Skip to Content.
Sympa Menu

discuss - Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK

discuss AT lists.opennicproject.org

Subject: Discuss mailing list

List archive

Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK


Chronological Thread  
  • From: Lennart Seitz <mail AT lseitz.de>
  • To: discuss AT lists.opennicproject.org
  • Subject: Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK
  • Date: Tue, 31 Aug 2021 15:40:26 +0200

Hi Se7en,

what resolver did you use before switching to google? Keep in mind that DNS is a plaintext protocol, perhaps somebody MITM your request?

From my side i can verify that duckduckgo.com is resolving correctly on the T2 i am running and also the anycast (which you probabbly ment by round-robin?) under 134.195.4.2 by NextGi.

Regards,
Lennart

On 31.08.2021 14:10, Se7en wrote:
<https://freespeechextremist.com/notice/AAsjNZDuAZEtjAgjBo>

Numerous sites redirect to either Facebook or a fraudulent Chinese
register named 190.vip which is fraudulently selling domain names that
already exist. The solution was to change from OpenNIC's Round-Robin to
GoogleDNS. Someone has poisoned the OpenNICProject's Round-Robin
service with a malicious server conducting MITM attacks.



-- 
Mit freundlichen Grüßen,
Lennart Seitz
PGP-Schlüssel: 0x187abd76a5660379 (https://pgp.lseitz.de/key.asc)
--



Archive powered by MHonArc 2.6.24.

Top of Page