You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Depends on:#1 (Project Scaffolding), #2 (Resolver List Fetcher)
Summary
Test resolver IPs with connectivity checks and multi-domain DNS queries to identify working resolvers and their behavior characteristics.
Motivation: First filtering step to reduce the large raw IP list (~10k+) to resolvers that respond and behave well. Different query types help identify resolvers suitable for DNS tunneling.
Design
Scan Steps
Ping check: Verify basic connectivity before DNS queries
Normal domain queries: Test basic DNS resolution
google.com - commonly whitelisted in Iran
microsoft.com - another baseline test
Blocked domain query: Test censorship behavior
facebook.com or x.com
Iranian resolvers often hijack and return 10.x.x.x ranges
Resolvers that properly resolve blocked domains are often better for tunneling
Custom tunnel domain query: Test if resolver can reach our NS subdomain
Provided via --tunnel-domain flag
Tests if resolver can resolve the NS record used for tunneling
Output
Filter out non-responding IPs and non-DNS servers. See #5 (Output Formatters) for complete data structure.
Key fields per resolver:
IP address, ping and response times
Normal domain results (google.com, microsoft.com)
Blocked domain result (actual IP vs hijacked 10.x.x.x)
Tunnel domain resolution result
Classification: clean vs censored
Implementation Notes
Concurrent workers with configurable parallelism (--workers)
Basic Scan (Step 1)
Depends on: #1 (Project Scaffolding), #2 (Resolver List Fetcher)
Summary
Test resolver IPs with connectivity checks and multi-domain DNS queries to identify working resolvers and their behavior characteristics.
Motivation: First filtering step to reduce the large raw IP list (~10k+) to resolvers that respond and behave well. Different query types help identify resolvers suitable for DNS tunneling.
Design
Scan Steps
google.com- commonly whitelisted in Iranmicrosoft.com- another baseline testfacebook.comorx.com10.x.x.xranges--tunnel-domainflagOutput
Filter out non-responding IPs and non-DNS servers. See #5 (Output Formatters) for complete data structure.
Key fields per resolver:
cleanvscensoredImplementation Notes
--workers)--timeout)netpackage or miekg/dns libraryRegarding NS vs A Record Testing
For basic scan, testing NS subdomain resolution is sufficient:
t.example.com) returns NS record pointing tons.example.com