Re: [問卦] 真的有人進去過假教育部網站?
先說結論
自己架的 DNS: OK
中華電信 DNS: 127.0.0.1
中山大學 DNS: OK
TWNIC DNS : OK
GLITCH.MS DNS: OK
其他家電信公司/學校很多 DNS 都沒有辦法直接查詢,
所以就查以上這些而已
結論就是: 中華電信過濾了這個 DNS
原因不明,可能是接到政府命令過濾
原來中華電信也變 GFW 了,我現在才知道
==== GLITCH.MS DNS =====
第一行指令先查 glitch.me 的 DNS Server IP ,
第二行指令再從 glitch.me 的 DNS server 查這個 IP
$ dig ns glitch.me
; <<>> DiG 9.16.12 <<>> ns glitch.me
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33517
;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;glitch.me. IN NS
;; ANSWER SECTION:
glitch.me. 21512 IN NS ns-109.awsdns-13.com.
glitch.me. 21512 IN NS ns-1239.awsdns-26.org.
glitch.me. 21512 IN NS ns-1952.awsdns-52.co.uk.
glitch.me. 21512 IN NS ns-681.awsdns-21.net.
;; Query time: 13 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: 二 5月 25 12:03:26 CST 2021
;; MSG SIZE rcvd: 178
$ dig @ns-109.awsdns-13.com. edu-tw.glitch.me
; <<>> DiG 9.16.12 <<>> @ns-109.awsdns-13.com. edu-tw.glitch.me
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64278
;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 4, ADDITIONAL: 1
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;edu-tw.glitch.me. IN A
;; ANSWER SECTION:
edu-tw.glitch.me. 60 IN A 34.192.112.232
edu-tw.glitch.me. 60 IN A 3.226.93.91
edu-tw.glitch.me. 60 IN A 52.20.88.154
edu-tw.glitch.me. 60 IN A 52.5.236.64
edu-tw.glitch.me. 60 IN A 18.214.211.90
edu-tw.glitch.me. 60 IN A 52.7.247.180
edu-tw.glitch.me. 60 IN A 107.23.215.235
edu-tw.glitch.me. 60 IN A 52.54.176.55
;; AUTHORITY SECTION:
glitch.me. 172800 IN NS ns-109.awsdns-13.com.
glitch.me. 172800 IN NS ns-1239.awsdns-26.org.
glitch.me. 172800 IN NS ns-1952.awsdns-52.co.uk.
glitch.me. 172800 IN NS ns-681.awsdns-21.net.
;; Query time: 13 msec
;; SERVER: 205.251.192.109#53(205.251.192.109)
;; WHEN: 二 5月 25 12:03:39 CST 2021
;; MSG SIZE rcvd: 313
========== LOG ===============
$ dig @192.168.1.254 edu-tw.glitch.me
; <<>> DiG 9.16.12 <<>> @192.168.1.254 edu-tw.glitch.me
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44704
;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; COOKIE: e7b2212b5ba900990100000060ac750cefd20a0756ebd310 (good)
;; QUESTION SECTION:
;edu-tw.glitch.me. IN A
;; ANSWER SECTION:
edu-tw.glitch.me. 60 IN A 52.20.88.154
edu-tw.glitch.me. 60 IN A 34.193.24.140
edu-tw.glitch.me. 60 IN A 107.23.215.235
edu-tw.glitch.me. 60 IN A 52.45.158.113
edu-tw.glitch.me. 60 IN A 52.5.236.64
edu-tw.glitch.me. 60 IN A 35.172.76.106
edu-tw.glitch.me. 60 IN A 52.54.176.55
edu-tw.glitch.me. 60 IN A 52.206.49.186
;; Query time: 900 msec
;; SERVER: 192.168.1.254#53(192.168.1.254)
;; WHEN: 二 5月 25 11:54:52 CST 2021
;; MSG SIZE rcvd: 201
$ dig @168.95.1.1 edu-tw.glitch.me
; <<>> DiG 9.16.12 <<>> @168.95.1.1 edu-tw.glitch.me
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14933
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; COOKIE: 4cc51e037fc7c8ec180c17e760ac7561eff281ae37a4b78d (good)
;; QUESTION SECTION:
;edu-tw.glitch.me. IN A
;; ANSWER SECTION:
edu-tw.glitch.me. 86400 IN A 127.0.0.1
;; Query time: 9 msec
;; SERVER: 168.95.1.1#53(168.95.1.1)
;; WHEN: 二 5月 25 11:56:17 CST 2021
;; MSG SIZE rcvd: 89
$ dig @140.117.11.1 edu-tw.glitch.me
; <<>> DiG 9.16.12 <<>> @140.117.11.1 edu-tw.glitch.me
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51853
;; flags: qr rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 14
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: dbb42f87e15ddf330100000060ac75b9634fc5a28d9368d8 (good)
;; QUESTION SECTION:
;edu-tw.glitch.me. IN A
;; AUTHORITY SECTION:
. 276585 IN NS d.root-servers.net.
. 276585 IN NS i.root-servers.net.
. 276585 IN NS a.root-servers.net.
. 276585 IN NS g.root-servers.net.
. 276585 IN NS l.root-servers.net.
. 276585 IN NS m.root-servers.net.
. 276585 IN NS c.root-servers.net.
. 276585 IN NS b.root-servers.net.
. 276585 IN NS e.root-servers.net.
. 276585 IN NS f.root-servers.net.
. 276585 IN NS h.root-servers.net.
. 276585 IN NS j.root-servers.net.
. 276585 IN NS k.root-servers.net.
