TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

ISPs Improve Their DNS Hijacking And How To Stop It

68 点作者 SnowLprd大约 13 年前

12 条评论

snarkinatree大约 13 年前
This is also how OpenDNS makes money. Neustar does the same. And probably others too. They call this "DNS service". Anyone can run a resolver, including your next door neighbor. Unless you live next to a datacenter, your neighbour's "DNS service" will likely be faster than Google's or any commercial vendor. It's been suggested the optimum number of users for a decent cache is probably around 10 [source: IPJ]. Can you trust 10 people not to poison the cache? How many users do you think the "DNS service" providers have? Can you trust each and every one of those users? As for DNSSEC, most people running authoritative nameservers for websites do not support it, let alone most domain name registries.<p>Interesting to note: no rDNS for either of those IP's.
DHowett大约 13 年前
I believe Comcast stopped this as of their network-wide DNSSEC deployment.<p>Either way, the article provides a pretty interesting way around it, but I can't expect ISPs hell-bent on false lookup spoofing to sit on their hands for long enough to make this a practical long-term solution.
评论 #3921841 未加载
pjscott大约 13 年前
This is one of the many problems that DNSCurve solves, by setting up encrypted and authenticated connections between you and any DNS servers you decide to trust.<p><a href="http://dnscurve.org/" rel="nofollow">http://dnscurve.org/</a><p>OpenDNS already supports it:<p><a href="http://blog.opendns.com/2010/02/23/opendns-dnscurve/" rel="nofollow">http://blog.opendns.com/2010/02/23/opendns-dnscurve/</a>
评论 #3921535 未加载
评论 #3921679 未加载
Rudism大约 13 年前
I don't quite understand how the new method of hijacking gets around using 3rd party DNS servers. If I ping nonexistentdomain.tld, doesn't that lookup occur at the 3rd party server? How does my ISP inject its own IP address for that domain if the IP address is coming from (for example) Google? Are they intercepting the entire DNS query?
评论 #3920635 未加载
hextraorinary大约 13 年前
There's a solution to all this, where you will <i>always</i> get the right response, and it even obviates the need for DNSSEC or DNSCurve.<p>And that is, write your own resolver that only sends nonrecursive queries to authoritative nameservers.<p>If the DNS admin has configured DNS simply and sensibly, it will only take you 2 queries to get a name resolved. It's very fast.<p>If they are using Akamai or some other CDN, or they have a love for CNAMES and indirection, it can take many more queries. Sometimes up to 7.
评论 #3922437 未加载
JumpCrisscross大约 13 年前
What is so insidious about ISPs serving ads on un-occupied domains? I can't see who it hurts and seems like a rather clever way to monetize dead space.
评论 #3921123 未加载
评论 #3921211 未加载
评论 #3921502 未加载
评论 #3921661 未加载
评论 #3921116 未加载
rblatz大约 13 年前
I'm on Time Warner and just tested this. Could not reproduce.
评论 #3921786 未加载
sounds大约 13 年前
I want to know whether the false NXDOMAIN (saying the domain is actually present at the address of your isp) is dnssec-signed.<p>If it isn't, oh well.<p>If it is, this is an exploit and is big news.
pdubs大约 13 年前
Don't bloggers have to disclose affiliate links now?
评论 #3921519 未加载
drucken大约 13 年前
Doesn't this mean ISPs themselves couldn't use their own DNS servers for a reliable DNS service?<p>Talk about not drinking your own Kool-Aid...
TazeTSchnitzel大约 13 年前
Won't DNSSEC stop this, hopefully?
mhurron大约 13 年前
Run your own nameserver(s)?
评论 #3921549 未加载
评论 #3920853 未加载