On 7 feb 2012, at 22:08, Ondrej Mikle wrote:
> 1. full packet might leak identifying information about OS or resolver used,
> quoting Nick:
>> There are parts of a DNS packet that we wouldn't want
>> to have the Tor client make up. For example, DNS transaction IDs
>> would need to avoid collision
Ondrej,
I may have missed parts of the previous discussion, but why are you not
encapsulating the whole DNS request from the client? Various flags and other
options (e.g. EDNS0) would be quite useful to be able to transport across the
TOR network.
jakob
___