[145076] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Nxdomain redirect revenue

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Tue Sep 27 07:50:39 2011

In-Reply-To: <4E818FFE.70908@gmail.com>
Date: Tue, 27 Sep 2011 06:50:28 -0500
From: Jimmy Hess <mysidia@gmail.com>
To: William Allen Simpson <william.allen.simpson@gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Tue, Sep 27, 2011 at 3:57 AM, William Allen Simpson
<william.allen.simpson@gmail.com> wrote:
[snip]
> Certainly, hijacking google.com NS records to JOMAX.NET would be a
> criminal interference. =A0After all, that's all DNSsec signed now,
> isn't it?

I would rather see DNSSEC  and TLS/HTTPS get implemented end to end.
The last thing we need is a court to step in and say "It's not legal
for an ISP to
blacklist, block, or redirect traffic,  to any hostname or IP address."

Most likely the ISPs'  lawyers were smart enough to include a clause
in the ToS/AUP allowing
the ISP to intercept, blackhole, or redirect access to any hostname or
IP address.

The name for an ISP intercepting traffic from its own users is  not
"interference"  or  "DoS",
because they're breaking the operation of (er) only their own network.


The solution is to spread their name as widely as possible, so
consumers can make an informed
choice if they wish to avoid service providers that engage in abusive pract=
ices,
and bring it attention to regulators if the service providers are
acting as an abusive monopoly in regards to their interception
practices.

--
-JH


home help back first fref pref prev next nref lref last post