Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Chinese DNS Tampering a Real Threat to Outsiders

Trailrunner7 (1100399) writes | more than 3 years ago

Government 1

Trailrunner7 (1100399) writes "China has long used the Internet's Domain Name Service (DNS) to censor Web sites and information that the ruling Communist Party deems threatening. But now security experts warn that the government's censorship is in danger of spilling over China's borders: suppressing the ability of those living outside of China to find information online.

An estimated 57% of all networks on earth passed DNS requests through a Chinese DNS rootserver at some point in 2010, according to data from security firm Renesys. Tampering by the Communist Party there poses a danger to Internet security and freedom. In fact, DNS tampering may be a bigger threat than techniques like BGP (Border Gateway Protocol) hijacking, which is believed to be responsible for an unexpected shift in Internet routing in April that has recently been the subject of mainstream media reports in the U.S. There is already evidence that China's efforts to tamper with DNS have bled outside the country's borders. The same report to Congress from the U.S.-China Economic and Security Review Commission that called attention to the BGP hijacking incident from April, 2010, also mentions a March, 2010, incident in which Internet users in the United States and Chile attempted to connect to social networking websites banned by the Chinese government. However, their DNS requests were handled by a Beijing-based Domain Name Server, which responded with incorrect DNS information that directed the surfers to incorrect servers, the report says."

Link to Original Source

cancel ×

1 comment

Sorry! There are no comments related to the filter you selected.

Not really, no (1)

Spazmania (174582) | more than 3 years ago | (#34374612)

If last year's "mistake" repeats their roots will simply be stripped from the zone by ICANN here in the US.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>