Solved SSL hijacking


cnn, the guardian, rt and euronews.
You can add CGTN, Press TV and lets not forget news from the literal prison colony, the good old Australia's ABC.
 

My Computer

System One

  • OS
    Windows 11 Home
    Computer type
    PC/Desktop
    CPU
    AMD Ryzen 5 8600G (07/24)
    Motherboard
    ASROCK B650M-HDV/M.2 3.15 (07/24)
    Memory
    2x32GB Kingston FURY DDR5 5600 MHz CL36 @4800 CL40 (07/24)
    Graphics Card(s)
    ASROCK Radeon RX 6600 Challenger D 8G @60FPS (08/24)
    Sound Card
    Creative Sound BlasterX AE-5 Plus (05/24)
    Monitor(s) Displays
    24" Philips 24M1N3200ZS/00 (05/24)
    Screen Resolution
    1920×1080@165Hz via DP1.4
    Hard Drives
    Kingston KC3000 NVMe 2TB (05/24)
    ADATA XPG GAMMIX S11 Pro 512GB (07/19)
    PSU
    Seasonic Core GM 550 Gold (04/24)
    Case
    Fractal Design Define 7 Mini with 3x Noctua NF-P14s/12@555rpm (04/24)
    Cooling
    Noctua NH-U12S with Noctua NF-P12 (04/24)
    Keyboard
    HP Pavilion Wired Keyboard 300 (07/24) + Rabalux 76017 Parker (01/24)
    Mouse
    Logitech M330 Silent Plus (04/23)
    Internet Speed
    500/100 Mbps via RouterOS (05/21) & TCP Optimizer
    Browser
    Edge & Brave for YouTube & LibreWolf for FB
    Antivirus
    NextDNS
    Other Info
    Backup: Hasleo Backup Suite (PreOS)
    Headphones: Sennheiser RS170 (09/10)
    Phone: Samsung Galaxy Xcover 7 (02/24)
    Chair: Huzaro Force 4.4 Grey Mesh (05/24)
    Notifier: Xiaomi Mi Band 9 Milanese (10/24)
    2nd Monitor: AOC G2460VQ6 @75Hz (02/19)
Utilizing a protocol like DNSCrypt can mitigate the risk of DNS hijacking. However, it's important to note that it doesn't provide a guarantee. For stronger assurance, DNSSEC should be used concurrently. Due to the lack of comprehensive support for DNSSEC, not all websites can be authenticated using this method.
There are encrypted DNS servers which support DNSSEC, 1.1.1.1 (cloudflare) supports it.
But I don't know how this is used by Windows 11 when configured in adapter settings in settings app?

In Win10 I was using SimpleDNSCrypt which let me filter DNS servers on DNSSEC support, but how this applies to Windows 11 built-in feature I don't know.
I suppose that's the same thing you're saying?
How could a web site that is not DNS support DNSSEC?

You can add CGTN, Press TV ... ABC
Interesting I never visited them before because they seem not so impacting on social life but will take a look out of interest.
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790
There are encrypted DNS servers which support DNSSEC, 1.1.1.1 (cloudflare) supports it.
But I don't know how this is used by Windows 11 when configured in adapter settings in settings app?

In Win10 I was using SimpleDNSCrypt which let me filter DNS servers on DNSSEC support, but how this applies to Windows 11 built-in feature I don't know.
I suppose that's the same thing you're saying?
How could a web site that is not DNS support DNSSEC?


Interesting I never visited them before because they seem not so impacting on social life but will take a look out of interest.

There are encrypted DNS servers which support DNSSEC, 1.1.1.1 (cloudflare) supports it.
But I don't know how this is used by Windows 11 when configured in adapter settings in settings app?

In Win10 I was using SimpleDNSCrypt which let me filter DNS servers on DN

There are encrypted DNS servers which support DNSSEC, 1.1.1.1 (cloudflare) supports it.
But I don't know how this is used by Windows 11 when configured in adapter settings in settings app?

In Win10 I was using SimpleDNSCrypt which let me filter DNS servers on DNSSEC support, but how this applies to Windows 11 built-in feature I don't know.
I suppose that's the same thing you're saying?
How could a web site that is not DNS support DNSSEC?
The problem isn't with the DNS resolver, as I had mentioned earlier; instead, it's the large majority of websites themselves that lack DNSSEC support. Windows lacks a built-in feature to handle DNSSEC, whether to alert you about compliance or provide a filter to reject unsigned names. To mitigate this, a third-party solution such as SimpleDNSCrypt, which you've utilized, or a similar tool would be necessary.

I'm uncertain about your statement, "How could a website that is not DNS support DNSSEC", but here is an overview of how DNSSEC functions.


Here are the key components necessary for DNSSEC to work:

1. DNS Data : This includes the actual records, such as A records (which link a domain to an IP address), MX records (which identify mail servers), etc.

2. Digital Signatures : Digital signatures are created by the private key of the signer and can be verified by anyone who has access to the signer's public key. They're used to verify the authenticity of the DNS data.

3. Keys : In DNSSEC, two types of cryptographic keys are used: the Zone Signing Key (ZSK) and the Key Signing Key (KSK). The ZSK is used to sign individual records within the zone, while the KSK is used to sign the zone's DNSKEY record. The KSK must be kept particularly secure because it's used to verify the authenticity of DNSKEY records.

4. Resource Records : DNSSEC introduces new types of resource records:
- DNSKEY record: Contains the public keys that a DNS resolver uses to verify DNSSEC signatures.
- RRSIG record: Contains the DNSSEC signature for a record set. It's used to store the digital signature of a DNS record set.
- DS record: Delegation Signer, it's placed in the parent zone and used to verify the DNSKEY record in the child zone.
- NSEC record: Used to provide authenticated denial of existence, meaning it can securely indicate that a specific record does not exist.
- NSEC3 record: This is an alternative to NSEC and provides the same functionality, but with additional security.

5. Resolvers : These are clients that query DNS servers. A DNSSEC-aware resolver is capable of validating signatures in response to DNS queries with the associated DNSKEY or DS records.

6. Registrars and Registries : These are important for maintaining the chain of trust in DNSSEC. The registrar is the company where you register your domain name. The registry manages the TLD (Top Level Domain, such as .com, .org, etc.). When you enable DNSSEC, a DS record is created, and this record needs to be inserted into the parent zone by the registrar/registry to maintain the chain of trust.

7. Chain of Trust : DNSSEC works on the basis of a chain of trust which starts from the root zone (.) and goes all the way down to the DNS record being secured. If every link in the chain is intact, the DNS response is authenticated. This chain is created through the interaction of DS and DNSKEY records.

For DNSSEC to work properly, all these components must interact correctly.

The functioning of DNSSEC requires interaction between several parties:

1. Domain Name Registrant : This is the individual or organization that owns or controls the domain name. They are responsible for generating DNSSEC keys and signing the DNS zone records. They also provide the Delegation Signer (DS) record to their domain name registrar.

2. Domain Name Registrar : The company where the domain name is registered. When provided with a DS record from the registrant, the registrar has to put this record into the parent zone.

3. DNS Hosting Provider : This can be the same as the domain name registrar or a different organization. They host the authoritative DNS records for the domain and must support DNSSEC, serving signed records correctly.

4. Domain Name Registry : They manage the Top-Level Domain (TLD). When they receive the DS record from the registrar, they need to put it into the DNS zone for the TLD. This establishes the chain of trust from the root.

5. Internet Service Providers (ISPs) and DNS Resolvers : They operate the DNS resolvers that clients use when making DNS queries. They have to support DNSSEC to validate the DNSSEC signatures and to check the chain of trust.

6. End Users : They use the services and should have a DNSSEC-aware DNS resolver to verify DNSSEC signatures.

7. Root Zone Operators : They manage the root of the DNS hierarchy. Their role in DNSSEC is to digitally sign the root zone's contents, which is critical for maintaining the chain of trust.

All these parties must perform their roles correctly and securely for DNSSEC to function.
 

My Computer

System One

  • OS
    Windows 11 Pro
Very useful, I'm going to re-read a few times over until I memorize all this.
There are DNSSEC options in secpol but sadly these apply to AD only.

