• chevron_right

      Google, Cloudflare & Cisco Will Poison DNS to Stop Piracy Block Circumvention

      news.movim.eu / TorrentFreak · Thursday, 13 June - 17:19 · 5 minutes

    football block In France, where laws were introduced with site-blocking and similar anti-piracy measures already baked in, entertainment giant Canal+ seems intent on taking full advantage.

    Like similar broadcasters with lucrative sports rights to exploit, Canal+ has a subset of viewers who prefer to consume from pirate sources which charge much less, or even nothing at all.

    To maximize its existing site-blocking efforts through local ISPs, the French broadcaster has now taken the logical, albeit controversial, next step on the site-blocking ladder.

    DNS Tampering at the Local ISP Level

    In 2023, Canal+ went to court in France to tackle pirate sports streaming sites including Footybite.co, Streamcheck.link, SportBay.sx, TVFutbol.info, and Catchystream.com. The broadcaster said that since subscribers of local ISPs were accessing the pirate sites using their services, the ISPs should prevent them from doing so.

    When the decision went in favor of Canal+, ISPs including Orange, SFR, OutreMer Télécom, Free, and Bouygues Télécom, were required to implement technical measures. Since the ISPs have their own DNS resolvers for use by their own customers, these were configured to provide non-authentic responses to deny access to the sites in question.

    In response, increasingly savvy internet users that hadn’t already done so, simply changed their settings to use different DNS providers – Cloudflare, Google, and Cisco – whose resolvers hadn’t been tampered with; at least not yet.

    One More Step Up The Ladder: Public DNS Tampering

    Use of third-party DNS providers to circumvent blocking isn’t uncommon so last year Canal+ took legal action against three popular public DNS providers – Cloudflare ( 1.1.1.1 ), Google ( 8.8.8.8 ), and Cisco ( 208.69.38.205 ), demanding measures similar to those implemented by French ISPs.

    Tampering with public DNS is a step too far for many internet advocates but for major rightsholders, if the law can be shaped to allow it, that’s what will happen. In this case, Article L333-10 of the French Sports Code (active Jan 2022) seems capable of accommodating almost anything.

    When there are “serious and repeated violations” by an “online public communication service” whose main objective is the unauthorized broadcasting of sports competitions, rightsholders can demand “all proportionate measures likely to prevent or put an end to this infringement, against any person likely to contribute to remedying it.”

    Google, Cloudflare, and Cisco Ordered to Prevent Circumvention

    Two decisions were handed down by the Paris judicial court last month; one concerning Premier League matches and the other the Champions League. The orders instruct Google, Cloudflare, and Cisco to implement measures similar to those in place at local ISPs. To protect the rights of Canal+, the companies must prevent French internet users from using their services to access around 117 pirate domains.

    According to French publication l’Informé , which broke the news, Google attorney Sébastien Proust crunched figures published by government anti-piracy agency Arcom and concluded that the effect on piracy rates, if any, is likely to be minimal.

    Starting with a pool of all users who use alternative DNS for any reason, users of pirate sites – especially sites broadcasting the matches in question – were isolated from the rest. Users of both VPNs and third-party DNS were further excluded from the group since DNS blocking is ineffective against VPNs.

    Proust found that the number of users likely to be affected by DNS blocking at Google, Cloudflare, and Cisco, amounts to 0.084% of the total population of French Internet users. Citing a recent survey, which found that only 2% of those who face blocks simply give up and don’t find other means of circumvention, he reached an interesting conclusion.

    “2% of 0.084% is 0.00168% of Internet users! In absolute terms, that would represent a small group of around 800 people across France!”

    Court Rejected Arguments Against Blocking

    In common with other courts presented with the same arguments, the Paris court said the number of people using alternative DNS to access the sites, and the simplicity of switching DNS, are irrelevant.

    Canal+ owns the rights to the broadcasts and if it wishes to request a blocking injunction, it has the legal right to do so.

    The DNS providers’ assertion that their services are not covered by the legislation was also waved aside by the court.

    Google says it intends to comply with the order. As part of the original matter in 2023, it was already required to deindex the domains from search results under the same law.

    At least in theory, this means that those who circumvented the original blocks using these alternative DNS services, will be back to square one and confronted by blocks all over again.

    Given that circumventing this set of blocks will be as straightforward as circumventing the originals, that raises the question of what measures Canal+ will demand next, and from whom.

