[tor-relays] Should new exit relays be probed for public DNS resolvers

Nathaniel Suchy nathanielsuchy at protonmail.com
Thu Mar 5 14:20:52 UTC 2020


It’s not a threat model issue. It’s more of a let’s make Tor less dependent on a few public resolvers. Running our own resolvers just makes more sense at such a scale.

Cordially,
Nathaniel Suchy (they/them)

Sent from ProtonMail Mobile

On Thu, Mar 5, 2020 at 1:59 AM, Alec Muffett <alec.muffett at gmail.com> wrote:

> Hey Nathaniel,
>
> What's your threat model here? What would you want to achieve?
>
> On Wed, 4 Mar 2020, 17:24 Nathaniel Suchy, <nathanielsuchy at protonmail.com> wrote:
>
>> There has been discussion over the past several years that the Tor network should not use public DNS resolver as it has security implications on the Tor network (https://medium.com/@nusenu/who-controls-tors-dns-traffic-a74a7632e8ca). Should new Tor Exit Relays be probed and not included in the consensus until they're running their own DNS resolver and not relying on a public one?
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays at lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20200305/5e07a949/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: publicKey - nathanielsuchy at protonmail.com - 556d8844.asc
Type: application/pgp-keys
Size: 3129 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20200305/5e07a949/attachment.key>


More information about the tor-relays mailing list