Skip to Content.
Sympa Menu

discuss - Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK

discuss AT lists.opennicproject.org

Subject: Discuss mailing list

List archive

Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK


Chronological Thread  
  • From: Se7en <se7en AT cock.email>
  • To: discuss AT lists.opennicproject.org
  • Subject: Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK
  • Date: Wed, 1 Sep 2021 17:06:12 -0700

On 21-09-01 18:04:19, overthefalls wrote:
> I think you misunderstood the request. My understanding is the request
> was to traceroute *a domain that you say points to facebook or
> whatever*.
>
> If I understand correctly, you're saying that 185.121.177.177 and
> 169.239.202.202 are poisoning your DNS requests.
> What domains specifically?
> Where does each domain point specifically?
>
> To execute the test, point your DNS back to either of those opennic dns
> servers and then I would suggest running the command "host domainname",
> record the IP that is reported for that domainname, and then run a
> traceroute to the domainname and see if it ends at the correct IP
> address.

I already did this. See the Pleroma thread in the OP. It has all the
screenshots and the analysis I've performed thus far.

--
|-----/ | Se7en
/ The One and Only! | se7en AT cock.email
/ | 0x0F83F93882CF6116
/ | https://se7en-site.neocities.org

Attachment: signature.asc
Description: PGP signature




Archive powered by MHonArc 2.6.24.

Top of Page