Skip to Content.
Sympa Menu

discuss - Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK

discuss AT lists.opennicproject.org

Subject: Discuss mailing list

List archive

Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK


Chronological Thread  
  • From: Lennart Seitz <mail AT lseitz.de>
  • To: discuss AT lists.opennicproject.org
  • Subject: Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK
  • Date: Thu, 2 Sep 2021 02:12:47 +0200

On 02.09.2021 02:02, Se7en wrote:
> On 21-09-02 01:58:21, Lennart Seitz wrote:
>> The Server were operated by Fusl / Katie, but it seems like the servers
>> are withdrawn (only explanation i have for not beeing in the serverlist)
>> and the Wiki should be updated.
> Yes, it should! You are advertising fraudulent DNS servers with a MITM
> attack, which have been abandoned an unknown amount of time ago!

This is yet to be proven. You are sending to the anycast, any party
within your traceroute can manipulate DNS-Requets. This is not related
to OpenNIC.

For me Katies Anycast DNS (if active or not) is resolving every domain
you send correctly. So the EU Servers are working fine.

I agree that the wiki should be updated.

--
Mit freundlichen Grüßen,
Lennart Seitz
PGP-Schlüssel: 0x187abd76a5660379 (https://pgp.lseitz.de/key.asc)
--




Archive powered by MHonArc 2.6.24.

Top of Page