Measurement of Globally Visible DNS Injection
Domain Name System (DNS) injection is a censorship method for blocking access to blacklisted domain names. The method uses deep packet inspection on all DNS queries passing through the network and injects spoofed responses. Compared with other blocking mechanisms, DNS injection impacts uninvolved th...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2014-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/6814824/ |
id |
doaj-a23bf3b5d102409c864d44b8d18194e2 |
---|---|
record_format |
Article |
spelling |
doaj-a23bf3b5d102409c864d44b8d18194e22021-03-29T19:30:35ZengIEEEIEEE Access2169-35362014-01-01252653610.1109/ACCESS.2014.23232996814824Measurement of Globally Visible DNS InjectionMatthaus Wander0Christopher Boelmann1Lorenz Schwittmann2Torben Weis3Distributed Systems Group, University of Duisburg-Essen, Duisburg, GermanyDistributed Systems Group, University of Duisburg-Essen, Duisburg, GermanyDistributed Systems Group, University of Duisburg-Essen, Duisburg, GermanyDistributed Systems Group, University of Duisburg-Essen, Duisburg, GermanyDomain Name System (DNS) injection is a censorship method for blocking access to blacklisted domain names. The method uses deep packet inspection on all DNS queries passing through the network and injects spoofed responses. Compared with other blocking mechanisms, DNS injection impacts uninvolved third-parties if their traffic is routed through a censored network. In this paper, we look for large deployments of DNS injection, measured from vantage points outside of the censored networks. DNS injection is known to be used in China since it leaked unintentionally into foreign networks. We find that DNS injection is also used in Iran and can be observed by sending DNS queries to Iranian networks. In mid 2013, the Iranian DNS filter was temporarily suspended for some names, which correlated with media coverage of political debates in Iran about blocking social media. Spoofed responses from China and Iran can be detected passively by the IP address returned. We propose an algorithm to obtain these addresses remotely. After testing 255002 open resolvers outside of China, we determined that 6% are potentially affected by Chinese DNS injection when querying top-level domains outside of China. This is essentially the result of one top-level domain name server for which an anycast instance is hosted in China.https://ieeexplore.ieee.org/document/6814824/Censorship |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Matthaus Wander Christopher Boelmann Lorenz Schwittmann Torben Weis |
spellingShingle |
Matthaus Wander Christopher Boelmann Lorenz Schwittmann Torben Weis Measurement of Globally Visible DNS Injection IEEE Access Censorship |
author_facet |
Matthaus Wander Christopher Boelmann Lorenz Schwittmann Torben Weis |
author_sort |
Matthaus Wander |
title |
Measurement of Globally Visible DNS Injection |
title_short |
Measurement of Globally Visible DNS Injection |
title_full |
Measurement of Globally Visible DNS Injection |
title_fullStr |
Measurement of Globally Visible DNS Injection |
title_full_unstemmed |
Measurement of Globally Visible DNS Injection |
title_sort |
measurement of globally visible dns injection |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2014-01-01 |
description |
Domain Name System (DNS) injection is a censorship method for blocking access to blacklisted domain names. The method uses deep packet inspection on all DNS queries passing through the network and injects spoofed responses. Compared with other blocking mechanisms, DNS injection impacts uninvolved third-parties if their traffic is routed through a censored network. In this paper, we look for large deployments of DNS injection, measured from vantage points outside of the censored networks. DNS injection is known to be used in China since it leaked unintentionally into foreign networks. We find that DNS injection is also used in Iran and can be observed by sending DNS queries to Iranian networks. In mid 2013, the Iranian DNS filter was temporarily suspended for some names, which correlated with media coverage of political debates in Iran about blocking social media. Spoofed responses from China and Iran can be detected passively by the IP address returned. We propose an algorithm to obtain these addresses remotely. After testing 255002 open resolvers outside of China, we determined that 6% are potentially affected by Chinese DNS injection when querying top-level domains outside of China. This is essentially the result of one top-level domain name server for which an anycast instance is hosted in China. |
topic |
Censorship |
url |
https://ieeexplore.ieee.org/document/6814824/ |
work_keys_str_mv |
AT matthauswander measurementofgloballyvisiblednsinjection AT christopherboelmann measurementofgloballyvisiblednsinjection AT lorenzschwittmann measurementofgloballyvisiblednsinjection AT torbenweis measurementofgloballyvisiblednsinjection |
_version_ |
1724196070147227648 |