I have not really found a name for this security flaw yet, or have'nt had any time to figure any out.
But this should really be something that the "tor-relay-configurator" should implement.
Here is a short guide how you will protect all the DNS request going out from a Exit Node a little bit:
I have not really found a name for this security flaw yet, or have'nt had any time to figure any out. But this should really be something that the "tor-relay-configurator" should implement.
Here is a short guide how you will protect all the DNS request going out from a Exit Node a little bit:
https://blog.daknob.net/guarding-your-tor-exits-dns/
About the issue itself:
http://www.zdnet.com/article/how-dns-can-be-used-to-unmask-tor-users/ https://nymity.ch/tor-dns/
This feature should be fairly simple to implement.