Moin!

On 17 Jul 2015, at 8:00, Hugo Maxwell Connery wrote:
> For those who are trying to provide their comments to the
> 6761 discussions, I highly recommend:
>
> 1. go to https  torproject org  and download the client
> 2. Have wireshark / ethereal
> 3. Start 2 and then 3 and see what happens on the wire.
Can you for us uninformed please elaborate what happens.
That way I don't have to go to all that. Am I right that
there is leakage of dns requests with .onion TLDs? If
so isn't that a bug in their software?

Looking from a purely DNS perspective this draft says,
alter all your DNS clients, resolver and even authoritative
servers (who never would get a request for .onion anyway)
to do something different then what is in the protocol
specs. Seems a bit broad to me. But most of the discussion
seemed to focus on OSI layers above DNS (mostly above 7), 
so I didn't follow it to much.

> (Sorry; there have been many comments which displayed a lack
> of understanding of Tor from persons whose comments seem deserving
> of respect but seem under-informed).
This is the dnsop working group, so I'm not sure if I have
to know TOR to participate here. I assume that people in here
have a basic understanding of the dns protocol (knowledge in
operating DNS servers also might help as it is an ops group), 
and that everything else has to be explained in the draft. If 
my understanding of the problem (leakage) is incorrect than 
it hasn't done a good job there. I'm ok with .onion being 
a special name, but we should just do that by normal DNS
mechanism. What's wrong with answering REFUSED?. Answering
NXDomain is much harder in a DNSSEC world.

So long
-Ralf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to