All that work when they really only needed a DST nat rule to rewrite where dns queries were being sent :)
On Wed, Apr 2, 2014 at 3:52 PM, Justin Wilson <[email protected]> wrote: > http://www.bgpmon.net/turkey-hijacking-ip-addresses-for-popular-global-dns-providers/ > > At BGPmon we see numerous BGP hijacks every single day, some are interesting > because of the size and scale of the hijack or as we've seen today because > of the targeted hijacked prefixes. > > It all started last weekend when the Turkish president ordered the > censorship of twitter.com. This started with a block of twitter by returning > false twitter IP addresses by Turk Telekom DNS servers. Soon users in > Turkey discovered that changing DNS providers to Google DNS or OpenDNS was a > good method of bypassing the censorship. > But as of around 9am UTC today (Saturday March 29) this changed when Turk > Telekom started to hijack the IP address for popular free and open DNS > providers such as Google's 8.8.8.8, OpenDNS' 208.67.222.222 and Level3's > 4.2.2.2. > > > > https://twitter.com/bgpmon > Looks like stuff started happening again today. > > -- > Justin Wilson <[email protected]> > MTCNA - CCNA - MTCRE - MTCWE - COMTRAIN > Aol & Yahoo IM: j2sw > http://www.mtin.net/blog - xISP News > http://www.zigwireless.com - High Speed Internet Options > http://www.thebrotherswisp.com - The Brothers Wisp > > _______________________________________________ > Wireless mailing list > [email protected] > http://lists.wispa.org/mailman/listinfo/wireless > -- Micah Miller Network/Server Administrator Network Business Systems, Inc. Phone: 309-944-8823 _______________________________________________ Wireless mailing list [email protected] http://lists.wispa.org/mailman/listinfo/wireless
