When ISPs are instructed to block pirate sites, tampering with their own DNS records is often the weapon of choice. This type of blocking can be circumvented by switching to public DNS offered by companies including Cloudflare and Google. Tests carried on several ISPs in Malaysia this week reveal that requests to Cloudflare and Google public DNS servers are being hijacked and diverted to local ISP DNS servers.
To the average internet user, DNS translates a domain into an IP address to make browsing as simple and unintrusive as possible. Under the hood, DNS does just that and for the majority of people online, that's good enough.
For those who work with DNS and understand how incredibly important (and beautiful) it is, the idea that DNS is something to be tampered with, so that the system effectively tells lies, steps over the line. Yet, thanks to the global site-blocking drive, DNS servers all around the world, in dozens of countries, constantly lie to those who use them.
Site-blocking programs dictate that, when ISP-operated DNS servers are asked to return the IP addresses for tens of thousands of 'pirate' domains, the IP addresses returned by those DNS servers (if any IP addresses are returned at all) will not be the correct ones. This means that the user cannot access the domain; not by this route at least.
Public DNS – Mostly Tamper-Free
Since most blocking measures are implemented by consumer ISPs that operate their own DNS servers, users who switch to public DNS servers operated by Cloudflare, Google, Quad9, and many others, can usually avoid ISP blocking altogether. There are some exceptions depending on country, and since all three of the above have been ordered to block a small number of domains, switching to their DNS servers won't unblock every domain, just the overwhelming majority.
Pressure from the Motion Picture Association (MPA) to introduce pirate site blocking in Malaysia, led to its implementation under Section 263 of the Communications and Multimedia Act 1998. Requests to block sites are processed by the Malaysian Communications and Multimedia Commission (MCMC), which instructs local ISPs to prevent their systems "from being used in, or in relation to, the commission of any offense," including copyright infringement.
MPA reports on Malaysia's site-blocking program have painted a regular picture of success but, in common with other schemes reliant on DNS tampering at ISPs, users eventually discovered that switching to public DNS restores connectivity.
Reports emerging from Malaysia this week, affecting both Cloudflare and Google DNS, are much more concerning than ISP blocking or even blocking measures imposed on public DNS providers.
Public DNS Under Threat and Reportedly Hijacked in Malaysia
The Internet Monitoring Action Project (iMAP) monitors internet interference and restrictions impacting freedom of expression online in Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, Philippines, Thailand, Timor-Leste and Vietnam. The group uses the detection and reporting systems of the Open Observatory Network Interference (OONI) and this week reported a significant shift in Malaysia's site-blocking program.
"It was detected through automated and manual testing on 5th August, that transparent DNS proxy redirecting of DNS queries to Google and Cloudflare public DNS servers has been implemented by two Malaysian ISPs Maxis and Time," iMAP reports.
"Users that have configured their Internet settings to use alternative DNS servers, would have found that they are now unable to access websites officially blocked by MCMC and [are now] getting a connection timeout error."
A brief technical summary from iMAP reveals what happens when users attempt to access sites using Cloudflare and Google DNS.
• On Maxis, DNS queries to Google Public DNS (8.8.8.8) servers are being automatically redirected to Maxis ISP DNS Servers;
• On Time, DNS queries to both Google Public DNS (8.8.8.8) and Cloudflare Public DNS (1.1.1.1) are being automatically redirected to Time ISP DNS servers.
"Instead of the intended Google and Cloudflare servers, users are being served results from ISP DNS servers. In addition to MCMC blocked websites, other addresses returned from ISP DNS servers can also differ from those returned by Google and Cloudflare," iMAP warns.
Technical Problems, Technical Solutions
It's worth highlighting the seriousness of these claims. Requests destined for Google and Cloudflare DNS are being rerouted to local ISPs, in a manner that indicates those companies are responsible for users ending up at the Malaysian Communications and Multimedia Commission's IP address (175.139.142.25), rather than the website they requested.
In a nutshell, internet users cannot rely on their ISPs' DNS servers to respond accurately, and can longer rely on third-party DNS to respond accurately either.
But if there's one good thing about such aggressive blocking it's this: like almost all efforts that rely on a technical solution to impose blocking, there is a technical solution to neutralize it.
Details are available from iMAP and apply to anyone wishing to improve their online privacy and security in general, not just those wishing to avoid their DNS requests being hijacked.
"Users that are affected, can configure their browser settings to enable DNS over HTTPS to secure their DNS lookups by using direct encrypted connection to private or public trusted DNS servers. This will also bypass transparent DNS proxy interference and provide warning of interference," iMAP concludes.
Tacit Acceptance of ■■■■■■■■■■
Finally, it's worth mentioning that Malaysia is no stranger to censorship and controlling access to information. Under the Printing Presses and Publications Act 1984, unlicensed use or possession of a printing press is still a crime. Site-blocking measures that go way beyond blocking pirate sites currently target thousands of websites.
The big question is whether asking countries that routinely block access to information, to add even more domains to already large lists, sends the right kind of message.
Worse still, is active participation taken as an endorsement of what some claim is a denial of fundamental human rights? Not to mention being an affront to DNS, the very thing that underpins the right to communication and the free exchange of information and ideas.
Jump in the discussion.
No email address required.
Tldr
Jump in the discussion.
No email address required.
More options
Context
Would love to know how they're redirecting the DNS requests, I guess they can see them and just redirect them because they're providing the networks.
Does this mean that your ISP can read your DNS requests even if they're not your DNS provider? Guess so.
Are they redirecting all DNS traffic, or just the ones on the naughty list?
DoH has problems, but I'm always too r-slurred to remember them, can anyone give a summary?
Jump in the discussion.
No email address required.
DNS is not encrypted by default and your ISP is basically the ultimate MitM
Jump in the discussion.
No email address required.
Isn't there an encrypted form of DNS now? I wonder if they just ban it entirely lmao.
Jump in the discussion.
No email address required.
Yes, there it: DoH and DoT: DNS over https/TLS (DNS over https/TLS)
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
More options
Context
dont be a pirate, dont have the backbone of teh internet lie to u simple as
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
show me a list of the allegedly blocked sites and let's see if any of them are worth caring about
or else you are just parroting propaganda
which is ok if ur into that im not kinkshaming here
Jump in the discussion.
No email address required.
https://web.archive.org/web/20160226142541/http://www.themalaysianinsider.com/malaysia/article/tmi-turns-8-cut-off-from-selected-net-providers
https://www.malaysiakini.com/news/228819
https://imap.sinarproject.org/news/blocking-of-malaysianow-website
They actually seemed to have started blocking political dissidents before porn and piracy.
Jump in the discussion.
No email address required.
oh sorry my mistake i thought it was an important story my bad
Jump in the discussion.
No email address required.
@X (formerly chiobu) he's dissing your homeland!!
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
!metashit how many alts does xhe have??
Jump in the discussion.
No email address required.
!metashit fricking r-slur doesnt know hes muted and its EVERYTHING
Jump in the discussion.
No email address required.
More options
Context
purchase an alt seeing eye to find out
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
Jump in the discussion.
No email address required.
Nooo you cant like just remove me from life thats heckin 1984 thats heckin murder
Jump in the discussion.
No email address required.
Is this an abortion troll? It didn't really land for me.
I do genuinely think you (generally) have a good sense of humor. Most of rdrama doesn't make me laugh but you do sometimes.
Jump in the discussion.
No email address required.
I mean like if anyone said that to me while wearing the chud AGP smirk ( )I would murder them
Jump in the discussion.
No email address required.
I honestly don't understand either of these responses, idk if it's your award messing up the delivery or what. How's your day been?
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
mfw the printing press events keep popping up even though it's 1750 and the institution has been accepted world wide for 200 years.
Jump in the discussion.
No email address required.
(((who))) owns Big Printing?
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Run a private DNS server like Pihole. Easy to setup
Jump in the discussion.
No email address required.
More options
Context
LITERALLY 1984!!
Jump in the discussion.
No email address required.
More options
Context
Snapshots:
https://torrentfreak.com/isps-hijack-cloudflare-google-dns-requests-ending-site-blocking-workarounds-240807/:
ghostarchive.org
archive.org
archive.ph (click to archive)
Jump in the discussion.
No email address required.
More options
Context