DNS Isolation #2685
-
I'm having an issue with my setup, which consists of multiple servers with anonymized relays. The problem is that when I use a tool like https://browserleaks.com/dns, it reveals all my specified server names. I've been trying to fix the issue by experimenting with different combinations of lb_estimator and lb_strategy settings. However, I'm not sure why the random lb_strategy works the way it does, and I'm also unsure why the test results in so many ISPs and locations. Is this the expected behavior? To replicate the issue, I've found that:
What I'm hoping for is that when lb_estimator is set to false and lb_strategy is set to random or p1, the system will randomly choose a single server from the server names list or from the routes, regardless of its initial latency. This should result in only one ISP and one location showing up in the browserleaks.com/dns test, instead of the locations of all specified servers. This issue template is making it hard to explain things, due to its redundant structure. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 6 replies
-
The way DNS works, is that in order to resolve a query, your computer sends it to server A. If server A doesn't have the response in its temporary cache, it's going to ask server B (and possibly more) to get the answer. If the website (in your case Long story short, websites know what DNS resolvers you are using. The DNS protocol or client settings can't do anything against that. But this is not a big deal. Resolvers are not meant to be secret. |
Beta Was this translation helpful? Give feedback.
-
IMHO:
|
Beta Was this translation helpful? Give feedback.
Back in 2017, a study titled "The Effect of DNS on Tor's Anonymity" explored the vulnerabilities of the Tor network, particularly about DNS correlation attacks. The researchers conducted various experiments that showed how certain (major) adversaries could control a significant portion of DNS requests leaving the Tor network. For instance, they found that Google handled about 33% of all DNS requests, with peaks reaching over 40%.