I'm wondering whether clients, using tor's DNSPort as upstream DNS
server, were  "accidentally protected" against exploits trying to take
advantage of this vulnerability.
(or the other way around: where exits in a "lucky" position to
compromise all their clients by providing them special DNS responses)

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to