[tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?
Tristan
supersluether at gmail.com
Sun Oct 16 19:28:21 UTC 2016
Unbound does cache DNS entries, but there was also serious discussion about
whether or not the cache is a privacy risk/anonymity leak, but I feel it's
worth the trade-off since public DNS servers do the same thing.
On Sun, Oct 16, 2016 at 2:23 PM, Petrusko <petrusko at riseup.net> wrote:
> Humm, I've not checked on the torproject website, tuto how to build a
> relay/exit...
> It can be nice to link a tutorial : how to set up quickly and easily a
> DNS resolver to increase privacy ?
>
> May be exit operators can understand it's not really a big job to
> apt-get install unbound (an example)
> and use root DNS servers.
> I've always read using root DNS is not very good for speed... but if I'm
> not wrong Unbound (and others) have a cache ?
>
>
>
> 16/10/2016 12:52, Toralf Förster :
> > Adding different nameserver= lines to /etc/resolv.conf than 8.8.8.8
> > shouldn't be a big thing, or ?
> --
> Petrusko
> PubKey EBE23AE5
> C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5
>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
--
Finding information, passing it along. ~SuperSluether
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161016/abe8fc3b/attachment.html>
More information about the tor-relays
mailing list