Therefore at a minimum to make it happen we need both a DNSSEC aware resolver and DNSSEC enabled site.
I thought it applies only to DNS servers.
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790

My Computer

System One

  • OS
    Windows 11 Pro Version 23H2(OS Build 22631.4317)
    Computer type
    PC/Desktop
    Manufacturer/Model
    AMD
    CPU
    12-Core AMD Ryzen 9 5900X, 4950 MHz (49.5 x 100)
    Motherboard
    Gigabyte X570 Aorus Master
    Memory
    4 - G Skill Trident Z Neo F4-3600C16-16GTZNC
    Graphics Card(s)
    PCI Express 4.0 x16: PowerColor RX 6800
    Sound Card
    Realtek ALC1220 @ AMD K19.2 - High Definition Audio Controller
    Monitor(s) Displays
    2 - 27 inch Westinghouse
    Screen Resolution
    1920 x 1080
    Hard Drives
    2 SSD - 2 TB each
    1 SSD - 4TB
    1 HDD - 2TB
    Keyboard
    logitech
    Mouse
    logitech
    Internet Speed
    1 GB
    Browser
    Firefox
    Antivirus
    Eset Endpoint Security
Interesting I never visited them before because they seem not so impacting on social life
In US eyes, Iran is actually more dangerous than Russia. It is the quiet ones that get you first.
OAN is good
WION, I like news from countries like India or Africa, they offer raw news with with an unique perspective.
Japan for example is basically US copycat, so there is nothing interesting, except some local news. 😼
 

My Computer

System One

  • OS
    Windows 11 Home
    Computer type
    PC/Desktop
    CPU
    AMD Ryzen 5 8600G (07/24)
    Motherboard
    ASROCK B650M-HDV/M.2 3.15 (07/24)
    Memory
    2x32GB Kingston FURY DDR5 5600 MHz CL36 @4800 CL40 (07/24)
    Graphics Card(s)
    ASROCK Radeon RX 6600 Challenger D 8G @60FPS (08/24)
    Sound Card
    Creative Sound BlasterX AE-5 Plus (05/24)
    Monitor(s) Displays
    24" Philips 24M1N3200ZS/00 (05/24)
    Screen Resolution
    1920×1080@165Hz via DP1.4
    Hard Drives
    Kingston KC3000 NVMe 2TB (05/24)
    ADATA XPG GAMMIX S11 Pro 512GB (07/19)
    PSU
    Seasonic Core GM 550 Gold (04/24)
    Case
    Fractal Design Define 7 Mini with 3x Noctua NF-P14s/12@555rpm (04/24)
    Cooling
    Noctua NH-U12S with Noctua NF-P12 (04/24)
    Keyboard
    HP Pavilion Wired Keyboard 300 (07/24) + Rabalux 76017 Parker (01/24)
    Mouse
    Logitech M330 Silent Plus (04/23)
    Internet Speed
    500/100 Mbps via RouterOS (05/21) & TCP Optimizer
    Browser
    Edge & Brave for YouTube & LibreWolf for FB
    Antivirus
    NextDNS
    Other Info
    Backup: Hasleo Backup Suite (PreOS)
    Headphones: Sennheiser RS170 (09/10)
    Phone: Samsung Galaxy Xcover 7 (02/24)
    Chair: Huzaro Force 4.4 Grey Mesh (05/24)
    Notifier: Xiaomi Mi Band 9 Milanese (10/24)
    2nd Monitor: AOC G2460VQ6 @75Hz (02/19)
I like news from countries like India or Africa, they offer raw news with with an unique perspective.
Their worldviews might be unique but I think they're still influenced one way or another, even if just little, ex. by blocks such as BRICS, or traditional vs modernist currents.

There are very few countries in the world which declare them neutral or who act neutrally when asked to align position.
And I doubt people who are owners or in control of independent news don't have their own worldview, the only ones who honestly don't have their worldviews are those not interested in politics at all, I highly doubt this applies to owners of news no matter how they declare themself, neutral, independent or whatever else.
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790
I appreciate all the replies and respect your opinions and I hope you respect mine but perhaps this thread should be closed to avoid talking non computer related things?

