>Would you please report it upstream, and mark this Debian bug as
>forwarded, or should I?

I'm inexperienced with git and GNU development, and only know how to
write bug reports (lucky me).  So I apologize for not being on the
ball.

Is there a proper automated way to do this in a way that preserves the
tracability each way?  Or do I need to create an account on the
torproject.org git server, and manually add the report there?

I see that there is a tag indicating that this bug was forwarded, so
I'll assume for the moment you took care of it.  If not, please reply
and I'll get on it.

>With my Tails developer hat on (and my Debian developer hat off), I'm
>surprised, since I don't remember any situation where "the Tails
>project" was harmed by this issue. Could you please clarify?

I'm not a Tails developer, but someone mentioned in IRC that an
attempt was made to implement ttdnsd and pdnsd in Tails, and that the
Tails developers abandoned that approach because they couldn't make it
work.

>> Ideally, an optimum tor environment includes ttdnsd and pdnsd
>> packages.

>(This is getting off-topic, but given the shape of the pdnsd package,
>and the highly buggy state of ttdnsd itself, I would certainly not
>call this "optimum".)

I was describing the optimum scenario from a design standpoint without
considering the quality of these tools.  It would be superior
(particularly in the GNU environment) to isolate DNS duties to a
dedicated DNS server, which can be configured and controlled
independant of the payload traffic.  This separation of duties is
really the only proper way to do DNS.  Admins have different DNS
resources, different needs, and different threat models that are
particular to DNS, and would be best served if they could control a
DNS server and also get detailed DNS logging that would make it easier
to spot DNS poisoning.

ttdnsd did not strike me as a quality robust tool (being that it's a
script that was intended for a SOHO router).  ttdnsd and pdnsd could
merely be considered examples for how one might run torsocks w/ a
disabled tordns.  Some admins may find DNS leaks acceptible for MX
queries (considering the status quo is no MX lookup service at all,
and thus must abandon tor entirely in order to function).

Giving purpose to ttdnsd and pdnsd would also motivate their
improvement.. or perhaps motivate forks and alternatives.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to