Internet Censorship Update: Transparent DNS Proxy Implemented by Malaysian ISPs on Cloudflare and Google Public DNS Servers

Transparent DNS Proxy Implemented by Malaysian ISPs on Cloudflare and Google Public DNS Servers

6th August 2024, Transparent DNS proxy redirecting DNS queries to Google and Cloudflare public DNS has been implemented by two Malaysian ISPs Maxis and Time, leading to users now unable to access websites officially blocked by MCMC through alternative DNS servers. 

Initial findings

It was detected through automated and manual testing on 5th August, that transparent DNS proxy redirecting DNS queries to Google and Cloudflare public DNS servers has been implemented by two Malaysian ISPs Maxis and Time. Users that have configured their Internet settings to use alternative DNS servers, would have found that they are now unable to access websites officially blocked by MCMC and getting a connection timeout error.

Summary:

  • On Maxis, DNS queries to Google Public DNS (8.8.8.8) servers on ip address are being automatically redirected to Maxis ISP DNS Servers; and
  • On Time, DNS queries to both Google Public DNS (8.8.8.8) and Cloudflare Public DNS (1.1.1.1) are being automatically redirected to Time ISP DNS servers. 

Instead of the intended Google and Cloudflare servers, users are being served results from ISP DNS servers. In addition to MCMC blocked websites, other addresses returned from ISP DNS servers can also differ from those returned by Google and Cloudflare. 

Securing DNS services

Users being redirected to unauthenticated websites and services that are different from that intended can pose a security risk and result in unexpected technical issues. Standard DNS queries are also unencrypted and addresses requested by users can be viewed and logged.

Users that are affected, can configure their browser settings to enable DNS over HTTPS to secure their DNS lookups by using direct encrypted connection to private or public trusted DNS servers. This will also bypass transparent DNS proxy interference and provide warning of interference.

Firefox Web Browser

Users using Firefox web browser and enable DNS over HTTPS via Settings and the Privacy & Security Tab. Enable Max Protection to use DNS over HTTPs when browning all sites.

firefox_setting.png

Firefox Browser Security Settings for DNS over HTTPS

Chrome Web Browser

Users using Chrome Web Browser can enable DNS over HTTPS via Settings and the Security tab. Enable Use secure DNS and then select one of the public DNS servers such as Google or Cloudflare.

Google Chrome Browser Security Settings for DNS over HTTPS
Google Chrome Browser Security Settings for DNS over HTTPS

DNS Query and OONI network interference data

Domain

ISPs implementing DNS proxy

Datetime

Detailed data from OONI

www.grindr.com

  1. TIME (AS9930)
  2. Maxis (AS9534)

5 August 2024

OONI Explorer Link (Time/Google)

OONI Explorer Link (Maxis/Cloudflare)

murrayhunter.substack.com

  1. TIME (AS9930)
  2. Maxis (AS9534)

6 August 2024

See DNS query results.



DNS Query Results

1.1.1.1 on Time (AS9930)


Result:

Transparent proxy DNS being implemented

dig @1.1.1.1 murrayhunter.substack.com


; <<>> DiG 9.18.28-0ubuntu0.22.04.1-Ubuntu <<>> @1.1.1.1 murrayhunter.substack.com

; (1 server found)

;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19278

;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1


;; OPT PSEUDOSECTION:

; EDNS: version: 0, flags:; udp: 4096

;; QUESTION SECTION:

;murrayhunter.substack.com. IN A


;; ANSWER SECTION:

murrayhunter.substack.com. 5 IN CNAME mcmc.time.net.my.

mcmc.time.net.my. 924 IN A 175.139.142.25


;; Query time: 39 msec

;; SERVER: 1.1.1.1#53(1.1.1.1) (UDP)

;; WHEN: Tue Aug 06 10:46:29 +08 2024

;; MSG SIZE  rcvd: 100

8.8.8.8 on Time (AS9930)


Result:

Transparent proxy DNS being implemented

dig @8.8.8.8 murrayhunter.substack.com


; <<>> DiG 9.18.28-0ubuntu0.22.04.1-Ubuntu <<>> @8.8.8.8 murrayhunter.substack.com

; (1 server found)

;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51496

;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1


;; OPT PSEUDOSECTION:

; EDNS: version: 0, flags:; udp: 4096

;; QUESTION SECTION:

;murrayhunter.substack.com. IN A


;; ANSWER SECTION:

murrayhunter.substack.com. 5 IN CNAME mcmc.time.net.my.

mcmc.time.net.my. 938 IN A 175.139.142.25


;; Query time: 31 msec

;; SERVER: 8.8.8.8#53(8.8.8.8) (UDP)

;; WHEN: Tue Aug 06 10:46:16 +08 2024

;; MSG SIZE  rcvd: 100

1.1.1.1 on Maxis (AS9534)


Result:

Transparent proxy DNS not being implemented

dig @1.1.1.1 murrayhunter.substack.com


; <<>> DiG 9.18.28-0ubuntu0.22.04.1-Ubuntu <<>> @1.1.1.1 murrayhunter.substack.com

; (1 server found)

;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48122

;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1


;; OPT PSEUDOSECTION:

; EDNS: version: 0, flags:; udp: 1232

;; QUESTION SECTION:

;murrayhunter.substack.com. IN A


;; ANSWER SECTION:

murrayhunter.substack.com. 300 IN A 104.18.10.223

murrayhunter.substack.com. 300 IN A 104.18.11.223


;; Query time: 71 msec

;; SERVER: 1.1.1.1#53(1.1.1.1) (UDP)

;; WHEN: Tue Aug 06 10:51:04 +08 2024

;; MSG SIZE  rcvd: 86



8.8.8.8 on Maxis (AS9534)


Result:

Transparent proxy DNS being implemented

dig @8.8.8.8 murrayhunter.substack.com


; <<>> DiG 9.18.28-0ubuntu0.22.04.1-Ubuntu <<>> @8.8.8.8 murrayhunter.substack.com

; (1 server found)

;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58398

;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1

;; WARNING: Message has 11 extra bytes at end


;; QUESTION SECTION:

;murrayhunter.substack.com. IN A


;; ANSWER SECTION:

murrayhunter.substack.com. 1800 IN CNAME mcmc-redirect.maxis.com.my.

mcmc-redirect.maxis.com.my. 18 IN A 175.139.142.25


;; ADDITIONAL SECTION:

rpz.blacklist.maxis.com.my. 1 IN SOA dnsb01.men.maxis.com.my. root.rpz.blacklist.maxis.com.my. 2024130081 3600 600 1209600 3600


;; Query time: 67 msec

;; SERVER: 8.8.8.8#53(8.8.8.8) (UDP)

;; WHEN: Tue Aug 06 10:51:01 +08 2024

;; MSG SIZE  rcvd: 200

These test measurements from OONI and DNS query results confirmed that a few Malaysian ISPs (internet service providers) were implementing a transparent DNS proxy that redirects DNS queries to Cloudflare and Google DNS servers, and these ISP servers are transparently returning MCMC block server address instead of those served by Google and Cloudflare.

The data on OONI was collected through the OONI Probe App by Sinar Project and various volunteers. A confirmed blocking on OONI shows that there has been DNS blocking on the website whereby the DNS had been tampered to redirect to MCMC’s IP address: 175.139.142.25. For this case, the DNS service serving these blocked IP addresses are erroneously shown as those from Google or Cloudflare due to transparent DNS proxy being implemented by ISPs.

Call for testing

Sinar Project is calling for volunteers to help with the continuous monitoring and testing of internet censorship. Further information can be found here or our Telegram group. 

For monitoring this particular implementation of Transparent DNS Proxies by ISPs in Malaysia, we encourage our volunteers to configure their DNS to 8.8.8.8 or 1.1.1.1 prior to OONI testing.