My aim was not to bring controversy but this problem with SSL was so longstanding and annoying for me because it was random, but it turns out because I was resetting my adapter which I often do because I use virtual adapter which stucks from time to time.
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790
I have no words.
Nor do I. If the reporting agency has an agenda in any part of its reporting, IMO they can not be trusted to speak the truth with anything they report. I do not consider it "fun" to attempt to separate truth from lies. Is there any outlet that is 100% unbiased and who speaks the truth any more? I do not think so. I think the closest one might be AP.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 24H2 26100.2314
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Optiplex 7080
    CPU
    i9-10900 10 core 20 threads
    Motherboard
    DELL 0J37VM
    Memory
    32 gb
    Graphics Card(s)
    none-Intel UHD Graphics 630
    Sound Card
    Integrated Realtek
    Monitor(s) Displays
    Benq 27
    Screen Resolution
    2560x1440
    Hard Drives
    1tb Solidigm m.2 nvme+256gb SKHynix m.2 nvme /External drives 512gb Samsung m.2 sata+1tb Kingston m2.nvme+ 4gb Solidigm nvme
    PSU
    500w
    Case
    MT
    Cooling
    Dell Premium
    Keyboard
    Logitech wired
    Mouse
    Logitech wireless
    Internet Speed
    so slow I'm too embarrassed to tell
    Browser
    Firefox
    Antivirus
    Defender+MWB Premium
  • Operating System
    Windows 10 Pro 22H2 19045.3930
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Optiplex 9020
    CPU
    i7-4770
    Memory
    24 gb
    Monitor(s) Displays
    Benq 27
    Screen Resolution
    2560x1440
    Hard Drives
    256 gb Toshiba BG4 M.2 NVE SSB and 1 tb hdd
    PSU
    500w
    Case
    MT
    Cooling
    Dell factory
    Mouse
    Logitech wireless
    Keyboard
    Logitech wired
    Internet Speed
    still not telling
    Browser
    Firefox
    Antivirus
    Defender+MWB Premium
I would like to report that today my government implemented a method to somehow redirect encrypted DNS traffic.

I again got this certificate related privacy error and then looked into network settings to make sure my DNS isn't set to default router DNS,
instead it was set to cloudflare 1.1.1.1 (encrypted) in Windows settings app.
Therefore I'm now sure they are capable to redirect DNS even if it's set to encrypted in network settings.
Perhaps they got a shady deal with couldflare?

What's also new is that they now instead inject rt.com domain certificate with today's expiration date instead of their own fake cert.

I was able to get around their attack by installing simplednscrypt and choosing a new DNS server from Switzerland.

It could be they've read my thread here and were working hard to hide their tax administration domain by obtaining fake rt cert, if that's the case, I would like to see what they do now...
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790
I would like to report that today my government implemented a method to somehow redirect encrypted DNS traffic.

I again got this certificate related privacy error and then looked into network settings to make sure my DNS isn't set to default router DNS,
instead it was set to cloudflare 1.1.1.1 (encrypted) in Windows settings app.
Therefore I'm now sure they are capable to redirect DNS even if it's set to encrypted in network settings.
Perhaps they got a shady deal with couldflare?

What's also new is that they now instead inject rt.com domain certificate with today's expiration date instead of their own fake cert.

I was able to get around their attack by installing simplednscrypt and choosing a new DNS server from Switzerland.

It could be they've read my thread here and were working hard to hide their tax administration domain by obtaining fake rt cert, if that's the case, I would like to see what they do now...
rt.com is currently experiencing intermittent issues with its security certificate. It wouldn't be surprising if these disruptions are the result of actions by an external entity. rt.com has not implemented DNSSEC, a crucial security measure, and I find this lack of action puzzling.

It seems that the issue is only impacting certain DNS servers. Similarly to simplednscrypt, I utilize a program that facilitates the creation of a pool of DNS servers, with anonymous relays. For each query, a DNS server and an anonymous relay are selected at random. Nonetheless, I have been intermittently experiencing the certificate error throughout the day.

1689512279661.png
 
Last edited:

My Computer

System One

  • OS
    Windows 11 Pro
rt.com is currently experiencing intermittent issues with its security certificate. It wouldn't be surprising if these disruptions are the result of actions by an external entity. rt.com has not implemented DNSSEC, a crucial security measure, and I find this lack of action puzzling.

