Conference item
Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses
- Abstract:
- One of the primary fltering methods that the Great Firewall of China (GFW) relies on is poisoning DNS responses for certain domains. When a DNS request is poisoned by the GFW, multiple DNS responses are received - both legitimate and poisoned responses. While most prior research into the GFW focuses on the poisoned responses, ours also considers the legitimate responses from the DNS servers themselves. We fnd that even when we ignored the immediate poisoned responses, the cache from the DNS servers themselves are also poisoned.We also fnd and discuss the IP addresses within the DNS responses we get; in particular 9 IP addresses that are returned as a result for many diferent poisoned domains. We present the argument that this type of attack may not be primarily targeted directly at users, but at the underlying DNS infrastructure within China.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 160.1KB, Terms of use)
-
- Publisher copy:
- 10.1145/2994620.2994636
Authors
- Publisher:
- Association for Computing Machinery
- Host title:
- WPES '16: 2016 ACM on Workshop on Privacy in the Electronic Society
- Journal:
- WPES '16: 2016 ACM on Workshop on Privacy in the Electronic Society More from this journal
- Publication date:
- 2016-10-24
- Acceptance date:
- 2016-09-06
- DOI:
- ISBN:
- 9781450345699
- Keywords:
- Pubs id:
-
pubs:657013
- UUID:
-
uuid:33adc5ff-53d6-4f31-9596-c809de2417de
- Local pid:
-
pubs:657013
- Source identifiers:
-
657013
- Deposit date:
-
2016-11-03
Terms of use
- Copyright holder:
- Farnan et al
- Copyright date:
- 2016
- Notes:
- © 2016 Copyright held by the owner/author(s). Publication rights licensed to ACM.
If you are the owner of this record, you can report an update to it here: Report update to this record