Re: [tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.

2018-05-22 Thread Tor Bug Tracker & Wiki
#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--+--
 Reporter:  cypherpunks   |  Owner:  (none)
 Type:  enhancement   | Status:  closed
 Priority:  Medium|  Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:  not a bug
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by teor):

 * priority:  High => Medium
 * resolution:   => not a bug
 * status:  reopened => closed
 * type:  task => enhancement
 * milestone:   => Tor: unspecified


Comment:

 Replying to [comment:4 indigotime]:
 > >Tor itself should reroute the tcp port 53 request to TorDNS system to
 prevent linking.
 > No, no and no.
 >
 > It's just need to include DNSCrypt and DNS-over-TLS resolvers into Tor
 Browser (Orbot, Orfox).

 Tor Browser uses the exit to resolve DNS queries.

 The users using port 53 are running applications that don't support
 SOCKS5, or are not doing DNS.

 There's really nothing Tor can do to reliably fix applications.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.

2018-05-22 Thread Tor Bug Tracker & Wiki
#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--+--
 Reporter:  cypherpunks   |  Owner:  (none)
 Type:  task  | Status:  reopened
 Priority:  High  |  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by indigotime):

 >Tor itself should reroute the tcp port 53 request to TorDNS system to
 prevent linking.
 No, no and no.

 It's just need to include DNSCrypt and DNS-over-TLS resolvers into Tor
 Browser (Orbot, Orfox).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.

2018-05-08 Thread Tor Bug Tracker & Wiki
#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--+--
 Reporter:  cypherpunks   |  Owner:  (none)
 Type:  task  | Status:  reopened
 Priority:  High  |  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by cypherpunks):

 * status:  closed => reopened
 * cc: wanking@… (added)
 * resolution:  wontfix =>


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.

2018-05-08 Thread Tor Bug Tracker & Wiki
#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--+-
 Reporter:  cypherpunks   |  Owner:  (none)
 Type:  task  | Status:  closed
 Priority:  High  |  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:  wontfix
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+-
Changes (by cypherpunks):

 * status:  new => closed
 * resolution:   => wontfix


Comment:

 - analyzing exit traffic is a no-go
 - manipulating destinations clients defined is a no-go

 - you can not assume that everything on TCP/53 is DNS

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.

2018-05-07 Thread Tor Bug Tracker & Wiki
#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--+
 Reporter:  cypherpunks   |  Owner:  (none)
 Type:  task  | Status:  new
 Priority:  High  |  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|
--+

Comment (by cypherpunks):

 http://mayakron.altervista.org/wikibase/show.php?id=AcrylicConfiguration

 PrimaryServerProtocol=SOCKS5
 PrimaryServerProxyAddress=127.0.0.1
 PrimaryServerProxyPort=9150
 PrimaryServerAddress=8.8.8.8
 PrimaryServerPort=53

 (copied from some website titled 'how to use Tor with DNS')

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26042 [Core Tor/Tor]: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor.

2018-05-07 Thread Tor Bug Tracker & Wiki
#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to
use Tor.
--+
 Reporter:  cypherpunks   |  Owner:  (none)
 Type:  task  | Status:  new
 Priority:  High  |  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
--+
 RouteDNSTraffic 1
 (default: 1, enabled.)


 Analyzed my exit node's traffic, I noticed many users is sending DNS
 traffic over Tor, expecially targeting 8.8.8.8.

 Tor itself should reroute the tcp port 53 request to TorDNS system
 to prevent linking.

 https://nakedsecurity.sophos.com/2016/10/05/unmasking-tor-users-with-dns/
 https://lists.torproject.org/pipermail/tor-relays/2016-May/009255.html


 Before:
 User === Tor - Tor node ---> 8.8.8.8

 After:
 User === Tor[ --reroute-to-TorDNS-system ]<--->Tor node

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs