Outline ·
[ Standard ] ·
Linear+
Unifi Official TM UniFi High Speed Broadband Thread V42, READ 1ST PAGE FOR RELEVANT WIFI INFO!
|
soonwai
|
Sep 6 2024, 02:35 AM
|
|
https://www.internetsociety.org/blog/2014/0...d-dns-security/If your favourite porn site not working, take some time off, read this. Same thing happening now that happened in Turkey in 2014. Just find and replace Turkey with Malaysia and TurkTelekom with TM and already got news article for tomorrow. ChatGPT not needed. This post has been edited by soonwai: Sep 6 2024, 02:36 AM
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 02:53 AM
|
|
Malaysian version of the Turkish article. » Click to show Spoiler - click again to hide... « Malaysian Hijacking of DNS Providers Shows Clear Need For Deploying BGP And DNS Security
Over the week there were extremely disturbing reports out of Malaysia of escalations in the attempts by the Malaysian government to block popular media sites such as Onlyfans.com and 1fichier.com. The steps now being taken appear to have the Malaysian Internet service providers (ISPs) hijacking the routes to public DNS servers such as those operated by Google and masquerading as those DNS servers to provide answers back to their citizens.
Effectively, the Malaysian ISPs, operating to comply with a Malaysian government ban, are performing a “man-in-the-middle” (MiTM) attack against their citizens and giving them false information.
Netizens collectively made statements on the subject yesterday, explaining their “deep concern” for the situation describing how these recent moves “represent an attack not just on DNS infrastructure, but on the global Internet routing system itself.”
Background A few days ago, ISPs in Malaysia started out attempting to implement the government’s ban by simply blocking those sites in DNS. When Malaysian citizens tried to go to those sites, their device would query DNS to get the correct IP address to connect to. The Malaysian ISPs who were providing the DNS servers used by the Malaysian citizens simply failed to give back the correct response.
Malaysian citizens found they could get around this block by simply changing their devices’ DNS settings to point to open public DNS resolvers such as those operated by Google.
Predictably, the Malaysian ISPs then attempted to block the addresses for Google Public DNS servers and other similar servers. The ISPs then started to engage in the typical kind of “whac-a-mole” game with their citizens where the citizens would find new ways to get around the censorship… and the ISPs would then try to shut down those.
BGP Hijacking Starting this past Saturday, though, reports started coming in that the Malaysian ISPs were taking this to a whole new level by hijacking routing of the Border Gateway Protocol (BGP) and pretending to be Google’s Public DNS servers (and the servers of other similar services).
In other words, the devices operated by Malaysian citizens on Malaysian networks were connecting to what they thought were Google’s Public DNS servers (and other services) and were getting back answers from those services.
The answers the Malaysian citizens were receiving were just the wrong answers.
Instead of going to the proper websites they were being redirected to a warning page. Google confirmed this in a post on their Online Security Blog that included in part:
A DNS server tells your computer the address of a server it’s looking for, in the same way that you might look up a phone number in a phone book. Google operates DNS servers because we believe that you should be able to quickly and securely make your way to whatever host you’re looking for, be it YouTube, Twitter, or any other.
But imagine if someone had changed out your phone book with another one, which looks pretty much the same as before, except that the listings for a few people showed the wrong phone number. That’s essentially what’s happened: Malaysian ISPs have set up servers that masquerade as Google’s DNS service. Writing over on the BGPMon blog, an anonymous user detailed the specifics of the BGP route hijack that took place. Essentially, the Malaysian ISPs started “advertising” a more specific route for Google’s Public DNS servers. The way BGP works, Google advertises a route for traffic to get to its servers on its network. As the BGPMon blog post indicates, that is normally a “8.8.8.0/24” route directing people to AS 15169. However, the Malaysian ISPs advertised a specific route for “8.8.8.8/32” that went to their own network.
In BGP, a router typically selects the most specific route as the one to use to connect to a given IP address. So all the routers on networks connected to Malaysian ISPs would use this very specific route instead of the one advertised by Google.
They apparently did this for all of Google’s Public DNS addresses as well as those of other open public DNS providers as well. Over on the lowyat forum, observations were noted including showing precisely when the hijacking occurred:
The Malaysian ISPs are pretending to be Google’s specific DNS servers to everyone who is connected to their network.
Delivering False DNS Information The Malaysian ISPs went a step further, though, in that they set up their own DNS servers that answered as if they were Google’s Public DNS servers.
Telekom Malaysia went one step further, instead of null routing this IP address they brought up servers with the IP addresses of the hijacked DNS servers and are now pretending to be these DNS servers. These new fake servers are receiving traffic for 8.8.8.8 and other popular DNS providers and are answering DNS queries for the incoming DNS requests. The RIPE NCC’s Atlas probe network was used to show that DNS answers in Malaysia are different from those in other areas. The lowyat forum also confirmed this, as did many posts on social media services and other online sites. A good number of tech media sites have weighed in on the matter as well.
This situation clearly points out the need for a wider diversity of Internet access methods. Malaysian users who are limited to only the specific Malaysian ISPs have no choice in receiving their default routes and connections. If more options were to be available in the region, the ability of those users to have access to the information on the Internet would not be restricted.
The Internet needs to be hardened against attacks such as these. Please help make the Internet stronger!
