Hey, SiteFinder is back, again...

Frank Bulk - iNAME frnkblk at iname.com
Tue Nov 6 12:21:13 UTC 2007

I believe it's been said here many times before, but when in public venues,
the only way to be sure about anything in regards to traffic filtering and
manipulation is to VPN into your corporate network and bypass all that.
Unfortuanately, it makes streaming the latest episode of Heroes a little


-----Original Message-----
From: owner-nanog at merit.edu [mailto:owner-nanog at merit.edu] On Behalf Of
Stefan Bethke
Sent: Monday, November 05, 2007 11:38 PM
To: Stephane Bortzmeyer
Cc: nanog at merit.edu
Subject: Re: Hey, SiteFinder is back, again...

Am 05.11.2007 um 17:16 schrieb Stephane Bortzmeyer:

> 3) Provide DNS recursors which do the mangling *and* block users,
> either by filtering out port 53 or by giving them a RFC 1918 address
> with no NAT for this port.
> I've seen 1) and 2) in the wild and I am certain I will see 3) one day
> or the other.

Just recently in NYC, the hotel "internet" connection did intercept
any UDP traffic to *:53, redirecting it to their resolver.  Which did
not only serve their own A records for names that should have returned
NXDOMAIN, but also returned "better" answers than you normally would
get (requesting pages from www.weather.com delivered pages from
).  Of course it even did that after I had paid and clicked through
their walled garden site.


Stefan Bethke <stb at lassitu.de>   Fon +49 170 346 0140

More information about the NANOG mailing list