Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-15 Thread Jonathan Sélea
Great initiative! Personally I would also see some sort of "DANE" for Tor-relays in the future too, but that is a request for another thread. / Jonathan > On 12.04.18 13:05, Alexander Dietrich wrote: > >> Just to be safe, you could also check the rest of the dig output and >> /etc/resolv.conf (or

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-12 Thread Ralph Seichter
On 12.04.18 13:05, Alexander Dietrich wrote: > Just to be safe, you could also check the rest of the dig output and > /etc/resolv.conf (or relevant resolver configuration on your system) > to make sure your BIND is being used. I have seen hosters where /etc/resolv.conf is overwritten whenever

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-12 Thread nusenu
Dhalgren Tor: > Respectfully, I disagree. > https://lists.torproject.org/pipermail/tor-relays/2015-October/007904.html wrote: > Spent a few minutes activating the DNSSEC trust-anchor for 'unbound'. > > Ran 'dig' on a few signed domains and observed that queries that took > under 50

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-12 Thread nusenu
as a quick and easy test you can always try to resolve a hostname with known invalid DNSSEC records: www.dnssec-failed.org -- https://mastodon.social/@nusenu twitter: @nusenu_ signature.asc Description: OpenPGP digital signature ___ tor-relays

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-12 Thread Paul Templeton
Thanx Alexander > Just to be safe, you could also check the rest of the dig output and > /etc/resolv.conf (or relevant resolver configuration on your system) to > make sure your BIND is being used. The flags look fine, though. resolv.conf only has 127.0.0.1 and Dig responds from 127.0.0.1 -

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-12 Thread Alexander Dietrich
On 2018-04-11 04:10, Paul Templeton wrote: When I do a dig +dnssec . | grep ";; flags:" I get ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1 this looks as if its working. Just to be safe, you could also check the rest of the dig output and /etc/resolv.conf (or

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-10 Thread Paul Templeton
Hi All, Is there anyone who uses Bind9? I'll setup DNSSEC on all Exits but I would like to validate the config. I have done this on 41781FDC57238DAB955DF6D6E8400CEC5ACBE706 options { directory "/var/cache/bind"; dnssec-enable yes; dnssec-validation yes;

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-10 Thread Dhalgren Tor
Respectfully, I disagree. https://lists.torproject.org/pipermail/tor-relays/2015-October/007904.html Thank you for the thought however. ___ tor-relays mailing list tor-relays@lists.torproject.org

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-10 Thread teor
Hi, Please consider using BCC next time you remove obfuscation from people's emails, and then send out a mass email. T ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-10 Thread Ralph Seichter
On 09.04.18 13:10, nusenu wrote: > I recommend a local caching unbound (https://unbound.net/) DNS > resolver without using an upstream DNS forwarder. No forwarders indeed. Additionally, I recommend the following settings in the unbound.conf of Tor exits: # Disable logging. log-queries: no

[tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-10 Thread nusenu
Dear Tor Exit Relay Operator, thanks for operating tor exit relays! In addition to forwarding packets exit relays also do DNS hostname resolution on behalf of tor clients. DNSSEC [1] is a standard that allows DNS clients to validate the authenticity of DNS records (if the domain owner choose to