    Tribunal Judiciare de Paris | Canal+ | Cloudflare/Google/Cisco
    Premier League UEFA Champions league
    footybite.cc footybite.tv
    footybite.io hesgoal.today
    hesgoal.name redditsoccerstreams.org
    pirlotv.app rsoccerstreams.net
    reddit-soccerstreams.com soccerstreams.football
    redditsoccerstreams.tv soccerstreamshd.com
    streameast.gg totalsporteks.net
    volokit.to sportsurge.app
    totalsportek.ac redditsoccerstreams.xyz
    soccerstreamlinks.com hesgoals.top
    socceron.name hdmatch.club
    lacasadeltikitaka.net bitestreams.net
    streamseast.ai livesoccer.sx
    bestsolaris.com footybite.one
    radamel.icu techclips.net
    sports.f1livestream.top sports.f1livestream.top
    backfirstwo.site reddit.soccerstreamshd.com
    reddit.volokit.to extratime.live
    hitsports.pro streameast.top
    tvhd.tutvlive.site soccerstreams.app
    dotsport.live freeviplive.com
    dotsport1.com fapxy.info
    elkoora.live 1l1l.to
    fel3ardaa.com futbolonlinetv.club
    golkoralive.com hesgoal.world
    silapathikaram.com hesgoaltv.me
    cainsoffering.net sporthd.me
    golkoralive.live cdnz.one
    kkooralives.com ivesoccer.sx
    koora-live.io livetv705.me
    kooralivs.com livetv706.me
    kora4live.net pirlotvhd.online
    live-kooora.com rojadirectatv.uno
    livekooora.online soccerstreams100.io
    live-kooora-tv.com tarjetarojaenvivo.me
    live-kooora-tv.net tarjetarojatvhd.com
    livekoora.io stream.pajitotv.info
    live-koora.online hesgoaled.com
    livetv707.me 1.ivesoccer.sx
    livetv708.me embx214129.apl275.me
    monlive.info emb.apl275.me
    rojadirectaenvivotv.me embx214161.apl275.me
    rojadirectaes.org stream.rodrixtv.info
    awtsport.com fk9.pw
    live7.pro m.soccerstreams100.io
    sportsonline.so ovo-line.com
    4koora.elkoora.live sportschamp.fun
    f.fel3ardaa.com givemereddit.eu
    v3.sportsonline.sx streamseast.ai
    kora.live-koora.live tazz.tv
    alkora.golkoralive.live embx214374.apl275.me
    kooralive.koora-live.io hd.espnv2.online
    m.koora-live.io embx210801.apl275.me
    syria-live.us
    4kooralive.live-kooora.com
    5kooralive.live-kooora.com
    tvkoora.livekooora.online
    mypanlss.store
    koora.live-kooora-tv.net
    v2.sportsonline.so
    kora.livekoora.io
    koras.live-koora.online
    embx214129.apl274.me
    embx210130.apl276.me
    capodeportes.run
    sports-stream.info
    topstreams.me
    sports.chelsealivestream.com
    sportsleading.online

    From: TF , for the latest news on copyright battles, piracy and more.

    • chevron_right

      Understanding DNS—anatomy of a BIND zone file

      Jim Salter · news.movim.eu / ArsTechnica · Monday, 24 August, 2020 - 10:30 · 1 minute

    What does this stream of binary digits have to do with DNS? Nothing, really—but good luck finding a pretty pic somewhere that does!

    Enlarge / What does this stream of binary digits have to do with DNS? Nothing, really—but good luck finding a pretty pic somewhere that does! (credit: Santo Heston )

    If you want to be a sysadmin or network administrator of any kind, there's a fundamental technology you really need to understand—DNS, the Domain Name Service. There was a time when a sysadmin with no aspirations to managing Internet-accessible services might have gotten by without understanding DNS, but that time is long, long gone.

    You can't learn everything there is to know about DNS in a single article. But that's not what we're looking to do today; instead, we want to give you a clear, concise guide to the structure and meaning of the most important part of the Domain Name System: a zone file, as seen in BIND, the Berkeley Internet Name Daemon.

    Sample zone file

    Origin and TTL

    Above, we have a small but complete example of a typical zone file—in fact, it's an anonymized version of a production zone file on a domain I manage. Let's go through it line by line.

    Read 46 remaining paragraphs | Comments

    index?i=cNsNcKUW5xY:bUNfCURl_18:V_sGLiPBpWUindex?i=cNsNcKUW5xY:bUNfCURl_18:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
    • chevron_right

      Créer des certificats avec ACME/Let's Encrypt et des vérifications DNS

      Adrien Dorsaz · Thursday, 18 August, 2016 - 13:03 edit · 1 minute

    Hello,

    Voici une petite introduction à mon nouvel petit outil acme-dns-tiny qui me permet de demander à mon autorité de certification préférée de signer un certificat TLS automatiquement suite à des vérifications de ressources DNS et au moyen du protocol ACME.

    L'outil a été crée depuis le projet père acme-tiny qui permet de faire la même chose, mais par vérification de liens HTTP.

    Le but principal était de pouvoir créer des certificats sans avoir à perturber les services du serveur de production. Un second but était de pouvoir exécuter ce script sur une autre machine que le serveur de production et sans accès root. Enfin, comme son parent, un troisième but est d'être suffisamment court (~250 lignes) et restreint à la création de certificat pour être vérifiable rapidement.

    Les deux premiers buts sont atteignables grâce aux possibilités de modification dynamique de ressources DNS à travers des messages DNS spécifiques et authentifiés avec un clé TSIG.

    J'espère que cet outil pourra aussi être utile à d'autres, n'hésitez pas à le diffuser !

    Si tu trouves un bug ou que tu penses que le script peut être amélioré (sûrement ! c'est mon premier projet en python…), n'hésite pas à me le rapporter soit sur mon Gitlab, soit sur le mirroir Github, soit par email/xmpp à adrien@adorsaz.ch.

    Merci de m'avoir lu et let's encrypt now !

    • Adrien Dorsaz / acme-dns-tiny

      This is a fork of [acme-tiny](https://github.com/diafygi/acme-tiny) to provide Let's Encrypt issue and renew certificates using the DNS challenges.

      GitLab

    • gitlab_logo-7ae504fe4f68fdebb3c2034e36621930cd36ea87924c11ff65dbcb8ed50dca58.png