Could be of interest for this list. An example of Internet infrastructure
vulnerability exploited by various operators. Mount an intercept attack on
the DNS protocol, and then use it for censorship or man-in-the-middle
insertion. 

From: Lauren Weinstein <[email protected]>
Subject: [ NNSquad ] Details of how Turkey is intercepting Google Public DNS
Date: March 30, 2014 at 12:45:00 PM EDT
To: [email protected]


Details of how Turkey is intercepting Google Public DNS

http://j.mp/1lwpwcV  (Bortzmeyer)

   "If you try another well-known DNS resolver, such as OpenDNS,
    you'll get the same problem: a liar responds instead.  So,
    someone replies, masquerading as the real Google Public DNS
    resolver. Is it done by a network equipment on the path, as it is
    common in China where you get DNS responses even from IP
    addresses where no name server runs? It seems instead it was a
    trick with routing: the IAP announced a route to the IP addresses
    of Google, redirecting the users to an IAP's own impersonation of
    Google Public DNS, a lying DNS resolver. Many IAP already hijack
    Google Public DNS in such a way, typically for business reasons
    (gathering data about the users, spying on them). You can see the
    routing hijack on erdems' Twitter feed, using Turkish Telecom
    looking glass: the routes are no normal BGP routes, with a list
    of AS numbers, they are injected locally, via the IGP (so, you
    won't see it in remote BGP looking glasses, unless someone in
    Turkey does the same mistake that Pakistan Telecom did with
    YouTube in 2008). Test yourself: ... Of course, DNSSEC would
    solve the problem, if and only if validation were done on the
    user's local machine, something that most users don't do today."

- - -

--Lauren--
Lauren Weinstein ([email protected]): http://www.vortex.com/lauren 



-------------------------------------------
Archives: https://www.listbox.com/member/archive/247/=now
RSS Feed: https://www.listbox.com/member/archive/rss/247/15702618-7fa41320
Modify Your Subscription:
https://www.listbox.com/member/?member_id=15702618&id_secret=15702618-916751
3e
Unsubscribe Now:
https://www.listbox.com/unsubscribe/?member_id=15702618&id_secret=15702618-f
a5046b0&post_id=20140330124740:FFC04226-B82A-11E3-A1BE-FCEEE903E9CB
Powered by Listbox: http://www.listbox.com

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to