On 6 February 2014 14:51, Thomas Themel <tho...@themel.com> wrote:
> Hi,
> Luther Blissett (lbliss...@paranoici.org) wrote on 2014-02-06:
>> 1. When you access the clearnet you need dns name resolving which need
>> to be "proxyfied" to avoid dns leaks. This issue is supposed to be
>> solved on decent OSes and with TBB, but it is difficult to guarantee
>> that other software/OS won't try to bypass you proxy settings, so it's a
>> permanent worry. When you connect to hidden services, name resolving is
>> done inside tor, never leaving out.
>
> I don't really get this concern. Assuming tor doesn't manage to
> intercept DNS resolution, won't trying to resolve a well-known .onion
> address leak as much information as resolving the equivalent clear
> address?

I believe you're correct. If you're worried that some crazy
combination of torsocks+adium might leak the DNS name, it might also
leak the .onion. My mostly-normally-configured Windows testing desktop
actually sends it out four times:

A record for 'whatever.onion'
A record for 'whatever.onion.apt' ('apt' being the internal domain,
companies will often use .corp or some other brand)
AAAA record for 'whatever.onion.apt'
AAAA record for 'whatever.onion'

And a published hidden service name is no more 'anonymous' than duckduckgo.com.

-tom
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to