-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
automatically gather more information on block detection #647
Comments
Yes, very good suggestion! On a related note (perhaps of the note to self type) the traceroute engine in measurement-kit is very basic, and I'd like to be able to do some |
BTW, |
Some notes while observing DNS spoofing at AS41843:
So (2) and (3) are already gathered, gathering data for (1), (4), (5), (7), (8) and (9) may be useful in some cases. |
Some notes while observing RST injection at AS8997:
|
RIPE Atlas DNS hackathon have brought another awesome masterpiece: Recursive DNS Server Fingerprint. |
PTRs of infrastructural IPs are also useful as services may migrate and it may be good to have that information stored (that can also be done in the pipeline). |
Some notes while observing DNS zone hijacking at some of recursors in AS22047:
|
measurement-kit/measurement-kit#1311 brings the idea of fingerprinting https blockpage server checking supported TLS versions and ciphersuites. See also DinoTools/sslscan. |
Simple
mtr --report-wide --show-ips --tcp --port 443 blocked.ws
andmtr --report-wide --show-ips --udp --port 53 8.8.8.8
in addition to plainmtr --report-wide --show-ips --icmp example.net
may add valuable information to web_connectivity report when some network block happens.Sending DNS query directly to SOA NS may be useful too as 8.8.8.8 is well-known and may be hijacked on per-IP basis.
ooniprobe
may gather alike data as soon as it detects major difference between measurement & control.The text was updated successfully, but these errors were encountered: