[dns-operations] "Comcast Intercepts and Redirects Port 53 Traffic" (slashdot)
Skywing at valhallalegends.com
Wed Jun 10 03:57:28 UTC 2009
No signs of DNS monkeying on Comcast in Washington state, either. Suspect lack of factual data attached to Slashdot story (gasp)?
From: dns-operations-bounces at lists.dns-oarc.net [mailto:dns-operations-bounces at lists.dns-oarc.net] On Behalf Of Paul Vixie
Sent: Tuesday, June 09, 2009 7:15 PM
To: dns-operations at lists.dns-oarc.net
Subject: [dns-operations] "Comcast Intercepts and Redirects Port 53 Traffic" (slashdot)
An anonymous reader writes
"An interesting (and profane) writeup of one frustrated user's
discovery that Comcast is actually intercepting DNS requests bound
for non-Comcast DNS servers and redirecting them to their own
servers. I had obviously heard of the DNS hijacking for nonexistent
domains, but I had no idea they'd actually prevent people from
directly contacting their own DNS servers."
If true, this is a pretty serious escalation in the Net Neutrality
wars. Someone using Comcast, please replicate the simple experiment spelled
out in the article and confirm or deny the truth of it. Also, it would be
useful if someone using Comcast ran the ICSI Netalyzr and posted the
resulting permalink in the comments.
dns-operations mailing list
dns-operations at lists.dns-oarc.net
More information about the dns-operations