Measurement of Globally Visible DNS Injection

Domain Name System (DNS) injection is a censorship method for blocking access to blacklisted domain names. The method uses deep packet inspection on all DNS queries passing through the network and injects spoofed responses. Compared with other blocking mechanisms, DNS injection impacts uninvolved th...

Full description

Bibliographic Details
Main Authors: Matthaus Wander, Christopher Boelmann, Lorenz Schwittmann, Torben Weis
Format: Article
Language:English
Published: IEEE 2014-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/6814824/
id doaj-a23bf3b5d102409c864d44b8d18194e2
record_format Article
spelling doaj-a23bf3b5d102409c864d44b8d18194e22021-03-29T19:30:35ZengIEEEIEEE Access2169-35362014-01-01252653610.1109/ACCESS.2014.23232996814824Measurement of Globally Visible DNS InjectionMatthaus Wander0Christopher Boelmann1Lorenz Schwittmann2Torben Weis3Distributed Systems Group, University of Duisburg-Essen, Duisburg, GermanyDistributed Systems Group, University of Duisburg-Essen, Duisburg, GermanyDistributed Systems Group, University of Duisburg-Essen, Duisburg, GermanyDistributed Systems Group, University of Duisburg-Essen, Duisburg, GermanyDomain Name System (DNS) injection is a censorship method for blocking access to blacklisted domain names. The method uses deep packet inspection on all DNS queries passing through the network and injects spoofed responses. Compared with other blocking mechanisms, DNS injection impacts uninvolved third-parties if their traffic is routed through a censored network. In this paper, we look for large deployments of DNS injection, measured from vantage points outside of the censored networks. DNS injection is known to be used in China since it leaked unintentionally into foreign networks. We find that DNS injection is also used in Iran and can be observed by sending DNS queries to Iranian networks. In mid 2013, the Iranian DNS filter was temporarily suspended for some names, which correlated with media coverage of political debates in Iran about blocking social media. Spoofed responses from China and Iran can be detected passively by the IP address returned. We propose an algorithm to obtain these addresses remotely. After testing 255002 open resolvers outside of China, we determined that 6% are potentially affected by Chinese DNS injection when querying top-level domains outside of China. This is essentially the result of one top-level domain name server for which an anycast instance is hosted in China.https://ieeexplore.ieee.org/document/6814824/Censorship
collection DOAJ
language English
format Article
sources DOAJ
author Matthaus Wander
Christopher Boelmann
Lorenz Schwittmann
Torben Weis
spellingShingle Matthaus Wander
Christopher Boelmann
Lorenz Schwittmann
Torben Weis
Measurement of Globally Visible DNS Injection
IEEE Access
Censorship
author_facet Matthaus Wander
Christopher Boelmann
Lorenz Schwittmann
Torben Weis
author_sort Matthaus Wander
title Measurement of Globally Visible DNS Injection
title_short Measurement of Globally Visible DNS Injection
title_full Measurement of Globally Visible DNS Injection
title_fullStr Measurement of Globally Visible DNS Injection
title_full_unstemmed Measurement of Globally Visible DNS Injection
title_sort measurement of globally visible dns injection
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2014-01-01
description Domain Name System (DNS) injection is a censorship method for blocking access to blacklisted domain names. The method uses deep packet inspection on all DNS queries passing through the network and injects spoofed responses. Compared with other blocking mechanisms, DNS injection impacts uninvolved third-parties if their traffic is routed through a censored network. In this paper, we look for large deployments of DNS injection, measured from vantage points outside of the censored networks. DNS injection is known to be used in China since it leaked unintentionally into foreign networks. We find that DNS injection is also used in Iran and can be observed by sending DNS queries to Iranian networks. In mid 2013, the Iranian DNS filter was temporarily suspended for some names, which correlated with media coverage of political debates in Iran about blocking social media. Spoofed responses from China and Iran can be detected passively by the IP address returned. We propose an algorithm to obtain these addresses remotely. After testing 255002 open resolvers outside of China, we determined that 6% are potentially affected by Chinese DNS injection when querying top-level domains outside of China. This is essentially the result of one top-level domain name server for which an anycast instance is hosted in China.
topic Censorship
url https://ieeexplore.ieee.org/document/6814824/
work_keys_str_mv AT matthauswander measurementofgloballyvisiblednsinjection
AT christopherboelmann measurementofgloballyvisiblednsinjection
AT lorenzschwittmann measurementofgloballyvisiblednsinjection
AT torbenweis measurementofgloballyvisiblednsinjection
_version_ 1724196070147227648