Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Interesting dig on an (un)dead host. #14

Closed
ghost opened this issue Apr 11, 2020 · 2 comments
Closed

Interesting dig on an (un)dead host. #14

ghost opened this issue Apr 11, 2020 · 2 comments

Comments

@ghost
Copy link

ghost commented Apr 11, 2020

Additional context

I was curious about this entry listed as inactive so I did a quick dig. Check it out. OFC whois was useless for me considering the (likely) fast-fluxing of aws buckets in combo with their CNAME scheming.

Thank-you for bringing it to my attention.

Peace brother ☮️

intr0 $ dig @1.1.1.1 1687.ic-live.com
; <<>> DiG 9.9.7-P3 <<>> @1.1.1.1 1687.ic-live.com
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37604
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1452
;; QUESTION SECTION:
;1687.ic-live.com.        IN    A

;; ANSWER SECTION:
1687.ic-live.com.    177    IN    CNAME    pixel.ic-live.com.
pixel.ic-live.com.    177    IN    CNAME    latency-pixel.ic-live.com.

;; AUTHORITY SECTION:
ic-live.com.        777    IN    SOA    ns-1485.awsdns-57.org. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400

;; Query time: 35 msec
;; SERVER: 1.1.1.1#53(1.1.1.1)
;; WHEN: Sat Apr 11 14:08:32 EDT 2020
;; MSG SIZE  rcvd: 191

It's CNAME-ing to the domains listed in the 2nd answer returned in the dig. I'll have to keep an eye on them. uBlock is great at dealing with malicious sites hiding behind CNAMEs, but only on FireFox as far as I know. For now I'll keep it and also include the main host as well as CNAME scheme they're currently using and the name server Amazon gave them.

@ghost ghost closed this as completed Apr 11, 2020
@funilrys
Copy link
Member

funilrys commented Apr 12, 2020

Yup I could check that behavior 🤔 What is strange is that PyFunceble is programmed to check the CNAME. But it works with 8.8.8.8 but not with 1.1.1.1. I think that it will be better to globally switch (at @dead-hosts) to the Google Public DNS server.

Here is what I'm talking about:

import PyFunceble

PyFunceble.load_config(generate_directory_structure=False)

DOMAIN = "1687.ic-live.com"
DNS_SERVERS = [("1.1.1.1:53", "1.0.0.1:53"), ("8.8.8.8:53", "8.4.4.8:53")]
TO_REQUEST = ["A", "AAAA", "NS", "CNAME", "DNAME", "MX", "TXT"]


for dns in DNS_SERVERS:
    print(f"===== Started with {dns} =====")
    PyFunceble.DNSLOOKUP.update_nameserver(dns)
    for record_type in TO_REQUEST:
        print(
            "TCP",
            record_type,
            getattr(PyFunceble.DNSLOOKUP, f"{record_type.lower()}_record")(
                DOMAIN, tcp=True
            ),
        )
        print(
            "UDP",
            record_type,
            getattr(PyFunceble.DNSLOOKUP, f"{record_type.lower()}_record")(
                DOMAIN, tcp=False
            ),
        )

    print(f"===== Finished with {dns} =====")

and the result:

===== Started with ('1.1.1.1:53', '1.0.0.1:53') =====
TCP A None
UDP A None
TCP AAAA None
UDP AAAA None
TCP NS None
UDP NS None
TCP CNAME None
UDP CNAME None
TCP DNAME None
UDP DNAME None
TCP MX None
UDP MX None
TCP TXT None
UDP TXT None
===== Finished with ('1.1.1.1:53', '1.0.0.1:53') =====
===== Started with ('8.8.8.8:53', '8.4.4.8:53') =====
TCP A None
UDP A None
TCP AAAA None
UDP AAAA None
TCP NS None
UDP NS None
TCP CNAME ['pixel.ic-live.com.']
UDP CNAME ['pixel.ic-live.com.']
TCP DNAME None
UDP DNAME None
TCP MX None
UDP MX None
TCP TXT None
UDP TXT None
===== Finished with ('8.8.8.8:53', '8.4.4.8:53') =====

I'm definitely going to switch @dead-hosts to the Google Public DNS.

And don't worry. Those marked as Inactive will be automatically retested (even if removed from the original lists).

Thanks for the feedback @mozdevcontrib ! I will investigate this further as we are dependent on dnspython for the DNS Lookup.

funilrys added a commit to dead-hosts/infrastructure-launcher that referenced this issue Apr 12, 2020
@ghost
Copy link
Author

ghost commented Apr 12, 2020 via email

This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant