[tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue May 22 20:58:04 UTC 2018
#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--------------------------+----------------------------------
Reporter: cypherpunks | Owner: (none)
Type: enhancement | Status: closed
Priority: Medium | Milestone: Tor: unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution: not a bug
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------+----------------------------------
Changes (by teor):
* priority: High => Medium
* resolution: => not a bug
* status: reopened => closed
* type: task => enhancement
* milestone: => Tor: unspecified
Comment:
Replying to [comment:4 indigotime]:
> >Tor itself should reroute the tcp port 53 request to TorDNS system to
prevent linking.
> No, no and no.
>
> It's just need to include DNSCrypt and DNS-over-TLS resolvers into Tor
Browser (Orbot, Orfox).
Tor Browser uses the exit to resolve DNS queries.
The users using port 53 are running applications that don't support
SOCKS5, or are not doing DNS.
There's really nothing Tor can do to reliably fix applications.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26042#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list