Tor has introduced this new cool tool they call oniux. On the page announcing it they show off a #curl command line that hasn't worked for two years... since curl nowadays refuses to resolve .onion names like RFC 7686 says.

blog.torproject.org/introducin…

#curl

daniel:// stenberg:// reshared this.

in reply to daniel:// stenberg://

Discussed here: github.com/curl/curl/issues/17…
in reply to daniel:// stenberg://

looking at the torproject discussion about this gitlab.torproject.org/tpo/core…

and it seems like an irresolvable problem.

On one hand you have people setting up LANs that have all their outbound traffic sent through Tor, and are supposed to work with any tor-unaware device.

On the other hand, saying "the LAN you're in is behind Tor" is exactly what an attacker would say to induce user devices to leak onion lookups...

in reply to daniel:// stenberg://

blocking special name resolution in the applications, without defined way to indicate when such resolution should be safe, were asking for this exact problem. Tor expected only whole applications to be onion enabled, not VPN-like behaviour. Perhaps special option in resolv.conf could enable passing onion names to DNS servers specified there. Local resolvers often block it properly anyway. Ideally it should have separate nsswitch module and not using common DNS plugin.
in reply to daniel:// stenberg://

it seems to me this RFC cannot work with network or system level .onion support and should be replaced.

I think applications need API to query system resolver, whether DNS is handled by localhost or trusted resolver. And if .onion names are considered a special handled domain. I think we lack both on Linux now.

This RFC assumes only per-application support can be safe. Applications should query the OS support and enable it if indicated. But resolver related apis are ancient already.