May. 1st, 2006

doc_strange: (Default)
This useful tidbit came across from Pawel Rogocz on the djbdns mailing list today.

If you don't know what actual host is really doing your DNS lookups - or you suspect that, despite having your DNS resolver set to xxx.xxx.xxx.xxx, some network trick is going on, and some other host is actually doing the lookups... you can look up whoami.ultradns.net. It always returns the IP address of the actual DNS server that is doing the query.

Very nice. So now if you're on some hotel network set up with a tunnel to work, but DNS pointed at your favorite open DNS resolver, you can check whether the hotel net is playing games with you. Or your cable provider. Or your DSL provider....

Why does it matter? Well, first off, some folks use alternative DNS roots - for corporate name space, and for extensions on the 'normal' DNS root. The intercepting box may be a benign "feature" of the network you're on, but have a way out of date root nameserver file, causing you to fail to resolve new TLDs like .name. And finally, it may be a security concern if someone is intercepting and giving you bogus DNS responses and you rely on the names (rather than on a site certificate being correct, but you knew that didn't you?). Of course, a savvy man-in-the-middle attacker will just return the correct IP you suspect, but this'll let you know about all the cache engines and proxies you might encounter that get in your DNS way.

host whoami.ultradns.net
nslookup whoami.ultradns.net

Whatever tool you like. Useful. You can even uncover nameserver's alternate IPs this way.
host whoami.ultradns.net nameserver.IP.address.here

Coolness.

Profile

doc_strange: (Default)doc_strange

April 2025

S M T W T F S
  12345
67891011 12
13141516171819
20212223242526
27282930   

Style Credit

Expand Cut Tags

No cut tags
Page generated May. 23rd, 2025 05:18 am
Powered by Dreamwidth Studios