Thanks for the report, Chuck. I'm surprised to hear that you're seeing
FIOS intercept Google Public DNS queries. I checked last night (FIOS
from central New Jersey), and was able to verify that my queries went
to Google Public DNS.
We've had internal discussions of listening on additional ports. It's
hypothetically possible to do on the Google side, but very hard for a
user (even a very technically sophisticated one) to send DNS queries
to an alternate port. All hardware and almost all software we're
familiar with doesn't allow you to specify a destination port.
Hope this helps. --PSRC
There have been other messages in this forum from FIOS users who
didn't apear to have problems. Good to know that it varies from place
to place.
> > ...I checked last night (FIOS
> > from central New Jersey),
>
> Exactly how did you check? Did you just look at the packets (with
> something like Wireshark)? The interception rewrites the packets so
> the responses _appear_ to come from the DNS sever you were trying to
> reach. The exchanged packets will look completely valid and exactly as
> expected!
Right. (If they didn't, your system wouldn't accept them.)
> The _main_ valid way to test this is to ask your intended DNS server
> if it just processed a query from you. (A second way that sometimes
> works is if the DNS server has a special name that "lies", returning a
> different result than you'd get from any other DNS server - request
> that particular name and see if the "lie" was returned or not.)
You're referring to something like OpenDNS's welcome and which/txt
queries, right?
I'm a software engineer on the Google Public DNS project, so I used
some internal tools.
> > ...All hardware and almost all software we're
> > familiar with doesn't allow you to specify a destination port.
>
> Baloney. The Microsoft DNS service can do it (probably with a registry
> change). My very old BIND 8 can do it. etc. etc.
Good to hear. Dnsmasq was the only tool I was aware of that could do
this. Are there details documented somewhere about how to do this with
various versions of BIND, etc.? (I take it you've already tried doing
this with your home network and OpenDNS?)
> > Hope this helps. --PSRC
>
> Unfortunately not. The background information does _not_ provide any
> guidance to me on how to solve my problem.
Making sure I understand your problem: Verizon is (1) intercepting
udp/53 traffic and (2) returning results different than what you'd get
if Verizon simply passed along that traffic (and the resulting
responses).
Here's why I'm concentrating on your problem: While this sounds a
long-standing issue, already discussed elsewhere, this is the first
report we've received. (Check the archives.) It might be simple to
address, it might be complicated to address (everything related to
software and networks is more complex than it seems like it ought to
be), and it might be simple for Verizon to counter. So far as I know,
a relatively small number of users could, or would, take advantage of
this feature. We simply haven't really thought about this.
Since we haven't thought about listening on alternative ports, we
currently have no plans to implement that. But we're open to feedback,
from you and others, on how valuable you'd find this feature.
Hope this starts a useful conversation. --PSRC