Re: [tor-relays] Running Bind locally

2013-09-11 Thread Eugen Leitl
As a heads-up, this fixed my recursive DNS to world issue while ability to serve authoritative domains was not impaired. Thank you, t...@t-3.net Running your own DNS is a good idea for those who got too used to all these 8.8.8.8 and 8.8.4.4 things. On Tue, Sep 10, 2013 at 04:33:23AM -0400, t...@

Re: [tor-relays] Running Bind locally

2013-09-10 Thread Yoriz
Bright Star, thank you for your elaborate explanation! On Sep 10, 2013, at 09:45 , Bry8 Star wrote: > Set your Recursive/caching DNS-Server portion in BIND to listen on > 127.0.0.1:53, And set your machine's Network adapter's DNS-Server > settings to use only 127.0.0.1 as your DNS-Server, then all

Re: [tor-relays] Running Bind locally

2013-09-10 Thread Felix Eckhofer
Hey. Am 10.09.2013 10:14, schrieb Eugen Leitl: Speaking about recursive DNS for BIND, does anyone have a working set of options which limit recursive DNS queries to just the local subnet, and another couple IPs, maybe? options { allow-recursion { 192.168.0.0/24; }; }; http://www.bind9.net/

Re: [tor-relays] Running Bind locally

2013-09-10 Thread tor
For linux bind named.conf: Within "options {" put: allow-query { any; }; allow-recursion { trusted; }; allow-query-cache { trusted; }; Then, add this new section somewhere after the options closing bracket: acl "trusted" { localhost; localnets; //netblocks/IPs you want, examples below: 123

Re: [tor-relays] Running Bind locally

2013-09-10 Thread Eugen Leitl
On Tue, Sep 10, 2013 at 12:45:03AM -0700, Bry8 Star wrote: > If you run your own BIND/named as Authoritative DNS-Server, for some > domain-name that you own, and if it is also configured to function > as a Recursive DNS-Server for local software (in that computer), and > if you have enabled DNSSEC

Re: [tor-relays] Running Bind locally

2013-09-10 Thread Bry8 Star
Hi, If you run your own BIND/named as Authoritative DNS-Server, for some domain-name that you own, and if it is also configured to function as a Recursive DNS-Server for local software (in that computer), and if you have enabled DNSSEC (for recursive side), then that would be better, imho. Such, R

Re: [tor-relays] Running Bind locally

2013-09-08 Thread Yoriz
On Sep 7, 2013, at 20:55 , Peter Palfrader wrote: > Running a local bind or unbound is probably a smart thing to do, and if > you put 127.0.0.1 into /etc/resolv.conf tor will use that. I now have a local Bind9 running, but I still get a lot of these: Sep 08 22:11:27.000 [warn] eventdns: All name

Re: [tor-relays] Running Bind locally

2013-09-07 Thread krishna e bera
On 13-09-07 02:55 PM, Peter Palfrader wrote: > On Sat, 07 Sep 2013, Yoriz wrote: > >> Does Tor use the system DNS configuration? In other words, if I would >> run a local Bind daemon, would my tor exit use it? Is that bad for the >> safety of the tor user, as the Bind daemon effectively becomes an

Re: [tor-relays] Running Bind locally

2013-09-07 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Take a look at the www.opennicproject.org Yoriz schrieb: >My VPS hoster has configured DNS as follows: > > $ cat /etc/resolv.conf > nameserver 8.8.8.8 > nameserver 8.8.4.4 > >I believe these are Google's DNS servers. Unfortunately, they are

[tor-relays] Running Bind locally

2013-09-07 Thread Yoriz
My VPS hoster has configured DNS as follows: $ cat /etc/resolv.conf nameserver 8.8.8.8 nameserver 8.8.4.4 I believe these are Google's DNS servers. Unfortunately, they are somehow unreliable (possible rate-limited by Google). My tor logs are filled with: Sep 07 16:37:24.000 [warn] e

Re: [tor-relays] Running Bind locally

2013-09-07 Thread Peter Palfrader
On Sat, 07 Sep 2013, Yoriz wrote: > Does Tor use the system DNS configuration? In other words, if I would > run a local Bind daemon, would my tor exit use it? Is that bad for the > safety of the tor user, as the Bind daemon effectively becomes an > audit log of all domains visited by tor users? R