Skip to Content.
Sympa Menu

discuss - Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK

discuss AT lists.opennicproject.org

Subject: Discuss mailing list

List archive

Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK


Chronological Thread  
  • From: Se7en <se7en AT cock.email>
  • To: discuss AT lists.opennicproject.org
  • Subject: Re: [opennic-discuss] [URGENT] [ROUND-ROBIN] DNS POISONING/POSSIBLE MITM ATTACK
  • Date: Wed, 1 Sep 2021 18:05:20 -0700

On 21-09-02 03:00:37, Lennart Seitz wrote:

> Please check what
>
> dig duckduckgo.com @185.121.177.177
>
> gives you for an output, it should tell you the used server.
>
> ;; Query time: 40 msec
> ;; SERVER: 185.121.177.177#53(185.121.177.177)
> ;; WHEN: Do Sep 02 02:59:48 CEST 2021

Noting that I am still using Quad9 in the Pihole, I ran your command
to produce the following:

$ dig duckduckgo.com @185.121.177.177

; <<>> DiG 9.11.5-P4-5.1+deb10u5-Debian <<>> duckduckgo.com @185.121.177.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35340
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;duckduckgo.com. IN A

;; ANSWER SECTION:
duckduckgo.com. 2 IN A 31.13.82.1

;; Query time: 48 msec
;; SERVER: 185.121.177.177#53(185.121.177.177)
;; WHEN: Wed Sep 01 18:03:40 PDT 2021
;; MSG SIZE rcvd: 59


--
|-----/ | Se7en
/ The One and Only! | se7en AT cock.email
/ | 0x0F83F93882CF6116
/ | https://se7en-site.neocities.org

Attachment: signature.asc
Description: PGP signature




Archive powered by MHonArc 2.6.24.

Top of Page