It’s not a threat model issue. It’s more of a let’s make Tor less dependent on a few public resolvers. Running our own resolvers just makes more sense at such a scale.
Cordially, Nathaniel Suchy (they/them) Sent from ProtonMail Mobile On Thu, Mar 5, 2020 at 1:59 AM, Alec Muffett <[email protected]> wrote: > Hey Nathaniel, > > What's your threat model here? What would you want to achieve? > > On Wed, 4 Mar 2020, 17:24 Nathaniel Suchy, <[email protected]> > wrote: > >> There has been discussion over the past several years that the Tor network >> should not use public DNS resolver as it has security implications on the >> Tor network >> (https://medium.com/@nusenu/who-controls-tors-dns-traffic-a74a7632e8ca). >> Should new Tor Exit Relays be probed and not included in the consensus until >> they're running their own DNS resolver and not relying on a public one? >> _______________________________________________ >> tor-relays mailing list >> [email protected] >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
publicKey - [email protected] - 556d8844.asc
Description: application/pgp-keys
_______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
