summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2006-09-22 20:20:26 +0000
committerNick Mathewson <nickm@torproject.org>2006-09-22 20:20:26 +0000
commit4218f098207cedc17750ed025d939054afe7ca91 (patch)
treea0d8cadf40035ad9f19a1c25710a7ab82e527cd7 /doc
parentbde5939ad3331fde6f04bdd2a08f6ed1431cc619 (diff)
downloadtor-4218f098207cedc17750ed025d939054afe7ca91.tar.gz
tor-4218f098207cedc17750ed025d939054afe7ca91.zip
r8910@Kushana: nickm | 2006-09-22 12:14:05 -0400
Instead of just checking known-invalid addresses for DNS hijacking, we now check randomly generated addresses, and if too many of them map to the same IP, we assume that IP is the destination of a DNS hijack attempt. A little bird tells me that some DNS hijackers think that declining to give an A record for RFC2606 addresses (like .invalid and .example) makes them more standards compliant. Standardswise, this is like an illicit brothel making sure that nobody has pulled the tags off the mattresss, but that doesn't get us out of working around it. svn:r8465
Diffstat (limited to 'doc')
0 files changed, 0 insertions, 0 deletions