Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-grothoff-iesg-special-use-p2p-names-00.txt]

Patrik Fältström <paf@frobbit.se> Wed, 04 December 2013 03:46 UTC

Return-Path: <paf@frobbit.se>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE3FA1ADF91 for <dnsop@ietfa.amsl.com>; Tue, 3 Dec 2013 19:46:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.252
X-Spam-Level:
X-Spam-Status: No, score=-1.252 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_SE=0.35, MIME_8BIT_HEADER=0.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bCW1hOF9FbQk for <dnsop@ietfa.amsl.com>; Tue, 3 Dec 2013 19:46:52 -0800 (PST)
Received: from mail.frobbit.se (mail.frobbit.se [IPv6:2a02:80:3ffe::176]) by ietfa.amsl.com (Postfix) with ESMTP id 7C73E1ADBE8 for <dnsop@ietf.org>; Tue, 3 Dec 2013 19:46:52 -0800 (PST)
Received: from [192.168.1.32] (frobbit.cust.teleservice.net [85.30.128.225]) by mail.frobbit.se (Postfix) with ESMTPSA id 10D7E202C6 for <dnsop@ietf.org>; Wed, 4 Dec 2013 04:46:48 +0100 (CET)
From: Patrik Fältström <paf@frobbit.se>
Content-Type: multipart/signed; boundary="Apple-Mail=_299AF1A0-8A1D-496B-A7A1-2391F64E8B83"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Message-Id: <348521C3-EDFE-46E3-BAC6-8D6FDBD6D129@frobbit.se>
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
Date: Wed, 04 Dec 2013 04:46:46 +0100
References: <20131201164841.GB12135@sources.org> <BF87877A-8989-4AA4-9ED1-52C82E1BC538@nominum.com> <alpine.LFD.2.10.1312011206480.12923@bofh.nohats.ca> <20131202151651.GD16808@mx1.yitter.info> <A12FD3E0-58F6-4490-877F-A9C59405F717@vpnc.org> <6DBBC8339C394DBDAE4FE1F764E02A8D@hopcount.ca> <20131203170825.GA17211@nic.fr> <21D03162-81D1-494A-89A9-41BE89D28A0E@nominum.com> <BB7627E9-8D50-48E5-B809-64AE4D574271@virtualized.org> <20131203221006.GB5689@sources.org> <D3E446D0-F9ED-4671-A1C2-29A15D3DE010@virtualized.org>
To: dnsop WG <dnsop@ietf.org>
In-Reply-To: <D3E446D0-F9ED-4671-A1C2-29A15D3DE010@virtualized.org>
X-Mailer: Apple Mail (2.1822)
Subject: Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-grothoff-iesg-special-use-p2p-names-00.txt]
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Dec 2013 03:46:53 -0000

Btw, I did ask a person working with these things how this is implemented in reality, out in the world, and the following is the response:

> *** At this point I don't think there's a global plugin for all of
> them. The Tails distribution has a nice page explaining how to enforce
> Tor (and I2P) that covers DNS resolution hijacking, HTTP proxying, and
> IP redirection of 127.192.0.0/10 to ensure all traffic not destined to
> clear Internet goes through Tor and I2P.
> 
> https://tails.boum.org/contribute/design/Tor_enforcement/
> 
> Assuming you have Tor and I2P running, you could declare an HTTP and
> SOCKS proxy on localhost--e.g. using Privoxy, and then configure
> Privoxy to route .i2p to the local I2P resolver (localhost:8887), and
> .onion to the Tor resolver (localhost:9050)
> 
> It works similarly for .bit (Namecoin) or the GNS, but the preferred
> method is via the Name Service Switch because those can and do provide
> different RR types that are not available with the DNS RR types. E.g.,
> for GNUnet you would do:
> 
> # grep hosts /etc/nsswitch.conf
> hosts: files gns [NOTFOUND=return] dns
> 
> You might also need to remove the reverse path filtering on your
> virtual gnunet-dns interface:
> 
> # echo 0 > /proc/sys/net/ipv4/conf/gnunet-dns/rp_filter
> 
> Tor's trac also have an extensive page on DNS resolution alternatives
> and their configuration:
> 
> https://trac.torproject.org/projects/tor/wiki/doc/DnsResolver
> 
> Hope that helps,

   Patrik