All that work when they really only needed a DST nat rule to rewrite
where dns queries were being sent :)

On Wed, Apr 2, 2014 at 3:52 PM, Justin Wilson <[email protected]> wrote:
> http://www.bgpmon.net/turkey-hijacking-ip-addresses-for-popular-global-dns-providers/
>
> At BGPmon we see numerous BGP hijacks every single day, some are interesting
> because of the size and scale of the hijack or as we've seen today because
> of the targeted hijacked prefixes.
>
> It all started last weekend when the Turkish president ordered the
> censorship of twitter.com. This started with a block of twitter by returning
> false twitter IP addresses by Turk Telekom DNS servers.  Soon users in
> Turkey discovered that changing DNS providers to Google DNS or OpenDNS was a
> good method of bypassing the censorship.
> But as of around 9am UTC today (Saturday March 29) this changed when Turk
> Telekom started to hijack the IP address for popular free and open DNS
> providers such as Google's 8.8.8.8, OpenDNS' 208.67.222.222 and Level3's
> 4.2.2.2.
>
>
>
> https://twitter.com/bgpmon
> Looks like stuff started happening again today.
>
> --
> Justin Wilson <[email protected]>
> MTCNA - CCNA - MTCRE - MTCWE - COMTRAIN
> Aol & Yahoo IM: j2sw
> http://www.mtin.net/blog - xISP News
> http://www.zigwireless.com - High Speed Internet Options
> http://www.thebrotherswisp.com - The Brothers Wisp
>
> _______________________________________________
> Wireless mailing list
> [email protected]
> http://lists.wispa.org/mailman/listinfo/wireless
>



-- 
Micah Miller
Network/Server Administrator
Network Business Systems, Inc.
Phone: 309-944-8823
_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to