On Tue, May 12, 2015 at 9:34 AM, Tom Ritter <t...@ritter.vg> wrote:

> On 12 May 2015 at 07:23, Andrew Sullivan <a...@anvilwalrusden.com> wrote:
> > If the Tor Browser has its own resolver that is used just by it and
> > that is not a separate service installed with the expectation that
> > other clients will use it, then it seems to me the built-in Tor
> > resolver is part of the application, even if it happens to be built
> > out of components that _could_ be a name resolution API or library in
> > the general case.  It is definitely my impression that (for instance)
> > the Onion Browser installed on my iphone doesn't provide services to
> > other applications, and has its very own resolution system as a
> > result.  That suggests to me that there's more than one way to do
> > this, and one of those ways is for the application to be special.
> > It's not the only way, though, I agree.
>
> Like you say there are a multitude of ways to do it, and there are
> examples of most of them:
>
> The tor daemon (often called little-t tor or just "tor") is a daemon
> running on the OS that exposes a SOCKS service for anyone who speaks
> SOCKS to connect to. You can point an unmodified browser at it, and
> access .onion services. [0]  This is also how OrBot works on Android!
>
> You can configure little-t tor to act as a DNS resolver, point
> /etc/resolve.conf at it, and have all your DNS queries go through tor,
> but not any of your actual traffic.[1][2]
>
> You can use iptables and transparently proxy non-SOCKS traffic through
> tor as either the main mechanism for internet access or as a backup to
> prevent anything from not going through tor. TAILS and other anonymous
> LiveDVD systems do this, and OrBot on Android supports this mechanism
> also, if you have root access.
>
> You can use TorBrowser, which bundles little-t tor, uses the SOCKS
> access method, and requires no configuration to access .onion
> services.
>
> You can use a SOCKS aware program to access .onion services (or the
> Internet) using TorBrowser's bundled tor, which is how Pond works.
> Shutting down TorBrowser closes the connection to .onion services, and
> Pond is stranded.
>
> You can create a bundle, like Onion Browser on iPhone, which does
> _not_ allow other applications to make use of the bundled daemon.
>

Thanks for enumerating the possibilities :)  I think those are all
consistent with the guidance in draft-appelbaum-dnsop-onion-tld, yes?  Most
of them correctly handle .onion names properly, and the DNS resolution
fails (correctly).

--Richard



>
> -tom
>
>
> [0] As mentioned, this is a wholly insecure way to access sites
> anonymously, as there are ways to a) get your real IP address b) link
> you between TLDs c) correlate your browsing sessions and d)
> fingerprint you uniquely.
>
> [1] This is kind of a nifty way to get DNS privacy.
>
> [2] If you attempt to resolve a .onion this way (as opposed to letting
> SOCKS resolve it), this is the response:
> dig @127.0.0.1 -p 5353 facebookcorewwwi.onion
>
> ; <<>> DiG 9.10.1-P1 <<>> @127.0.0.1 -p 5353 facebookcorewwwi.onion
> ; (1 server found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41248
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
>
> ;; QUESTION SECTION:
> ;facebookcorewwwi.onion. IN A
>
> ;; Query time: 0 msec
> ;; SERVER: 127.0.0.1#5353(127.0.0.1)
> ;; WHEN: Tue May 12 09:31:31 EDT 2015
> ;; MSG SIZE  rcvd: 40
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to