Skip to Content.
Sympa Menu

discuss - Re: [opennic-discuss] TOR and OpenNIC

discuss AT lists.opennicproject.org

Subject: Discuss mailing list

List archive

Re: [opennic-discuss] TOR and OpenNIC


Chronological Thread 
  • From: The Doctor <drwho AT virtadpt.net>
  • To: discuss AT lists.opennicproject.org
  • Subject: Re: [opennic-discuss] TOR and OpenNIC
  • Date: Tue, 18 Sep 2012 15:10:04 -0400
  • Openpgp: id=807B17C1
  • Organization: Virtual Adept Networks, Unlimited

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/18/2012 10:32 AM, Alex Hanselka wrote:

> that OpenNIC TLDs would NOT be resolved by Tor and thus subject to
> sniffing?

If whatever client you have configured to use Tor as a proxy doesn't
do it quite right (it makes DNS resolution requests on its own, rather
than asking the proxy (i.e., tor daemon) to do so on its behalf), it
is said to leak DNS requests. If the user is under passive
surveillance by an attacker upstream, those leaked requests can give
them away.

- --
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

ICBM: 22.21621° inc/46.29824° long/78.28767° peri/3.183016
AU/0.0115980 ecc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAlBYxwwACgkQO9j/K4B7F8EuEQCgxrPbCZKBLeolRhPUp4lwYzQw
OLEAoMkIW5Xr2SyueXjsEZdSMGyMigjr
=IWrX
-----END PGP SIGNATURE-----



Archive powered by MHonArc 2.6.19.

Top of Page