On Sat, Mar 29, 2014 at 9:48 PM, Ondrej Mikle <[email protected]>wrote:
> On 03/29/2014 01:34 PM, Kus wrote: > > FYI, today OpenDNS and Google public DNS servers are blocked too. Other > > than that, they're redirecting DNS queries to ISP servers automatically > if > > you try to use Google or OpenDNS servers. Probably, they're started to > use > > transparent DNS proxy. Btw, they're blocked them one day before the > > election day. > > You can download and install unbound recursive validating DNS resolver: > http://unbound.net/ . No need to use arbitrary DNS resolver, you have > your DNS > resolver locally. > > Won't save you if they are intercepting and tampering with DNS queries, > but it > might work for now. > > Ondrej > To tries to recognize when random DNS queries are being hijacked by ad pushers, but i dont think it can tell when specific sites are blocked in this manner. Would it be possible for Exit Node operators in such an area to have a switch they can set to reject DNS queries through it but still accept exit traffic? ServerDNSTestAddresses seems to change the entire exit policy if specified domains fail. -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
