#26042: Add a new option "RouteDNSTraffic" to prevent noobs from insecure way to use Tor. --------------------------+---------------------------------- Reporter: cypherpunks | Owner: (none) Type: enhancement | Status: closed Priority: Medium | Milestone: Tor: unspecified Component: Core Tor/Tor | Version: Severity: Normal | Resolution: not a bug Keywords: | Actual Points: Parent ID: | Points: Reviewer: | Sponsor: --------------------------+---------------------------------- Changes (by teor):
* priority: High => Medium * resolution: => not a bug * status: reopened => closed * type: task => enhancement * milestone: => Tor: unspecified Comment: Replying to [comment:4 indigotime]: > >Tor itself should reroute the tcp port 53 request to TorDNS system to prevent linking. > No, no and no. > > It's just need to include DNSCrypt and DNS-over-TLS resolvers into Tor Browser (Orbot, Orfox). Tor Browser uses the exit to resolve DNS queries. The users using port 53 are running applications that don't support SOCKS5, or are not doing DNS. There's really nothing Tor can do to reliably fix applications. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26042#comment:5> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs