[tor-bugs] #20925 [- Select a component]: Tor should handle DNSSec RR types (DS, DNSKEY, DLV, etc.) as well as MX
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Dec 7 22:59:02 UTC 2016
#20925: Tor should handle DNSSec RR types (DS, DNSKEY, DLV, etc.) as well as MX
--------------------------------------+-----------------
Reporter: paulj | Owner:
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: - Select a component | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
--------------------------------------+-----------------
I use a Tor client as a DNS resolver, to hide my DNS traffic generally.
Even for traffic that does not go over Tor. With the intention that with
services that multiplex/aggregate traffic for different domains to some
service provider over a secure channel, that the target domain is not
exposed to middle-men by DNS.
The idea is to frustrate passive data-collection efforts (as is now a
legal requirement on ISPs and mobile telcos in a number of countries) as
much as possible, even when not using Tor for my other data-traffic.
E.g., for email to domains hosted with some service provider (e.g. Google,
or register.com, or whatever), and delivered by SMTP over SSL, or by MSA
to a smart-host, if DNS is not obfuscated/onion-routed, then a middle man
can tell who I am emailing even if the email itself is delivered securely
over a channel that serves many many domains. As at least some countries
in Europe now require ISPs to log all customer DNS queries, this matters.
As another example, for HTTPS+SNI and for web sites that are hosted on
large, generic content providers (e.g. CDNs), a 3rd party data-collector
can not tell which website I am visiting. They only (passively) can tell I
am connecting to a CDN. At least, this is true if the DNS is obfuscated
via onion-routing.
I have a caching, recursive nameserver (BIND) configured as my primary
nameserver. I have Tor client acting as DNS server on port 5353. I have
BIND configured to forward queries to the Tor DNS on 5353.
Unfortunately:
1. For the SMTP example, Tor does not implement MX, it seems. So when BIND
gets "NotImp" from Tor, BIND fetches the MX directly itself - so at least
my email gets delivered. However, it means the MX query is visible at my
ISP and logged.
2. For the HTTPS/SNI example, Tor does support A and AAAA records, however
it does not support DNSSec related records (DS, DNSKEY, DLV are some I've
seen NotIMP returned for, NSEC,NSEC3,RRSIG, etc probably would also be
required). My BIND server is configured to make DLV-lookaside DNSSec
checks, and so the DNSSec/lookaside related DNS traffic still leaks the
target domains to my ISP.
It would be nice if Tor DNS client could support more types. This would
allow Tor to be used to onion-route all DNS client traffic, even when
other data-traffic is not being onion-routed. This would reduce the
information-leak footprint of clients to their ISPs, which would reduce
the browsing data logged on them - routinely in a number of European
countries (esp. UK).
This would therefore allow Tor to be used to enhance people's privacy,
even when Tor was not being used for the data traffic itself.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20925>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list