Re: [tor-relays] DNS server

2022-04-11 Thread onionize
Does Cash DNS give some advantages in safety? On 2022-04-08 08:06, Thoughts wrote: > Note that any dns caching software would help, unbound is just one > popular one. dnsmasq is another. In fact, if you wanted to, you > could use the full bind package and configure it for caching and >

Re: [tor-relays] DNS server

2022-04-11 Thread Thoughts
DNS Caching (not Cash) simple does a normal lookup for an DNS domain requested and remembers it for some period of time so that it can answer from its cache of known addresses in microseconds (instead of the hundreds of milliseconds it might take to inquire over the internet) the next time

Re: [tor-relays] DNS server

2022-04-09 Thread Thoughts
Note that any dns caching software would help, unbound is just one popular one.  dnsmasq is another.  In fact, if you wanted to, you could use the full bind package and configure it for caching and forwarding, although that would be a bit of overkill.  Once you install caching software, make

Re: [tor-relays] DNS server

2022-04-08 Thread abuse--- via tor-relays
>From my point of view, it's mostly about reliability. You can use the hoster's >DNS resolver, but be aware that a high-bandwidth exit asks a lot of DNS >requests. Not every hoster's DNS resolver might be able to cope with it and as >a result your exit might give users a poor experience.  Best

[tor-relays] DNS server

2022-04-08 Thread onionize
I was setting up exit nodes and I had a question. Why is it recommended to use DNS caching software Unbound? What benefits does it provide compared to using hoster's DNS resolver? ___ tor-relays mailing list tor-relays@lists.torproject.org

Re: [tor-relays] DNS Server

2019-01-23 Thread Dmitrii Tcvetkov
On Wed, 23 Jan 2019 11:23:50 +0100 dns1...@riseup.net wrote: > Of course. But, as far as I know, you can host multiple domains to > the same ip. So, in such case, if you only know the ip you can't tell > what domain I visit. > If your adversary is able to catch your packets, then he's able to

Re: [tor-relays] DNS Server

2019-01-23 Thread dns1983
Ok, i understood. So, for my purposes it's not useful to change dns servers. I'll continue to use my ISP DNS servers or those of my virtual server provider. Thanks Il 23 gennaio 2019 15:54:34 CET, Dmitrii Tcvetkov ha scritto: >On Wed, 23 Jan 2019 11:23:50 +0100 >dns1...@riseup.net wrote: > >>

Re: [tor-relays] DNS Server

2019-01-23 Thread dns1983
Of course. But, as far as I know, you can host multiple domains to the same ip. So, in such case, if you only know the ip you can't tell what domain I visit. It's just that I don't understand why the public dns providers claim to improve privacy. Il 23/01/19 09:01, Rose ha scritto:

Re: [tor-relays] DNS Server

2019-01-23 Thread Rose
adversaries can already see what IP addresses you are connecting to, even though they can't see your DNS queries, they can easily just do a reverse DNS on the IP addresses you connect to, to find out what you were doing. On 23/01/19 2:32 PM, dns1...@riseup.net wrote: > In the threat model that I

Re: [tor-relays] DNS Server

2019-01-22 Thread dns1983
In the threat model that I worry about, DNS are part of the problem. If a malicious entity can put together DNS data with other big data, It can increases its power and becomes a more dangerous threat. But as I said, I lack many networking notions. Anyway I find very satisfying the solutions

Re: [tor-relays] DNS Server

2019-01-22 Thread eric gisse
This is what I do: My tor exit node runs on its own, but I have a full caching bind server on a different VM. This services some domains I run, with ACLs to do regular DNS. I use the following DNS servers: 2606:4700:4700:: -- Cloudflare 2001:1608:10:25::1c04:b12f -- https://dns.watch/

Re: [tor-relays] DNS Server

2019-01-22 Thread dns1983
Ah, I didn't know It, obviously ;). Thanks Il 22 gennaio 2019 10:29:39 CET, Rose ha scritto: >*the option should go in your torrc > >On 22/01/19 5:26 PM, Rose wrote: >> If you run Tor on your devices in your home network, you can use the >> option 'DNSPort ', so for example, if you did

Re: [tor-relays] DNS Server

2019-01-22 Thread Rose
*the option should go in your torrc On 22/01/19 5:26 PM, Rose wrote: > If you run Tor on your devices in your home network, you can use the > option 'DNSPort ', so for example, if you did 'DNSPort 53' > (default port for DNS), and set your DNS to 127.0.0.1, you can make it > so all your DNS

Re: [tor-relays] DNS Server

2019-01-22 Thread Rose
If you run Tor on your devices in your home network, you can use the option 'DNSPort ', so for example, if you did 'DNSPort 53' (default port for DNS), and set your DNS to 127.0.0.1, you can make it so all your DNS queries go over Tor anonymously. On 22/01/19 5:13 PM, dns1...@riseup.net wrote: >

Re: [tor-relays] DNS Server

2019-01-22 Thread dns1983
OK. I think that I'll buy a new virtual server in an anonymously way, set my DNS server and than use that server for my exit relays and my devices too. I have just to think how to anonymize queries from my home network. Thanks Il 22 gennaio 2019 10:05:41 CET, Rose ha scritto: >The best

Re: [tor-relays] DNS Server

2019-01-22 Thread Rose
The best option for DNS is doing DNS resolution yourself, the Tor relay guide wiki talks about how to do this on common Linux distros and FreeBSD https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#DNSonExitRelays On 22/01/19 4:43 PM, dns1...@riseup.net wrote: > Hello, > > i'm a

[tor-relays] DNS Server

2019-01-22 Thread dns1983
Hello, i'm a student, so I lack many networking notions. Which are the most privacy reliable public dns servers? I don't exactly know how choose a third part DNS server. I read that cloudfare servers are audited by third parties but I'm not sure that I can trust. do you think that audition