Hi Andrew, If I understand your question correctly, you are asking whether in the instance that a DNS server receives and caches a NXDOMAIN for some/all .onion, whether that could impact software which uses Tor?
Software which uses Tor does so via a proxy which internally performs the resolution of the target “.onion” address (or any website, via Tor) into a TCP-like circuit which connects to the destination server. Thus the situation should be that either: a) the software in question is talking to a Tor proxy which acts as a gateway to the Tor network (and to the rest of the internet-via-Tor) which resolves ".onion” addresses meaningfully, or else: b) the software in question is *not* talking to a Tor proxy, and therefore cannot meaningfully resolve or communicate with onion addresses, nor use the Tor network. If the software is somehow both talking and bypassing the proxy, my sense is that it would be the software's responsibility to deal with the self-imposed complex situation in a sane manner; an example of this might be http://en.wikipedia.org/wiki/Tor2web -a On 3/21/15, 11:12 PM, "Andrew Sullivan" <a...@anvilwalrusden.com> wrote: >In section 4, 3-5, what if a "synthetic" NXDOMAIN gets generated and >cached? Will that have any effect on .onion resolution? If this is >explained in detail in some thing I've failed to follow, a simple >reference would be enough. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop