diff --git a/content/post/2022-russia-blocks-amid-ru-ua-conflict/index.md b/content/post/2022-russia-blocks-amid-ru-ua-conflict/index.md index 27fa03811..56612f919 100644 --- a/content/post/2022-russia-blocks-amid-ru-ua-conflict/index.md +++ b/content/post/2022-russia-blocks-amid-ru-ua-conflict/index.md @@ -703,9 +703,7 @@ From the above chart, it is evident that 200rf.com was: * Blocked in many different ways (i.e. we observe different censorship techniques on different networks); * Still accessible (on 3rd March 2022) on some networks in Russia. -Notably, we observe that access to 200rf.com is being interfered with through a TLS man-in-the-middle on the following 11 networks in Russia: [AS15640 (MTS PJSC)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS15640), [AS25159 (PJSC MegaFon)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS25159), [AS25513 (PJSC Moscow city telephone network)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS25513), [AS31163 (PJSC MegaFon)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS31163), [AS35807 (SkyNet Ltd.)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS35807), [AS42511 (Connect LLC)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS42511), [AS8359 (MTS PJSC)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS8359), - -[AS25086](https://explorer.ooni.org/measurement/20220303T215229Z_webconnectivity_RU_25086_n1_k3kIlSnoMVyUqosa?input=https%3A%2F%2F200rf.com%2F), [AS8580](https://explorer.ooni.org/measurement/20220303T214034Z_webconnectivity_RU_8580_n1_PpttWGZRuR8eD9hS?input=https%3A%2F%2F200rf.com%2F), [AS12737](https://explorer.ooni.org/measurement/20220303T212121Z_webconnectivity_RU_12737_n1_DGKkNb1wSAd9vNmo?input=https%3A%2F%2F200rf.com%2F),[AS20632](https://explorer.ooni.org/measurement/20220303T210357Z_webconnectivity_RU_20632_n1_MXDLRcv2gIdKeQG6?input=https%3A%2F%2F200rf.com%2F),[AS31286](https://explorer.ooni.org/measurement/20220303T162827Z_webconnectivity_RU_31286_n1_Ko83GT1jdv0FYH2E?input=https%3A%2F%2F200rf.com%2F),[AS31213](https://explorer.ooni.org/measurement/20220303T120016Z_webconnectivity_RU_31213_n1_MI62mKfi2ZFeiC6R?input=https%3A%2F%2F200rf.com%2F). +Notably, we observe that access to 200rf.com is being interfered with through a TLS man-in-the-middle on the following 13 networks in Russia: [AS15640 (MTS PJSC)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS15640), [AS25159 (PJSC MegaFon)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS25159), [AS25513 (PJSC Moscow city telephone network)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS25513), [AS31163 (PJSC MegaFon)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS31163), [AS35807 (SkyNet Ltd.)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS35807), [AS42511 (Connect LLC)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS42511), [AS8359 (MTS PJSC)](https://explorer.ooni.org/search?since=2022-02-01&until=2022-03-04&failure=false&domain=200rf.com&probe_cc=RU&probe_asn=AS8359), [AS25086](https://explorer.ooni.org/measurement/20220303T215229Z_webconnectivity_RU_25086_n1_k3kIlSnoMVyUqosa?input=https%3A%2F%2F200rf.com%2F), [AS8580](https://explorer.ooni.org/measurement/20220303T214034Z_webconnectivity_RU_8580_n1_PpttWGZRuR8eD9hS?input=https%3A%2F%2F200rf.com%2F), [AS12737](https://explorer.ooni.org/measurement/20220303T212121Z_webconnectivity_RU_12737_n1_DGKkNb1wSAd9vNmo?input=https%3A%2F%2F200rf.com%2F), [AS20632](https://explorer.ooni.org/measurement/20220303T210357Z_webconnectivity_RU_20632_n1_MXDLRcv2gIdKeQG6?input=https%3A%2F%2F200rf.com%2F), [AS31286](https://explorer.ooni.org/measurement/20220303T162827Z_webconnectivity_RU_31286_n1_Ko83GT1jdv0FYH2E?input=https%3A%2F%2F200rf.com%2F), [AS31213](https://explorer.ooni.org/measurement/20220303T120016Z_webconnectivity_RU_31213_n1_MI62mKfi2ZFeiC6R?input=https%3A%2F%2F200rf.com%2F). On other networks (such as AS8790), OONI data [shows](https://explorer.ooni.org/measurement/20220303T111548Z_webconnectivity_RU_8790_n1_rMZoIX9SJJI0NRB0?input=https%3A%2F%2F200rf.com%2F) that access to 200rf.com is blocked by means of DNS tampering, as the DNS queries resolve to the IP `85.142.29.248` which hosts the following Russian blockpage: