[dns-operations] Hijacking of Google Public DNS in Turkey documented

Colm MacCárthaigh colm at stdlib.net
Sun Mar 30 00:51:32 UTC 2014

Does anyone know if the intercepting recursors are acting as standalone
recursive nameservers, or if they are passing on the un-interesting queries
to the "real" Google / OpenDNS resolvers?

One way to tell is to observe the addresses being used towards
authoritative name-servers.  http://whatsmyresolver.stdlib.net/ is one way
to see this address. I'd be interested in the results, if anyone is in a
position to test.

On Sat, Mar 29, 2014 at 1:46 PM, Stephane Bortzmeyer <bortzmeyer at nic.fr>wrote:

> http://www.bortzmeyer.org/dns-routing-hijack-turkey.html
> (with the help of RIPE Atlas probes)
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-jobs mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20140329/f2a8c4d2/attachment.html>

More information about the dns-operations mailing list