[dns-operations] "Comcast Intercepts and Redirects Port 53 Traffic" (slashdot)

Tom Daly tom at dyn-inc.com
Wed Jun 10 03:10:43 UTC 2009

Testing queries to OpenDNS from NH reveals no problems. Oddly, note in the article that the IPs returned in place of the NXDOMAIN belong to Earthlink. I have not tried this with a malformed DNS query yet as the author describes. 

Tom Daly

Sent from my handheld; please excuse typos and spelling mistakes.

-----Original Message-----
From: Paul Vixie <vixie at isc.org>
Sent: Tuesday, June 09, 2009 10:16 PM
To: dns-operations at lists.dns-oarc.net
Subject: [dns-operations] "Comcast Intercepts and Redirects Port 53 Traffic" (slashdot)

An anonymous reader writes

	"An interesting (and profane) writeup of one frustrated user's
	discovery that Comcast is actually intercepting DNS requests bound
	for non-Comcast DNS servers and redirecting them to their own
	servers. I had obviously heard of the DNS hijacking for nonexistent
	domains, but I had no idea they'd actually prevent people from
	directly contacting their own DNS servers."

If true, this is a pretty serious escalation in the Net Neutrality
wars. Someone using Comcast, please replicate the simple experiment spelled
out in the article and confirm or deny the truth of it. Also, it would be
useful if someone using Comcast ran the ICSI Netalyzr and posted the
resulting permalink in the comments.

dns-operations mailing list
dns-operations at lists.dns-oarc.net

More information about the dns-operations mailing list