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 02:56 AM
|
|
QUOTE(Hitman190 @ Sep 6 2024, 02:47 AM) so, for the layman, there's no other way to bypass the blocks other than to buy a VPN subscription? Easiest way for now is just to change your DNS servers. Same technique as 10 yrs ago. Use the ones here: https://forum.lowyat.net/index.php?showtopi...ost&p=110398000Only works on Unifi. Maxis cannot cause their network guys actually went to school.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 03:08 AM
|
|
QUOTE(blackbox14 @ Sep 6 2024, 02:37 AM) Are those restrictions in Turkey still going today? Not sure. But I know they blocked Twitter again during the 2023 earthquake rescue op so I guess the 2014 block wasn't permanent.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 03:11 AM
|
|
QUOTE(Hitman190 @ Sep 6 2024, 03:04 AM) If its the same technique as changing to 1.1.1.1 or 8.8.8.8, it doesn't work for me.  Cannot 1111™ or 8888™, use one of the other ones. 8888™ no longer belongs to Google, it's now TM's. Same for 1111™ and a few more.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 03:35 AM
|
|
QUOTE(Moogle Stiltzkin @ Sep 6 2024, 03:24 AM) tried not working for me 4reals  ) Can wor, I just tried with NTT DNS from that list. I just changed the DNS for my ethernet port since I don't want to kacau my router's settings. If working, you can put it into the router so it works for your whole house. With 8.8.8.8™ % dig +short 1fichier.com 175.139.142.25 With NTT % dig +short 1fichier.com 5.39.224.140 This post has been edited by soonwai: Sep 6 2024, 03:35 AM
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 03:52 AM
|
|
QUOTE(Doraku @ Sep 6 2024, 03:47 AM) I think I got the DoHoT thing working [attachmentid=11502254] Woah nice. save for later.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 04:30 AM
|
|
QUOTE(ntw @ Sep 6 2024, 03:53 AM) TM: pinjam untuk copy jap No use for tm to block these in MY. What they need to block is tor.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 04:33 AM
|
|
QUOTE(Doraku @ Sep 6 2024, 04:02 AM) Did TM intercept 1.1.1.1 website I'm getting SSL bad domain error? I Can browse other blocked website. Edit: oh. the website is the IP itself, no wonder. LOL yeah they did. 8888, 1111 etc now goes to server somewhere in Brickfields. And I’m pretty sure Google didn’t colocate there.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 08:21 AM
|
|
QUOTE(simmarjit @ Sep 6 2024, 05:40 AM) Tried their freedns. Currently got offer. https://www.bitsdujour.com/software/control...days-deals-homeThis post has been edited by soonwai: Sep 6 2024, 08:38 AM
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 08:41 AM
|
|
QUOTE(zhuoyang @ Sep 6 2024, 08:34 AM) wtf, did TM just block cloudflare.com? cloudflare.com, no but one.one.one.one, yes. Not a block, more like they took over the IP.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 08:43 AM
|
|
QUOTE(Oltromen Ripot @ Sep 6 2024, 07:58 AM) Mu Unifi line is still unaffected. I have Google and Cloudflare DNS in router's DHCPv4. Manually tested Quad9 DNS; also not affected. Penang. No need to be specific where 😗 wth, everyone migrate to Penang. DAPower. QUOTE(isr25 @ Sep 6 2024, 08:01 AM) Actually mine in JB as well. But I have already migrated to another solution to prepare, just in case. I’m still testing from time to time to see if they have implemented this at my area No wonder no sound from JB ppl. Anyone from east coast? Kena or not? This post has been edited by soonwai: Sep 6 2024, 08:46 AM
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 08:59 AM
|
|
DoT port 853 not blocked yet. Those having probs with DoT is probably because of hijacked server IP.
This post has been edited by soonwai: Sep 6 2024, 09:01 AM
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 09:00 AM
|
|
QUOTE(yenchenje @ Sep 6 2024, 08:57 AM) Already on DoH with Ubiquiti so can’t comment much, but not surprising if it’s already implemented Can you go to https://1.1.1.1 ? This post has been edited by soonwai: Sep 6 2024, 09:01 AM
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 09:03 AM
|
|
QUOTE(xCryptik @ Sep 6 2024, 09:00 AM) Great. Now my antivirus can't update. LOL. Now we start to see all the side effects.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 09:20 AM
|
|
QUOTE(syaigon @ Sep 6 2024, 09:10 AM) so for a normie, what's the solution? VPN? Just change DNS servers* to working ones. No need any fancy stuff yet. Same as 10 years ago when we change from TM's DNS to 8.8.8.8 except now cannot use all the femes 8888, 1111, 9999 etc... *only works on Unifi. Won't work on Maxis. And won't help with the nuked IPs. This post has been edited by soonwai: Sep 6 2024, 09:26 AM
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 09:24 AM
|
|
QUOTE(zhuoyang @ Sep 6 2024, 09:11 AM)  this is just stupid, especially for someone who needs to use cloudflare for work ... That's nuts. cloudflare.com 104.16.133.229, 104.16.132.229, 2606:4700::6810:85e5 and 2606:4700::6810:84e5 nuked.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 09:25 AM
|
|
QUOTE(Quantum Geist @ Sep 6 2024, 08:49 AM) on unifi if I ping I get their actual i.p, browser get cert error with tm's cert. My bad, cloudflare.com has fallen.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 09:32 AM
|
|
QUOTE(Epic_winner091 @ Sep 6 2024, 09:25 AM) Okay I found a not-so-famous DoH DNS and while I can resolve 🦐, https://cloudflare.com still does not work. So I don't think anything nefarious is going on here. A working DNS just allows you to bypass DNS blocked sites (175.139.142.25). Won't help with the IPs that are nuked. For that we will need VPN.
|
|
|
|
|
|
soonwai
|
Sep 6 2024, 09:38 AM
|
|
QUOTE(arshad @ Sep 6 2024, 09:24 AM) Any recommended dns servers? Try: 202.181.90.194 143.92.75.82 but don't spread around.
|
|
|
|
|