[tor-talk] TAILS uses one DNS server from OpenDNS **WARNING **

Ted Smith tedks at riseup.net
Sun Oct 27 18:06:35 UTC 2013


On Sun, 2013-10-27 at 03:41 -0400, Michael Wolf wrote:
> On 10/27/2013 12:15 AM, communicationsystem at Safe-mail.net wrote:
> > Tails uses one DNS server from OpenDNS.
> >      
> > What prevents a malicious party from signing up exit nodes at OpenDNS and logging traffic, blocking content, and/or redirecting traffic?
> 
> Assuming the malicious party runs the exit node, what prevents them from
> doing any of these things anyway?

OpenDNS authenticates by IP, so anyone using the exit node can change
the OpenDNS settings if the exit node operator hasn't made an account. 

The exit node operator can do all of those things, but anyone using Tor
can do them with OpenDNS.

-- 
Sent from Ubuntu
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20131027/27a3c60d/attachment.sig>


More information about the tor-talk mailing list