;; ADDITIONAL SECTION:
a.root-servers.net. 41084 IN A 198.41.0.4
b.root-servers.net. 124879 IN A 199.9.14.201
c.root-servers.net. 400036 IN A 192.33.4.12
d.root-servers.net. 414174 IN A 199.7.91.13
e.root-servers.net. 211070 IN A 192.203.230.10
f.root-servers.net. 432976 IN A 192.5.5.241
g.root-servers.net. 383085 IN A 192.112.36.4
h.root-servers.net. 379735 IN A 198.97.190.53
i.root-servers.net. 207420 IN A 192.36.148.17
j.root-servers.net. 103531 IN A 192.58.128.30
k.root-servers.net. 95001 IN A 193.0.14.129
l.root-servers.net. 175932 IN A 199.7.83.42
m.root-servers.net. 417847 IN A 202.12.27.33
$ dig @101.101.101.101 edu-tw.glitch.me
; <<>> DiG 9.16.12 <<>> @101.101.101.101 edu-tw.glitch.me
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9401
;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; COOKIE: e37091648a94bba90100000060ac7624132ab4721ee7c62a (good)
;; QUESTION SECTION:
;edu-tw.glitch.me. IN A
;; ANSWER SECTION:
edu-tw.glitch.me. 60 IN A 3.226.93.91
edu-tw.glitch.me. 60 IN A 34.193.24.140
edu-tw.glitch.me. 60 IN A 34.201.75.161
edu-tw.glitch.me. 60 IN A 52.206.49.186
edu-tw.glitch.me. 60 IN A 52.86.228.72
edu-tw.glitch.me. 60 IN A 52.54.176.55
edu-tw.glitch.me. 60 IN A 3.208.69.249
edu-tw.glitch.me. 60 IN A 52.5.236.64
;; Query time: 109 msec
;; SERVER: 101.101.101.101#53(101.101.101.101)
;; WHEN: 二 5月 25 11:59:32 CST 2021
;; MSG SIZE rcvd: 201
;; Query time: 16 msec
;; SERVER: 140.117.11.1#53(140.117.11.1)
;; WHEN: 二 5月 25 11:57:45 CST 2021
;; MSG SIZE rcvd: 504
※ 引述《tetani (喵喵)》之銘言:
: ※ 引述《lesnaree2 ( )》之銘言:
: : 網址是edu-tw.glitch.me
: : 完全是進不去的狀態
: : 然後事實查核中心在昨天(5/24)
: : https://tfc-taiwan.org.tw/articles/5576
: : 說這是假網站,比政府,立委都還要慢
: : 也就是說這個謠言在政府和立委說出來之前
: : 事實查核中心是不知道的
: : 謠言內容是停課到6/18,
: : 這個謠言有什麼意義我也不清楚
: Ping edu-tw.glitch.me [127.0.0.1] (使用 32 位元組的資料):
: 回覆自 127.0.0.1: 位元組=32 時間<1ms TTL=128
: 回覆自 127.0.0.1: 位元組=32 時間<1ms TTL=128
: 回覆自 127.0.0.1: 位元組=32 時間<1ms TTL=128
: 回覆自 127.0.0.1: 位元組=32 時間<1ms TTL=128
: 修正一下
: 中華電信的用戶應該是看不到這網站
: dns已經被指向自己的電腦
: 不知道是何時修改的
: 中華電信用戶想看到要自己修改dns
: C:\Windows\system32>nslookup
: 預設伺服器: dns.hinet.net
: Address: 2001:b000:168::2
: > server 8.8.8.8
: 預設伺服器: dns.google
: Address: 8.8.8.8
: > edu-tw.glitch.me
: 伺服器: dns.google
: Address: 8.8.8.8
: 未經授權的回答:
: 名稱: edu-tw.glitch.me
: Addresses: 34.193.24.140
: 34.192.63.42
: 52.5.236.64
: 52.206.49.186
: 107.23.110.216
: 3.208.69.249
: 52.54.176.55
: 52.86.228.72
: 要看到那個假的教育部網站
: 還要會自己改dns才行
: hinet預設dns是看不到了
--
※ 發信站: 批踢踢實業坊(ptt.cc), 來自: 111.240.2.108 (臺灣)
※ 文章網址: https://www.ptt.cc/bbs/Gossiping/M.1621915945.A.664.html
推
05/25 12:13,
3年前
, 1F
05/25 12:13, 1F
→
05/25 12:13,
3年前
, 2F
05/25 12:13, 2F
→
05/25 12:13,
3年前
, 3F
05/25 12:13, 3F
中華電信確實有過濾 DNS
※ 編輯: cc1plus (111.240.2.108 臺灣), 05/25/2021 12:14:24
→
05/25 12:14,
3年前
, 4F
05/25 12:14, 4F
→
05/25 12:14,
3年前
, 5F
05/25 12:14, 5F
推
05/25 12:15,
3年前
, 6F
05/25 12:15, 6F
推
05/25 12:15,
3年前
, 7F
05/25 12:15, 7F
→
05/25 12:19,
3年前
, 8F
05/25 12:19, 8F
推
05/25 12:27,
3年前
, 9F
05/25 12:27, 9F
推
05/25 12:27,
3年前
, 10F
05/25 12:27, 10F
推
05/25 12:30,
3年前
, 11F
05/25 12:30, 11F
→
05/25 12:30,
3年前
, 12F
05/25 12:30, 12F
推
05/25 12:55,
3年前
, 13F
05/25 12:55, 13F
噓
05/25 13:06,
3年前
, 14F
05/25 13:06, 14F
噓
05/25 13:46,
3年前
, 15F
05/25 13:46, 15F
噓
05/25 14:15,
3年前
, 16F
05/25 14:15, 16F
討論串 (同標題文章)