[dns-operations] "Comcast Intercepts and Redirects Port 53 Traffic" (slashdot)
Tom Daly
tom at dyn-inc.com
Wed Jun 10 03:10:43 UTC 2009
Testing queries to OpenDNS from NH reveals no problems. Oddly, note in the article that the IPs returned in place of the NXDOMAIN belong to Earthlink. I have not tried this with a malformed DNS query yet as the author describes.
Tom Daly
Sent from my handheld; please excuse typos and spelling mistakes.
-----Original Message-----
From: Paul Vixie <vixie at isc.org>
Sent: Tuesday, June 09, 2009 10:16 PM
To: dns-operations at lists.dns-oarc.net
Subject: [dns-operations] "Comcast Intercepts and Redirects Port 53 Traffic" (slashdot)
An anonymous reader writes
"An interesting (and profane) writeup of one frustrated user's
discovery that Comcast is actually intercepting DNS requests bound
for non-Comcast DNS servers and redirecting them to their own
servers. I had obviously heard of the DNS hijacking for nonexistent
domains, but I had no idea they'd actually prevent people from
directly contacting their own DNS servers."
If true, this is a pretty serious escalation in the Net Neutrality
wars. Someone using Comcast, please replicate the simple experiment spelled
out in the article and confirm or deny the truth of it. Also, it would be
useful if someone using Comcast ran the ICSI Netalyzr and posted the
resulting permalink in the comments.
http://tech.slashdot.org/story/09/06/09/1731238/Comcast-Intercepts-and-Redirects-Port-53-Traffic
_______________________________________________
dns-operations mailing list
dns-operations at lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
More information about the dns-operations
mailing list