On 12.09.17 22:11, jpmvtd...@laposte.net wrote:

> My idea is designed to protect the exit node against a DNS attack from
> the owner of the DNS server. Not from the ISP or an attacker monitoring
> the traffic going in and out of the ISP data center.

I'm not certain what you consider a "DNS attack".

Many exit node operators run a caching DNS resolver on their exits,
which is easily done. Lacking that, you can use the resolvers run by
your ISP, who can monitor all outbound traffic anyway, as I mentioned.

-Ralph
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to