diff options
author | Nick Mathewson <nickm@torproject.org> | 2006-09-22 20:20:26 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2006-09-22 20:20:26 +0000 |
commit | 4218f098207cedc17750ed025d939054afe7ca91 (patch) | |
tree | a0d8cadf40035ad9f19a1c25710a7ab82e527cd7 /doc | |
parent | bde5939ad3331fde6f04bdd2a08f6ed1431cc619 (diff) | |
download | tor-4218f098207cedc17750ed025d939054afe7ca91.tar.gz tor-4218f098207cedc17750ed025d939054afe7ca91.zip |
r8910@Kushana: nickm | 2006-09-22 12:14:05 -0400
Instead of just checking known-invalid addresses for DNS hijacking, we
now check randomly generated addresses, and if too many of them map to
the same IP, we assume that IP is the destination of a DNS hijack
attempt.
A little bird tells me that some DNS hijackers think that declining to
give an A record for RFC2606 addresses (like .invalid and .example)
makes them more standards compliant. Standardswise, this is like an
illicit brothel making sure that nobody has pulled the tags off the
mattresss, but that doesn't get us out of working around it.
svn:r8465
Diffstat (limited to 'doc')
0 files changed, 0 insertions, 0 deletions