Re: what is my dns?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2023-04-12 at 13:36 -0700, ToddAndMargo via users wrote:
> $ dig gbis.com
> ...
> ;; Query time: 71 msec
> ;; SERVER: 127.0.0.1#53(127.0.0.1) (UDP)
> 
> 
> Not real helpful.  I think I will just ping a
> porn site and see what happens.

You've truncated that far too much for us to tell whether you've
assessed that correctly.  All that tells us that whatever the query,
and whatever answers, or lack of answers, dig probed 127.0.0.1 for it,
and it responded in some way.  *Your* query was internal, but what it
did with your query, we don't know.


> $ ping xxx.com
> PING xxx.com (146.112.61.106) 56(84) bytes of data.
> 64 bytes from hit-adult.opendns.com (146.112.61.106): icmp_seq=1 ttl=58 
> time=12.1 ms
> 
> 
> And that answered my question.

Since you got an IP to ping for that domain name, something did *not*
block the DNS query.  It was resolved.  But that looks like their
substitute for the blocked site.  If I try that address in a web
browser I get an unhelpful error message, with a bit of info about
trying to resolve the problem.  If I ran a censoring site, my error
page would have said "blocked page, reason porn" (or other reasons).

If I try pinging a non-existent domain name, I get this response:

	$ ping bulldust.lan
	ping: bulldust.lan: Name or service not known

That can be because the domain name doesn't exist, or my DNS server
didn't get an IP for it (it could pretend it doesn't exist).

If I had a censoring DNS server, it could provide an IP that's actually
for someone else.  That could be a server that simply throws up a "page
is blocked" message to any of the blocked domain names, so you know
what happened.  In that case, I'd could get a ping response akin to:

	$ ping nastysite.lan
	PING safeblocker.lan (93.184.216.34) 56(84) bytes of data.
	64 bytes from safeblocker.lan (93.184.216.34): icmp_seq=1 ttl=50 time=161 ms
	64 bytes from safeblocker.lan (93.184.216.34): icmp_seq=2 ttl=50 time=161 ms

Where I *might* see that the response came from somewhere else, and I
*might* get some ping responses.  I tried pinging nastysite, the server
gave me their safe IP instead, and that IP resolved to safeblocker. 
The kind of thing you got.  Though, a ping test is not a browsing test.

If I try pinging an existing domainname, one that isn't responding to
pings, I get this response.

	$ ping nastyserver.lan
	PING nastyserver.lan (192.168.1.44) 56(84) bytes of data.
	From rocky.lan (192.168.1.1) icmp_seq=1 Destination Host Unreachable

(the from line is the machine I'm typing the command into)

However, I can't tell from that whether it's switched off, or not
responding to pings.  It could be fully functional, but ignoring pings.

Ping only proves that some network hardware answered its pings.  A lack
of a response doesn't mean a site isn't there, it doesn't prove that a
web server isn't running.  Conversely, if you do get a ping response,
it also doesn't prove that a web server is running.  It's not a web
server that responds to pings.

It's a bit like looking for the power light on my PC.  It only shows
that it's switched on.  It doesn't tell me anything about what may, or
may not, be running on it.

Ping tests a network end-to-end, provides some timing information about
those pings and their responses.  Beyond that it tells you virtually
nothing (some people may look at the nature of the ping responses, and
decide because it's so-many bytes, etc, it's possibly some particular
OS).  But still, it's only testing pings.  If you want to test
something else, like the presence of a website, you need to try
browsing to it.

For what it's worth, mangling DNS to block a website will only be
partially successful.  Only the big sites might have consistent IPs,
new crap pops up every minute and a censoring DNS server will always be
out-of-date (same with anti-virus), and browsers can use other means
than traditional DNS queries to connect (so places like schools would
need to use more effective blocking techniques).

e.g. https://en.wikipedia.org/wiki/DNS_over_HTTPS can bypass your
network's configured DNS server(s).  It will use another technique to
directly query something over the internet.

At this stage, I don't think you get to pick what it uses.  You only
have a choice whether your web browser has DoH enabled.  So you want
want to check it's off.

And DoT is another alternative:
https://en.wikipedia.org/wiki/DNS_over_TLS

And HTTP proxies are another (the proxy can do the resolving).

> 
> options {
>    forwarders { 208.67.222.123; 208.67.220.123; };
> 
> 
> is not being bypassed by
> 
> 
> zone "bravesoftware.com" IN {
>          type forward;
>          forward only;
>          forwarders {8.8.8.8; 8.8.4.4; };
> };
> 

I can't really tell that from what you've posted.

I can tell that from that snippet of the named.conf file, that if you
make any DNS queries of your DNS server regarding "bravesoftware.com"
it will ask either 8.8.8.8 or 8.8.4.4 for the answers.  Every other DNS
query, made through your DNS server, will be answered by 208.67.222.123
or 208.67.220.123 (FamilyShield DNS servers).

But if a browser doesn't query your DNS server, it won't be censored.

-- 
 
uname -rsvp
Linux 3.10.0-1160.88.1.el7.x86_64 #1 SMP Tue Mar 7 15:41:52 UTC 2023 x86_64
 
Boilerplate:  All unexpected mail to my mailbox is automatically deleted.
I will only get to see the messages that are posted to the mailing list.
 
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux