Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Billy Crook
On Tue, Nov 19, 2019 at 11:47 AM Mike Bolitho wrote: > This is was my thought as well. People always get up in arms about how > it's "Public DNS!" but it's really not. It's just well known and used > because it's easy to remember. > I ask the users of 4.2.2.x where it is stated by the owners of

RE: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Marshall, Quincy
On Tuesday, November 19, 2019 1:35 PM, Mike Bolitho said… “How many of (my) clients have miss-typed something and sent their data, unknowingly, to a 3rd party host? (Who’s fault would that be?) Yours? They paid you to set up their network properly and you set it up to resolve to Level 3. So

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Mike Bolitho
> > How many of (my) clients have miss-typed something and sent their data, > unknowingly, to a 3rd party host? (Who’s fault would that be?) Yours? They paid you to set up their network properly and you set it up to resolve to Level 3. So if they "unknowingly sent their data" to a third party

RE: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Marshall, Quincy
On Tuesday, November 19, 2019 12:49 PM, Mike Bolitho said… “This is was my thought as well. People always get up in arms about how it's "Public DNS!" but it's really not. It's just well known and used because it's easy to remember” I am not against their “securing” their hosts. It costs them

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Mike Bolitho
ers have only ever been for > “customers” even though they would resolve for anyone. They started > injecting NXDOMAIN redirects a while ago for non-customers. > > > > > > *From:* NANOG *On Behalf Of *Marshall, Quincy > *Sent:* Monday, November 18, 2019 12:45 PM > *

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread brent timothy saner
On 11/18/19 12:45, Marshall, Quincy wrote: > This is mostly informational and may have already hit this group. My > google-foo failed me if so. > >   > > I discovered that the CenturyLink/Level(3) public DNS (4.2.2.2, etc) are > spoofing all domains. If the hostname begins with a “w” and does

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Cary Wiedemann
Wow, news to me, and it's worse than you thought. They're spoofing responses for ALL non-existent domains, not just those starting with a "w": langsam:~# whois unregistereddomaintest.com | head -1 No match for "UNREGISTEREDDOMAINTEST.COM". langsam:~# dig +short a unregistereddomaintest.com

RE: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Ryan, Spencer
) DNS Spoofing All Domains This message originated outside of NETSCOUT. Do not click links or open attachments unless you recognize the sender and know the content is safe. This is mostly informational and may have already hit this group. My google-foo failed me if so. I discovered

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Christopher Morrow
On Wed, Nov 20, 2019 at 12:07 AM Mel Beckman wrote: > > Frontier and Verizon have been doing it for years. They have simply thumbed > their noses at NXDOMAIN. All in the name of capturing data and eyeballs By > Any Means Necessary. > Verizon USED to do this on the former UUnet customer cache

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Brandon Martin
On 11/18/19 12:45 PM, Marshall, Quincy wrote: I discovered that the CenturyLink/Level(3) public DNS (4.2.2.2, etc) are spoofing all domains. If the hostname begins with a “w” and does not exist in the authoritative zone these hosts will return two Akamai hosts. As far as I know, this has been

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Mel Beckman
Frontier and Verizon have been doing it for years. They have simply thumbed their noses at NXDOMAIN. All in the name of capturing data and eyeballs By Any Means Necessary. -mel On Nov 19, 2019, at 8:00 AM, Matthew Pounsett wrote:  On Tue, 19 Nov 2019 at 10:57, Patrick Schultz wrote:

RE: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Marshall, Quincy
On Tuesday, November 19, 2019 10:42 AM Ryan, Spencer… “Are you a CL/L3 customer?” I am a legacy L(3) customer. The availability of their AnyCast NS is public from my nets. I was on a my home TWC circuit when I ran the provided lookups. I have used the L(3) NS, in a pinch, because of their

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Matthew Pounsett
On Tue, 19 Nov 2019 at 10:57, Patrick Schultz wrote: > Just to weigh in: Here in Germany, the largest internet provider (Deutsche > Telekom) did the same thing. > It's basically just a "search guide", it redirects you to a search page > and assumes you just had a typo in the URL. > > Telekom

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Patrick Schultz
Just to weigh in: Here in Germany, the largest internet provider (Deutsche Telekom) did the same thing. It's basically just a "search guide", it redirects you to a search page and assumes you just had a typo in the URL. Telekom stopped doing that in April, after a user reported them to the

Re: Level(3) DNS Spoofing All Domains

2019-11-19 Thread Pierre Emeriaud
Le mar. 19 nov. 2019 à 16:36, Marshall, Quincy a écrit : > > I discovered that the CenturyLink/Level(3) public DNS (4.2.2.2, etc) are > spoofing all domains. If the hostname begins with a “w” and does not exist in > the authoritative zone these hosts will return two Akamai hosts. > >

Level(3) DNS Spoofing All Domains

2019-11-19 Thread Marshall, Quincy
This is mostly informational and may have already hit this group. My google-foo failed me if so. I discovered that the CenturyLink/Level(3) public DNS (4.2.2.2, etc) are spoofing all domains. If the hostname begins with a "w" and does not exist in the authoritative zone these hosts will return