aboutsummaryrefslogtreecommitdiff
path: root/proposals/205-local-dnscache.txt
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2013-04-14 16:30:51 -0400
committerRoger Dingledine <arma@torproject.org>2013-04-14 16:30:51 -0400
commitd48eaa7db2b165b2e1f5817381d978f498806525 (patch)
tree2ebfe917002ddc3114e0c2e7ebdca8ad0c6b63aa /proposals/205-local-dnscache.txt
parent1e8be321233a5b3dcd05cf0e1bb34fd3d75c95fb (diff)
downloadtorspec-d48eaa7db2b165b2e1f5817381d978f498806525.tar.gz
torspec-d48eaa7db2b165b2e1f5817381d978f498806525.zip
some typo fixes i found in my sandbox
Diffstat (limited to 'proposals/205-local-dnscache.txt')
-rw-r--r--proposals/205-local-dnscache.txt7
1 files changed, 4 insertions, 3 deletions
diff --git a/proposals/205-local-dnscache.txt b/proposals/205-local-dnscache.txt
index 624e793..d0a0107 100644
--- a/proposals/205-local-dnscache.txt
+++ b/proposals/205-local-dnscache.txt
@@ -28,8 +28,9 @@ Status: Closed
cache. This lets us implement exit policies and exit enclaves --
if we remember that www.mit.edu is 18.9.22.169 the first time we
see it, then we can avoid making future requests for www.mit.edu
- via any node that blocks net 18. Also, if there happened to be a
- Tor node at 18.9.22.169, we could use that node as an exit enclave.
+ via any node whose exit policy refuses net 18. Also, if there
+ happened to be a Tor node at 18.9.22.169, we could use that node as
+ an exit enclave.
But there are security issues with DNS caches. A malicious exit
node or DNS server can lie. And unlike other traffic, where the
@@ -94,7 +95,7 @@ Status: Closed
controller, the configuration file, trackhostexits maps,
virtual-address maps, DNS replies, and so on.
- With this design, the DNS cache will not be part of the address
+ With this proposed design, the DNS cache will not be part of the address
map. That means that entries in the address map which relied on
happening after the DNS cache entries can no longer work so well.
These would include: