Welcome Guest ( Log In | Register )

Bump Topic Topic Closed RSS Feed
5 Pages < 1 2 3 4 > » Bottom

Outline · [ Standard ] · Linear+

Unifi Official TM UniFi High Speed Broadband Thread V42, READ 1ST PAGE FOR RELEVANT WIFI INFO!

views
     
blackbox14
post Sep 4 2024, 10:15 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(PRSXFENG @ Sep 4 2024, 10:07 PM)
It's on the business site but it probably covers everyone

Considering
> The DNS redirection action affects all internet service providers offering Mobile Services, Fixed Services (FTTH/FTTP), and Fixed Services of internet services.
*
Strange to think that TM going this far with the inclusion of DoT and DoH blocking is their own doing. But at the same time I can see a situation where TM is more subjected to Gov mandate than the other ISPs with their large market share.

If so, might be time to switch over.
blackbox14
post Sep 4 2024, 10:32 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(PRSXFENG @ Sep 4 2024, 10:20 PM)
TM has always been the one to "go a step further"

Back in the past,
Most ISPs here block prawn sites by just blocking them in DNS, change DNS and you're good to go

TM blocks by IP as well, which did have the unintended side effect of them blocking Cloudflare once... Good job.

I hope other ISPs also take a laid back approach like Maxis tongue.gif
Just doing the bare minimum of redirecting plain old DNS, and not touching DoH/DoT
*
Thanks for enlightening me. Did not know that.

However from what I've heard Maxis got more restrictions with torrenting and issues with some other stuff like stability. So no ISP is perfect, I guess.

This post has been edited by blackbox14: Sep 4 2024, 10:33 PM
blackbox14
post Sep 5 2024, 12:24 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
I saw on the /k topic that TM even blocked Cloudflare WARP, which is a VPN. Now that's serious.

They are going way further than Maxis and TIME on this.

QUOTE(kwss @ Sep 4 2024, 11:29 PM)
Everyone needing a no hassle setup can use this:
https://sky.rethinkdns.com/dns-query

It runs on Cloudflare Workers on all edge location and cannot be IP blocked.
If it's DNS bootstrap blocked, just put lowyat.net IP in your HOST file and it should work again
*
Is this better or equivalent to your already posted AWS method?

I had a relative of mine try that AWS method (it still needs CC/debit info and I did not dare to try myself yet) but apparently he was still seeing a KL server + one Woodynet KL server on dnscheck tools when setting Quad9 as origin. If using Quad9 directly, it would show a bunch of Woodynet servers in other countries. Not sure what went wrong.

If this other method is easier then maybe I can just tell him to cancel that AWS account and use this instead?

This post has been edited by blackbox14: Sep 5 2024, 12:26 AM
blackbox14
post Sep 5 2024, 12:48 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(kwss @ Sep 5 2024, 12:36 AM)
The AWS method is superior.
Do you mind posting a screenshot of the dns check?
I help you take a look.
*
Is it fine to show the resolver IP addresses? Or should I censor those?

EDIT: In the meantime, looking at the screenshot sent to me, the first resolver is Global Transit Communications in KL while the second one is WoodyNet located in KL as well.

This post has been edited by blackbox14: Sep 5 2024, 12:49 AM
blackbox14
post Sep 5 2024, 01:25 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(kwss @ Sep 5 2024, 12:53 AM)
The IP can be shown. Those are the DoH provider IP.
Based on your description alone it sounds correct.
Post anyway to get opinion from others
*
After some consideration I will take your word for it.

The events today with TM blocking Q9 and Cloudflare WARP makes me think they are actively monitoring LYF as one of their sources for things to block, so I'm wary of putting up anything they can use to block more methods.

Also the person did say that the DNS functioned as intended, which is the most important part. It's just that the resolvers are different when going through AWS.
blackbox14
post Sep 5 2024, 02:26 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(soonwai @ Sep 5 2024, 02:08 AM)
I thought I read the same about Warp. Just gave it a try. OK working.
*
Makes me think it's also a regional thing as some people already affected are reporting certain DNS providers working, DoH/DoT still working, while others are saying none of those work. The other thing is that it is hard to tell what is really functioning and what isn't because there are so many different configs that people use.

Interestingly, if the Maxis business page is true (and not just meant to reassure businesses), then the DoH and DoT blocking may not actually be part of MCMC guidelines, or just a special thing for TM Unifi as they are the biggest guy around.

This post has been edited by blackbox14: Sep 5 2024, 02:26 AM
blackbox14
post Sep 5 2024, 07:37 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(soonwai @ Sep 5 2024, 03:19 AM)
It was raynman who posted about Warp and who's practically my neighbour. So geographically, if he kena, me too, I guess.

https://forum.lowyat.net/index.php?showtopi...ost&p=110389824
*
Hope he can confirm if it's working or not for him today, then. If it still doesn't work for him but it works for you then I dunno what is going on already.

QUOTE(soonwai @ Sep 5 2024, 03:19 AM)
Yeah, TM seems have jumped into all this quite haphazardly. Not sure if that's by design or just being incompetently efficient. Have to say they did meet their goals of pushing 8888, 9999, 1111, etc... back to the Internet Stone Age.
https://forum.lowyat.net/index.php?showtopi...ost&p=110389824
*
Actually I've read that even Maxis Home users got DoH blocked, so maybe they only give exception for businesses to use DoH and DoT since it might be important for them.

Companies tend to firewall illegal websites anyway to prevent employees from browsing that stuff at work, so MCMC might trust them not to abuse it.
blackbox14
post Sep 5 2024, 03:27 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(BladeRider88 @ Sep 5 2024, 02:56 PM)
Maxis eat most of the share and left some bones and meats for their customer, where else TM Nut eat everything and leave nothing to their customers
*
If you do change, try to verify whether Maxis does actually leave DoT and DoH alone or not for Home users. I don't think they will answer you, but I've read around socmed that Maxis Home customers are also DoT and DoH blocked.

This article and the Maxis page really might be addressing business entities only.

This post has been edited by blackbox14: Sep 5 2024, 03:28 PM
blackbox14
post Sep 5 2024, 03:37 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(soonwai @ Sep 5 2024, 03:24 PM)
I think TM will release all the hijacked IPs once they figure out how to do DNS redirection like Maxis. Still have 25 days for them to google. They just need some time.  smile.gif
*
Wish I could have that kind of optimism, lol. Realistically though situations like this always get worse before getting better...if it actually does get better.

QUOTE(BladeRider88 @ Sep 5 2024, 03:30 PM)
Yes, business only  tongue.gif
But i spoke to my ex-manager, my ex-company uses Unifi Business with dedicated IP, and yes their DNS also being affected despite with DoH setup  shocking.gif
*
TM being more strict is probably because they have a bigger user base.

Still, right now the only confirmed way you can get a service that doesn't tamper with DoH and DoT is to get Maxis Business. Maxis Home also not safe.
blackbox14
post Sep 5 2024, 06:35 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(PRSXFENG @ Sep 5 2024, 06:22 PM)
Wonder how long until added to blocklist  whistling.gif

Anyways, Quad9/PCH noticed
https://x.com/woodyatpch/status/1821685879020323156
*
Yeah it might be time to start gatekeeping workarounds and alternate DNS unfortunately. This is not MCMC or ISPs from last decade, so they know which places to look at to find new addresses to block.

Also wonder what Quad9 can do about it. Probably not much since we are a small country just acting like a big one.
blackbox14
post Sep 5 2024, 08:56 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(Oltromen Ripot @ Sep 5 2024, 08:41 PM)
3. Unverified claim that DoH tcp/443 is also blocked. This is probably hit-and-miss and precision-targetted since HTTPS tcp/443 will also be broken if done without care.
*
According to some who have experienced it, it's being done by hijacking the DNS IP addresses directly or just blocking them outright, which is something even DoH can't get through.
blackbox14
post Sep 5 2024, 09:29 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(Oltromen Ripot @ Sep 5 2024, 08:56 PM)
But so far Unifi is almost-proven to be the most *.@!§>~' going beyond by even blocking DoH and DoT. Basically about to send all its users back to DNS' stone age.

Buat penat aje pakar-pakar teknologi memikirkan macam mana nak lindungi pengguna daripada DNS poisoning.... whoever is pushing this inside TM is really stupid. really really shortsighted. patut kena buang kerja, dan diwartakan supaya tidak diambil bekerja oleh mana-mana syarikat telnologi seumur usia yang berbaki.
*
Maybe someday we will get insider info on this and what metric MCMC instructed them to use to measure how effective the blocking is.

Right now my best guess is that they will have to achieve some number of blocked/redirected queries per month for the sites on the MCMC's banlist. If it's too low, they start blocking more DNS providers until the number is met. This may explain why TM is going as far as to block DoT and DoH for all account types since they have a much larger number to meet.

The worst thing right now is the feeling of uncertainty surrounding this. When BN blocked those first few websites back in the late 00s, they just blocked and left it. But for this they are doing it in phases and we don't know when it's going to end, if at all.
blackbox14
post Sep 5 2024, 10:50 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(countingcrows @ Sep 5 2024, 10:21 PM)
Memang TM already killed some provider's DoH service but hopefully they leave some alone.

I understand they have to follow MCMC directive, but pandai2 la.
*
Their readiness level is probably on the level of Indonesia judging by the DoT and DoH block stuff so they can keep adding thousands of DNS addresses to ban as long as they can find them online.

I wouldn't count on them letting up on enforcement at least for the next year or so. With the upcoming social media licensing, kill switch and potentially needing to ban big socmed platforms that don't comply. They can't have people trivializing that by just using different DNS providers.

This whole thing with doing it region by region is also probably to catch alternatives and close the hole as much as possible.

'Tutup mata sebelah' style Malaysian internet is basically dead unless September 30th and beyond proves otherwise.
blackbox14
post Sep 5 2024, 11:33 PM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(Oltromen Ripot @ Sep 5 2024, 11:05 PM)
of course it's that bloody fool of a took...

but TM is currently like a half-bright student trying to score extra points by going the extra mile, closing down DoH and DoT which otherwise should be encouraged instead.
*
Given everything we know so far and the Maxis Business FAQ - it's probably a numbers game set by MCMC. Something like:

"You as ISP have this number of users. You must successfully redirect/block at least this percentage of users from being able to access the sites on our blocked list."

TM crunched the numbers and realized that if they left DoH and DoT alone, then they can't meet those numbers that MCMC wants them to. Many TM users probably already know about DoH and DoT and already using those. This might be why they are implementing the block by region. They want to make sure of it.

Maxis, on the other hand, have less subscribers and maybe they are confident they can meet the MCMC's numbers without having to affect their Business clients.

The obvious dangerous point here if this guess of mine is true (and if that particular minister is THAT persistent), is that the ISPs have to do this each month. So as more people learn which bypasses work, the ISPs also have to find ways to block those new bypass methods.

-

VPN however, is a different story. I'm not sure how they would find out what websites people are even visiting once connected to a VPN. Based on this there is a chance no action will be taken on VPNs since it already is a huge inconvenience to have to pay for another service and they can't prove that you visited any 'bad' websites unless you expose yourself.

Or, they could just mow down as many popular VPN providers' sites as possible to try to reduce the number even if they can't prove anything.

All of this is just speculation, so do take with a spoonful of salt.

This post has been edited by blackbox14: Sep 5 2024, 11:34 PM
blackbox14
post Sep 6 2024, 12:02 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(dev/numb @ Sep 5 2024, 11:29 PM)
This thread has been entertaining. The ending will likely be tragic and all of us will probably end up slitting our wrists, but at least we managed to get a few laughs in.
*
It's been enlightening to learn more basic networking stuff since the early implementation of this last month with Maxis and TIME.
Not going to lie though: I miss not having to worry about my internet access when checking on socmed and this forum. Now I'm always anxious to see if TM expanded their blocklist for DNS providers and/or if they increased the affected regions.

Truly feels like the end of an era.

This post has been edited by blackbox14: Sep 6 2024, 12:03 AM
blackbox14
post Sep 6 2024, 12:37 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(soonwai @ Sep 6 2024, 12:21 AM)
We all just been trolled by TM. While we discussing advanced methods, DoH, DoT, VPN, self-hosted; the simplest method from 10 years ago still works.

Just change your DNS server.

You know like how we use to change TM's DNS to 8.8.8.8. Of course, we cannot use 8.8.8.8 anymore. But a simple DNS change is all that it takes.

Note that this is only for Unifi. This method won't work on Maxis cos Maxis is smart.

And not because TM is dumb but because they need a simple way for their staff to access the ahem sites. "Go home, use this as your DNS, kautim" thereby saving the live of that one particular TM network engineer.
*
Funny as this is, we won't know which method will stick and how many public DNS servers they are willing to block until at least several months have passed.

Worst scenario is if we end up like adblocker addons vs Youtube where it is just a never-ending back and forth of being blocked and unblocking.

Best scenario is if this whole 'internet security' thing the comm ministry is trying to do dies down due to some other pressing matter, or there's enough backlash that MCMC U-turns on DNS redirect. But I doubt this.
blackbox14
post Sep 6 2024, 01:46 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
Which VPNs got hit besides Nord?
blackbox14
post Sep 6 2024, 01:51 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(NimalKumar @ Sep 6 2024, 01:36 AM)
I kinda lost on this. Actually why are they doing this? Are they trying to control our internet or smtg?
*
Simple answer is yes.

Socmed issue snowballed into this because they realized how powerful the internet is these days.
blackbox14
post Sep 6 2024, 01:59 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
So safe to say TM was monitoring here to see all the proposed alternative DNS? So far it seems all got hit?
blackbox14
post Sep 6 2024, 02:09 AM

Casual
***
Junior Member
349 posts

Joined: Jul 2012
QUOTE(blackbox14 @ Sep 6 2024, 01:46 AM)
Which VPNs got hit besides Nord?
*
What about this? Anything else got hit?

5 Pages < 1 2 3 4 > » Top
Topic ClosedOptions
 

Change to:
| Lo-Fi Version
0.2150sec    1.05    7 queries    GZIP Disabled
Time is now: 19th December 2025 - 01:49 AM