écrit :
> On 05/16/2016 05:11 PM, Petrusko wrote:
>> But I've read on some tutorials, ISP and others "men-in-the-middle" can
>> intercept DNS queries, and answer to your server... so this solution
>> can't be 100% secure, like any DNS solution.
> 
> Not if you're using DNSSEC, but querying DNS root servers is slow.
> https://www.dnscrypt.org/ can also be useful for preventing interception.
> 
> 
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 

-- 
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160517/01c91062/attachment.sig>


More information about the tor-relays mailing list