[tor-bugs] #21989 [Core Tor/Tor]: Should we tell Exits to reject all traffic if DNS fails?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Jul 5 13:51:49 UTC 2019
#21989: Should we tell Exits to reject all traffic if DNS fails?
-------------------------------------------------+-------------------------
Reporter: teor | Owner: (none)
Type: enhancement | Status: new
Priority: Medium | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: dns, tor-exit, reliability self- | Actual Points:
test |
Parent ID: | Points: 1
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by cypherpunks):
If i pass traffic to a
{{{
SocksPort IPv4Traffic IPv6Traffic OnionTraffic NoDNSRequest
}}}
user can expect still use this relay? they are still providing rare exit
bandwidth. make use of it as far as possible?
client needs somehow know, the exit cant resolve dns. so that it does not
choose to attach a stream with hostname to it. just like it checks
exitpolicy to see if it would with usually Support connection target
address:port
it would be nice to mark this exit as BadDNS or something. to let client
know, not to choose it while using hostname targets. but in any other
case.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21989#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list