https://backplanedns.org/TOR_exit_dns_resolver_howto.htm
I took the liberty in including the S for you. -Dennis -----Original Message----- From: Roman Mamedov [mailto:r...@romanrm.net] Sent: Sunday, August 06, 2017 4:17 PM To: Dennis Emory Hannon Cc: tor-relays@lists.torproject.org Subject: Re: [tor-relays] HOW-TO: Simple DNS resolver for tor exit operators On Sun, 6 Aug 2017 16:03:53 -0400 "Dennis Emory Hannon" <i...@backplanedns.org> wrote: > I decided to make a quick starter guide to introduce using a local > resolver for tor-exit node operators. I'd like to solicit some of your > feedback on things that should be added or improved upon. Hopefully > this will be a living document - My goal is to help lower the amount > of TOR exit relays using 3rd party DNS providers for client DNS > lookups. While it doesn't address all security concerns, it's a > necessary step to improving anonymity of TOR's users. Let me know what you think. > > Guide is meant for debian/linux users > http://backplanedns.org/TOR_exit_dns_resolver_howto.htm > ... > in the clearweb are being probably being logged. In this simple > tutorial ... Your tutorial is in the clearweb itself, and probably not only being logged, but also can be MITMed to include all sorts of malicious instructions and/or rewrite the recommended third party resolver IPs to an attacker-controlled ones. Why not use HTTPS for the website? Doubly weird that you want to educate others on security topics, and then don't follow the best practices yourself. -- With respect, Roman _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays