FINDING · EVALUATION

Survey of NRW provider DNS implementations revealed at least five distinct tampering strategies in the wild: name hijacking to a government redirect server, NXDOMAIN for entire zones, name astrayment to 127.0.0.1 (user's own machine) or to unallocated IPs such as 1.1.1.1, silence (no reply), and provoked SERVERFAIL. One provider (tops.net) additionally set tracking cookies on users redirected to its block-notification page, demonstrating that name hijacking creates a surveillance vector beyond the blocking itself.

From 2003-dornseif-governmentGovernment mandated blocking of foreign Web content · §4.2 · 2003 · DFN-Arbeitstagung über Kommunikationsnetze

Implications

Tags

censors
generic
techniques
dns-poisoning

Extracted by claude-sonnet-4-6 — review before relying.