North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Hey, SiteFinder is back, again...

  • From: Frank Bulk - iNAME
  • Date: Tue Nov 06 07:23:46 2007

I believe it's been said here many times before, but when in public venues,
the only way to be sure about anything in regards to traffic filtering and
manipulation is to VPN into your corporate network and bypass all that.
Unfortuanately, it makes streaming the latest episode of Heroes a little


-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of
Stefan Bethke
Sent: Monday, November 05, 2007 11:38 PM
To: Stephane Bortzmeyer
Cc: [email protected]
Subject: Re: Hey, SiteFinder is back, again...

Am 05.11.2007 um 17:16 schrieb Stephane Bortzmeyer:

> 3) Provide DNS recursors which do the mangling *and* block users,
> either by filtering out port 53 or by giving them a RFC 1918 address
> with no NAT for this port.
> I've seen 1) and 2) in the wild and I am certain I will see 3) one day
> or the other.

Just recently in NYC, the hotel "internet" connection did intercept
any UDP traffic to *:53, redirecting it to their resolver.  Which did
not only serve their own A records for names that should have returned
NXDOMAIN, but also returned "better" answers than you normally would
get (requesting pages from delivered pages from
).  Of course it even did that after I had paid and clicked through
their walled garden site.


Stefan Bethke <[email protected]>   Fon +49 170 346 0140