It seems that the issue is only impacting certain DNS servers. Similarly to simplednscrypt, I utilize a program that facilitates the creation of a pool of DNS servers, with anonymous relays. For each query, a DNS server and an anonymous relay are selected at random. Nonetheless, I have been intermittently experiencing the certificate error throughout the day.
Hi windoc, thank you for comment,
I'm sure this is not a problem of rt's certificate because I have been testing the connection with psiphon3 and connecting from US server and rt's certificate was just fine with that approach.
The problem persists only if connecting without proxy which let's the ISP to be intermediate between me and the end domain.

Perhaps you can test setting your DNS to couldflare 1.1.1.1 and see if you have same issues?

It seems that the issue is only impacting certain DNS servers.
Well it's possible that rt is being banned world wide or in the process of doing so, but I'm not sure about that since it works in the US.
I think it's just my government because of their previous exposure.
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790
Hi windoc, thank you for comment,
I'm sure this is not a problem of rt's certificate because I have been testing the connection with psiphon3 and connecting from US server and rt's certificate was just fine with that approach.
The problem persists only if connecting without proxy which let's the ISP to be intermediate between me and the end domain.

Perhaps you can test setting your DNS to couldflare 1.1.1.1 and see if you have same issues?


Well it's possible that rt is being banned world wide or in the process of doing so, but I'm not sure about that since it works in the US.
I think it's just my government because of their previous exposure.


After establishing a rule to route only rt.com traffic via Cloudflare's 1.1.1.1, I've consistently encountered privacy errors. This suggests that some interference is occurring at the DNS level. It's plausible that the U.S. isn't favorable towards the content on rt.com due to its growing viewership, and they might be attempting to limit its influence on U.S. users. The suggestion could be that the authorities would prefer viewers to engage with domestic mainstream media outlets like CNN or Fox News, instead.
 

My Computer

System One

  • OS
    Windows 11 Pro
After establishing a rule to route only rt.com traffic via Cloudflare's 1.1.1.1, I've consistently encountered privacy errors. This suggests that some interference is occurring at the DNS level.
Well if that's the case then cloudflare is influenced by somebody.

It's plausible that the U.S. isn't favorable towards the content on rt.com due to its growing viewership, and they might be attempting to limit its influence on U.S. users. The suggestion could be that the authorities would prefer viewers to engage with domestic mainstream media outlets like CNN or Fox News, instead.
Makes sense, since cloudfare is based in California it's possible that the US government has it's fingers there.

I'm glad to learn that encrypted DNS is not secure, but at least Switzerland is free of foreign influence, so I'll continue to use their servers.
Thenks for testing!
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790
Well if that's the case then cloudflare is influenced by somebody.


Makes sense, since cloudfare is based in California it's possible that the US government has it's fingers there.

I'm glad to learn that encrypted DNS is not secure, but at least Switzerland is free of foreign influence, so I'll continue to use their servers.
Thenks for testing!
DNSSEC (Domain Name System Security Extensions) and DNS encryption are two different security measures, and they serve different purposes.

DNSSEC is used to protect against DNS spoofing and cache poisoning attacks. It ensures that the DNS responses a client receives are authentic and haven't been tampered with, by signing DNS data with digital signatures. DNSSEC, however, does not encrypt DNS data, so while it guarantees the authenticity of the data, it does not protect the privacy of the data in transit.


DNS over HTTPS (DoH) or DNS over TLS (DoT) are protocols that encrypt DNS queries, protecting them from eavesdropping and tampering. They make it significantly harder (but not impossible) for third parties to manipulate or redirect DNS traffic.

Even when DNSSEC isn't in use, encrypted DNS protocols can still provide a good level of security against redirection or tampering. However, they aren't foolproof. If a malicious entity controls a router, a network, or a DNS server, they could potentially redirect or tamper with DNS queries, even if they're encrypted. But this would be a highly complex and targeted attack, and it would be difficult to carry out on a large scale.

Also, it's worth mentioning that encrypted DNS protocols won't be effective if the DNS server itself is not trustworthy. Therefore, it's important to use a reputable DNS provider.
 

My Computer

System One

  • OS
    Windows 11 Pro
Also, it's worth mentioning that encrypted DNS protocols won't be effective if the DNS server itself is not trustworthy. Therefore, it's important to use a reputable DNS provider.
Exactly this,
Any servers based in the US, Germany, Canada and I'm sure even other states influenced by the US cannot be trusted.

