On 12.09.17 22:11, [email protected] wrote: > My idea is designed to protect the exit node against a DNS attack from > the owner of the DNS server. Not from the ISP or an attacker monitoring > the traffic going in and out of the ISP data center.
I'm not certain what you consider a "DNS attack". Many exit node operators run a caching DNS resolver on their exits, which is easily done. Lacking that, you can use the resolvers run by your ISP, who can monitor all outbound traffic anyway, as I mentioned. -Ralph _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
