I believe it's been said here many times before, but when in public venues,
the only way to be sure about anything in regards to traffic filtering and
manipulation is to VPN into your corporate network and bypass all that.
Unfortuanately, it makes streaming the latest episode of Heroes a little
jerky.

Frank

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Stefan Bethke
Sent: Monday, November 05, 2007 11:38 PM
To: Stephane Bortzmeyer
Cc: nanog@merit.edu
Subject: Re: Hey, SiteFinder is back, again...


Am 05.11.2007 um 17:16 schrieb Stephane Bortzmeyer:

> 3) Provide DNS recursors which do the mangling *and* block users,
> either by filtering out port 53 or by giving them a RFC 1918 address
> with no NAT for this port.
>
> I've seen 1) and 2) in the wild and I am certain I will see 3) one day
> or the other.

Just recently in NYC, the hotel "internet" connection did intercept
any UDP traffic to *:53, redirecting it to their resolver.  Which did
not only serve their own A records for names that should have returned
NXDOMAIN, but also returned "better" answers than you normally would
get (requesting pages from www.weather.com delivered pages from
www.accuweather.com
).  Of course it even did that after I had paid and clicked through
their walled garden site.


Stefan

--
Stefan Bethke <[EMAIL PROTECTED]>   Fon +49 170 346 0140



Reply via email to