This isn't only about DNS but also any kind of server which users frequently use such as email providers are also affected,
According to this site Privacy-Conscious Email Services


And according to this site: PRISM Break
Warning: Microsoft Windows is affected by PRISM. Even using the software tools we recommend here, your privacy may be compromised by Windows.

But this is perhaps nothing new except when we face it on our own skin as it is the case now proving that Edward Snowden was correct about all that he said and is still saying.

If a government can tell cloudflare to hijack DNS then they can also tell Microsoft or any other firm or entity what to do if they want.
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790
@windoc
btw. I would like to know which is the DNS software that you're using to create rules?
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    MSI / MS-7B29
    CPU
    Intel i3 8100 @3.6Ghz
    Motherboard
    H310M PRO-VDH (MS-7B29)
    Memory
    1 x 16GB DDR4 @2400 MHz
    Graphics Card(s)
    Nvidia GeForce GT 1030 2GB SDDR4
    Sound Card
    Realtek VEN_10EC&DEV_0887 / NVIDIA VEN_10DE&DEV_0081
    Monitor(s) Displays
    Acer V226HQL
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD 500 GB Crucial MX500 / HDD 1 TB TOSHIBA DT01ACA100
    PSU
    ATX, details unknown
    Case
    Everest 551B
    Cooling
    details unknown
    Keyboard
    Mechanical Gaming Hydra R7 - Rampage
    Mouse
    Logitech G703
    Internet Speed
    Down: 28Mbps / Up: 19Mbps
    Browser
    Microsoft Edge
    Antivirus
    Microsoft Defender Antivirus
    Other Info
    Bluetooth: TP Link 5.0 Nano USB adapter UB500
    WLAN: D-Link 150 Pico USB adapter, N standard
    Web camera: Logitech C270 HD 720p @30fps
    Microphone: Trust MICO, model 23790
The problem persists only if connecting without proxy which let's the ISP to be intermediate between me and the end domain.
Most browsers use Windows certificate store, Firefox based browsers use a different one.
You could force Windows to reset certificates to get the latest versions or wait till it updates.
Either way this will keep reoccurring because they are not allowed to buy "normal" certificates.

capture_07162023_163112.jpg
 

My Computer

System One

  • OS
    Windows 11 Home
    Computer type
    PC/Desktop
    CPU
    AMD Ryzen 5 8600G (07/24)
    Motherboard
    ASROCK B650M-HDV/M.2 3.15 (07/24)
    Memory
    2x32GB Kingston FURY DDR5 5600 MHz CL36 @4800 CL40 (07/24)
    Graphics Card(s)
    ASROCK Radeon RX 6600 Challenger D 8G @60FPS (08/24)
    Sound Card
    Creative Sound BlasterX AE-5 Plus (05/24)
    Monitor(s) Displays
    24" Philips 24M1N3200ZS/00 (05/24)
    Screen Resolution
    1920×1080@165Hz via DP1.4
    Hard Drives
    Kingston KC3000 NVMe 2TB (05/24)
    ADATA XPG GAMMIX S11 Pro 512GB (07/19)
    PSU
    Seasonic Core GM 550 Gold (04/24)
    Case
    Fractal Design Define 7 Mini with 3x Noctua NF-P14s/12@555rpm (04/24)
    Cooling
    Noctua NH-U12S with Noctua NF-P12 (04/24)
    Keyboard
    HP Pavilion Wired Keyboard 300 (07/24) + Rabalux 76017 Parker (01/24)
    Mouse
    Logitech M330 Silent Plus (04/23)
    Internet Speed
    500/100 Mbps via RouterOS (05/21) & TCP Optimizer
    Browser
    Edge & Brave for YouTube & LibreWolf for FB
    Antivirus
    NextDNS
    Other Info
    Backup: Hasleo Backup Suite (PreOS)
    Headphones: Sennheiser RS170 (09/10)
    Phone: Samsung Galaxy Xcover 7 (02/24)
    Chair: Huzaro Force 4.4 Grey Mesh (05/24)
    Notifier: Xiaomi Mi Band 9 Milanese (10/24)
    2nd Monitor: AOC G2460VQ6 @75Hz (02/19)

Latest Support Threads

Back
Top Bottom