[dns-operations] "Comcast Intercepts and Redirects Port 53 Traffic" (slashdot)

Skywing Skywing at valhallalegends.com
Wed Jun 10 03:57:28 UTC 2009


No signs of DNS monkeying on Comcast in Washington state, either.  Suspect lack of factual data attached to Slashdot story (gasp)?

- S


-----Original Message-----
From: dns-operations-bounces at lists.dns-oarc.net [mailto:dns-operations-bounces at lists.dns-oarc.net] On Behalf Of Paul Vixie
Sent: Tuesday, June 09, 2009 7:15 PM
To: dns-operations at lists.dns-oarc.net
Subject: [dns-operations] "Comcast Intercepts and Redirects Port 53 Traffic" (slashdot)

An anonymous reader writes

	"An interesting (and profane) writeup of one frustrated user's
	discovery that Comcast is actually intercepting DNS requests bound
	for non-Comcast DNS servers and redirecting them to their own
	servers. I had obviously heard of the DNS hijacking for nonexistent
	domains, but I had no idea they'd actually prevent people from
	directly contacting their own DNS servers."

If true, this is a pretty serious escalation in the Net Neutrality
wars. Someone using Comcast, please replicate the simple experiment spelled
out in the article and confirm or deny the truth of it. Also, it would be
useful if someone using Comcast ran the ICSI Netalyzr and posted the
resulting permalink in the comments.

http://tech.slashdot.org/story/09/06/09/1731238/Comcast-Intercepts-and-Redirects-Port-53-Traffic
_______________________________________________
dns-operations mailing list
dns-operations at lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


More information about the dns-operations mailing list