My idea is designed to protect the exit node against a DNS attack from the owner of the DNS server. Not from the ISP or an attacker monitoring the traffic going in and out of the ISP data center.
On 12/09/2017 19:38, Ralph Seichter wrote: > On 12.09.17 21:17, jpmvtd...@laposte.net wrote: > >> My idea is to make more DNS queries than necessary, in order to hide >> the useful DNS queries among useless DNS queries. > > I'm not sure what you are trying to accomplish. Usually, a DNS query is > followed by an outbound connection to the returned IP address. Your ISP > can always monitor these connections from your exit node, no matter what > additional "query noise" you might introduce. > > This is not fiction. One of my ISPs sends me automated tickets every > once in a while, about network scans that abuse my exit nodes. Not only > are connections recorded, they are analysed for patterns. > > -Ralph _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays