[tor-relays] HOW-TO: Simple DNS resolver for tor exit operators

jpmvtd261 at laposte.net jpmvtd261 at laposte.net
Tue Sep 12 21:00:57 UTC 2017


On 12/09/2017 20:25, Ralph Seichter wrote:
> I'm not certain what you consider a "DNS attack".
> 
> Many exit node operators run a caching DNS resolver on their exits,
> which is easily done. Lacking that, you can use the resolvers run by
> your ISP, who can monitor all outbound traffic anyway, as I mentioned.
> 

An attacker can try to find what websites a Tor user has visited, by
comparing :
 - the timing of Tor user home connection traffic and
 - the timing of DNS queries happening on DNS servers controlled by the attacker

On this webpage, the author talks about "correlation" attack :
https://nakedsecurity.sophos.com/2016/10/05/unmasking-tor-users-with-dns/


More information about the tor-relays mailing list