On 9/1/15, John R Levine <jo...@taugh.com> wrote: > Speaking of which ... > >> It is a critical flaw that fails open. The DNS continues to work but >> users are put into harm's way. ... > >>> Also please keep in mind that we're having this discussion because of >>> design tradeoffs in the implementation of Tor. If they'd made onion a >>> URI scheme rather than a pseudo-domain, onion://blah rather than >>> http://blah.onion, there's be no leakage problem since browsers that >>> don't know about onion: would just reject them. ... > >> I'm aware of the context, I'm a co-author of the RFC in question. The >> solution you present is not practical for integration across most >> programs without huge modifications to nearly every program. > > So, just to clarify, the DNS leaks and it's a critical flaw, but Tor > applications leak and that's just the way it is?
Tor doesn't leak .onion names. The DNS does share information with the network as plain text. This critical privacy flaw is exploited by perpetrators of mass and targeted surveillance for computer and network exploitation purposes, amongst other issues. > I'm not opposed to mitigating the damage, but let's think more carefully > about the stones we're throwing, please. I'm not intending to throw stones, sorry. Tor doesn't leak .onions - other web browsers, ssh clients, jabber clients and other software *may* leak .onions. Many users try to resolve .onions in a variety of amazing ways, most of whom have never used Tor, I'd guess. Tor currently handles .onions correctly and to my knowledge is not responsible for leaking .onions, ever. If the name is reserved and the process is followed, we'll hopefully be able to stop most of the leakage in the DNS. This will mitigate some of the damage caused by a lack of query privacy. It also allows us to protect the intentional users of .onion by acknowledging their usage and their deployment realities. All the best, Jacob _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop