-Caveat Lector- [For any one half interested in computers, this reads like a novel (i.e., fast and exciting), and is extremely informing and alarming. Imo, it is a MUST read for *all*. It was written almost a year ago, but most likely (based on the time line presented) is still timely. --MS] http://grc.com/downloaders.htm The Anatomy of File Download Spyware By Steve Gibson Gibson Research Corporation 7/14/2000 Page Updated: Tuesday, October 10th, 2000 MAJOR NEWS!! Senator John Edwards Introduces 'Spyware Control Act' What do the NetZip-descended file downloaders whisper when they think you are not listening? OVERVIEW: How Does This Affect YOU? As you will see on the page below, if you use the RealNetworks RealDownload, Netscape/AOL Smart Download, or NetZip Download Demon utilities in their default configuration . . . EVERY TIME you use one of these utilities to download ANY FILE from ANYWHERE on the Internet, the complete "URL address" of the file, along with a UNIQUE ID TAG that has been assigned to YOUR machine, and - in the case of Netscape's SmartDownload only - YOUR computer's individual Internet IP address, is immediately transmitted to the program's publisher. This allows a database of your entire, personal, file download history to be assembled and uniquely associated with your individual computer . . . for whatever purpose the program's publishers may have today, or tomorrow. VERY IMPORTANT: When I re-examined my findings in the face of RealNetworks' insistence that I was absolutely wrong about my conclusions, I caught something that I had missed before: My exact personal name and private eMail address was being sent back to RealNetworks whenever I downloaded a file. When I confronted RealNetworks with this, they explained that it was due to the fact that I had purchased a product from them in the past, and the "cookie" my system had received during the purchase was being returned to them. That certainly makes file downloads seem far less "anonymous" than RealNetworks continues to allege (full details are provided below). The Saga Unfolds . . . Friday, July 14 I download fresh copies of all three Download Demon-descended file downloading utilities and conduct a series of tests to verify the rumors I've heard about their "phoning home" behavior. In each case, the behavior I examined resulted from each program's "default configuration" which is enabled unless deliberately disabled by the user. I confirmed that all three programs send a report back to their publishers whenever the program is used to download any file through the Internet. This report includes the full URL of the file being downloaded and an "ID Tag" which could be used to uniquely identify the downloading computer. In the case of Netscape's Smart Download, the computer's individual Internet IP address is also sent as a "cookie header" which would tend to defeat IP-masking proxies and anonymizers. Since I was quite alarmed by what I had found and then carefully confirmed, I immediately began notifying the 567,300 members (currently) of my User Managed eMail Notification System and I created a new discussion newsgroup to contain our subsequent public discussion of this issue. Monday, July 17 By Certified Mail I receive RealNetworks' threat letter - which I ignore because it's just so much nonsense - and proceed to initiate a very constructive dialog with two representatives of RealNetworks. Their V.P. of Government Affairs and Privacy informs me that I am absolutely, totally, and completely mistaken and insists that I immediately take this page down and retract all of my public statements to everyone who has received them. (I guess he must have read Robert Kimball's letter too.) I refuse to remove the page based solely upon his forceful representations and assurances. But I worry - in the face of their legal threats - that I might somehow have been completely mistaken. So I quickly post a big red notice at the top of this page to notify its readers that RealNetworks is very sure that I am completely wrong, and that I am immediately working to re-verify all of my findings. Then a much more serious RealDownload privacy concern rears its ugly head: It's Monday afternoon, and everything still comes out just the way it did Friday. (In other words, I was right all along.) However, this time I happen to notice that my actual first and last name, and my own private eMail alias address are also being transmitted to RealNetworks as a result of each file download. So I immediately forward the captured packet to the RealNetworks representatives with whom I'm working and ask them what is going on. By phone the technical manager with whom I'm speaking asks if I've ever purchased anything from Real? I explain that a few months ago I purchased "Real Producer" in order to produce streaming content for my web site. So she explains that my purchase and interaction with their eCommerce server left a "cookie" on my computer which included my real name and personal eMail address from the purchase transaction. I see. So now my private information - which was obtained by RealNetworks during a SECURE PURCHASE TRANSACTION with an explicit commitment for security, privacy, and secrecy - is being sent back to Real - months later - "in the clear" with no security, every time I download arbitrary files from the Internet using their utility - along with the full name of the file I downloaded and the unique ID that could be used to identify my computer. I think that's a "Real" problem. And it would certainly seem to contradict RealNetworks' repeated statements that it is not possible for them to associate my use of RealDownload with any personally identifiable information. If my name and private eMail address aren't "personally identifiable information", what is? Moreover, that personal information could be easily associated with the file download which directly triggered the transmission of that information. Based upon my understanding of how and why this happens, this is easily reproducible and is apparently going on all the time with RealNetworks customers . . . like right now. If what I've been told by the RealNetworks technical manager is true - and it certainly fits the facts and logic - it appears that anyone who has purchased a RealNetworks product through their eCommerce system receives an insecure, plaintext, cookie containing their actual name and eMail address. I certainly did. And this cookie is then sent back to RealNetworks . . . . . . even in situations where users of RealNetworks' products have been repeatedly and even forcefully assured of their absolute anonymity. Whoops. On a Technical Point: RealNetworks has stated repeatedly that they care about their user's privacy. And they tell us that they are "the leader in the delivery of Internet media." Monday they told me that they employ 400 programmers. With all that, wouldn't you be inclined to presume that they had a grasp on Internet Technology? If they care about our privacy, why are they storing my real name and private eMail address - from an eCommerce transaction - as "plain text" in a cookie, and sending it out without any security whatsoever? Even if it weren't being sent back due to a file download it would still be a significant privacy concern. Why not, instead, use a cookie the way it was intended to be used? A cookie should be an "opaque token"; an apparently meaningless string of characters, which only has meaning to the entity which created it. But none of that was the problem I was facing at the moment. (Perhaps we'll deal with that one next.) I was working to demonstrate to the RealNetworks representatives the absolute truth of what I'd been saying about the transmission of a system-unique ID. So, using RealDownload, I downloaded three different files over the course of several hours and from different Internet servers. I captured each resulting 'downloadid' as it was leaving my computer on its way to RealNetworks: downloadid=9B1450495BF211D4A025002018252799 * downloadid=9B14504A5BF211D4A025002018252799 * downloadid=9B14504B5BF211D4A025002018252799 As you can see, they differ by a single character, and that character is changing from "9" to "A" to "B" which indicates standard hexadecimal counting. So I sent these 'downloadids' to the RealNetwork representatives. This apparently puzzled Real's technical manager who said that she'd have to get back to me on it. When she called back she explained that, sure enough, they had succeeded in duplicating the same behavior in their labs and . . . that it must be a bug. A "bug"?? Yeah . . . okay . . . I guess that would be a big one? She explained that she had just learned that the last 24 characters of the "downloadid"'s 32-characters, were derived from a Windows GUID. "GUID" stands for "Globally Unique IDentifier" and is a technology standard specified by the Open Software Foundation (OSF) to create unique and non-repeating "ID Tags". Such "ID Tags" are generated once then stored, typically in the Windows Registry. If you're really curious, use the Windows "RegEdit" program to look under this key name: HKEY_CLASSES_ROOT\CLSID and you'll see a billion GUID's (Don't change anything!). In the past, the use of GUID's has aroused the wrath and concern of privacy advocates the world over, since they are like "serial numbers" which can be used to uniquely identify software users. Okay. So now we know how and where RealNetworks gets the last 24-characters of their 'downloadid'. It is a non-changing unique identifier, different for every computer. Today, they may not like the fact that their use of a deliberately unique and fixed identifier has severe privacy overtones, nor that they have been caught in an outright lie about their use of an identifier which is being transmitted and could be used to track the software download habits of their RealDownload users. But I never expected that forcing them to publicly confess the truth would make them particularly happy. downloadid=9B145049 / 5BF211D4A025002018252799 It appears to be quite likely that the first eight characters are a hexadecimal representation of a 32-bit binary quantity that is incremented for every download - that, in any event, is the behavior I witnessed. So the first portion which appears to be incremented for each download functions like a "download session ID". Whereas the last 24 characters are exactly what I have always asserted: A "download machine ID." Together, they create a deliberately concocted, unique identifier, which, when transmitted from any user's computer could be used to track their users' download behavior over time and to assemble a download profiling database. Tuesday, July 18 Things were much quieter today. I was told that RealNetworks staff was "in meetings" most of the day. Then, at the end of this long day of "meetings" - which were apparently spent carefully wording the following document - RealNetworks produced this formal statement: REALNETWORKS PRIVACY STATEMENT 7/18/00 Any Internet server is typically able to determine the Internet (IP) address of a connected client - such as the user's computer when it sends a file download report. That's how my own 'ShieldsUp' security testing system operates. Therefore, RealDownload users who are extremely security conscious, and who have non-dynamic IP addresses (most non-dial up users) may still desire to disable RealDownload's "per file" reporting function so that all "per-download" reporting is disabled. We'll see what tomorrow brings. Things are looking up. Friday, July 21 July 21 - RealNetworks Inc. admitted today its RealDownload software could be used to track specific users' exact download habits. http://www.msnbc.com/news/436070.asp My determination to dig out the WHOLE truth takes an unexpected turn today. Curious about the fact that the size of a full Windows GUID is exactly the same as the size of RealNetworks' infamous 'downloadid', I write my own little program to request GUIDs from the Windows operating environment. Running this program three times on the same computer which performed Monday's results, generates the following three GUIDs: Three Successive Windows GUIDs WITHOUT reboots GUID = CCDE2D405EF811D4A025002018252799 GUID = CCDE2D415EF811D4A025002018252799 GUID = CCDE2D425EF811D4A025002018252799 Notice that, EXACTLY like the three successive downloadids generated by RealDownload on Monday, these GUIDs differ from each other in exactly one character, that this character is counting, and most significantly, the LAST 20 CHARACTERS of the GUIDs I generated exactly match the tail of the 'downloadid': GUID = CCDE2D405EF8 11D4A025002018252799 downloadid = 9B1450495BF2 11D4A025002018252799 Next, I use my GUID-maker program to generate three GUIDs, but I restart Windows each time: Three Windows GUIDs WITH REBOOTS GUID = A7F1BFC05FD811D4A025002018252799 GUID = 39CC01805FD911D4A025002018252799 GUID = 8ADA6EE05FD911D4A025002018252799 We see that the first 12 characters of the GUIDs are different (especially the first eight), whereas the 20 character GUID tail is absolutely constant, even across reboots of a single system. Network adapters are designed to possess "globally unique" MAC addresses in order to prevent physical address collisions when communicating cross a local network segment. This means that Network adapter MAC addresses are a good source for some guaranteed-to-be-unique "bits". Therefore, the Open Software Foundation's (OSF) GUID creation scheme incorporates the machine's LAN adapter MAC address, when available, into the GUIDs creation. Since the tests have so far been conducted on a networked machine with a LAN adapter, the next logical step would be to perform them on a machine without a network card: Three Windows GUIDs WITH REBOOTS and NO LAN Adapter MAC Address GUID = 7A9196805FE811D4BA1DA6C968FAE763 GUID = 147026E05FE911D4BA1D8FF112DACE63 GUID = 9C1C35205FE911D4BA1DA55166FEC463 As you can see above, without a LAN adapter's static MAC address available, the situation again changes. Now a region in the center of the the GUIDs is static across GUID generation and across reboots, but the last 12 characters, which had previously never changed, are now very different after each reboot. So What Does it All Mean? It means this is a big mess. All of the evidence indicates that RealNetworks' 'downloadid' actually is nothing more or less than a standard Windows GUID. downloadid == GUID The RealNetworks technical manager told me, Monday, that the last 24 characters of their 'downloadid' were "derived from" a Windows GUID. And while I suppose that's technically correct, it's a bit misleading, since I am now virtually certain that their 'downloadid' is exactly and without 'derivation' a Windows GUID. "Huh? They're using dynamically generated Windows GUIDs as their download IDs?" Yeah . . . I know . . . It is a really weird and dumb thing to do: As we have clearly seen, it is not reliably static enough to use as a trustworthy per-computer identifier, yet it is one, sort of, most of the time, maybe. But neither is it random enough to be used as an opaque per-transaction identifier (as I believe it was intended) without the serious privacy concerns that I originally raised. Here's exactly what I believe happened: The copy of NetZip's Download Demon I analyzed exhibits precisely the same behavior as RealNetworks' RealDownload. Therefore, I believe that prior to RealNetworks' acquisition of Download Demon from NetZip, some programmer at NetZip wasn't the least bit concerned about privacy issues. (This is certainly still more the rule than the exception today.) So this programmer innocently uses a Windows GUID as a convenient unique tag for their Demon's transaction tracking. This programmer never stops to consider, if he or she even knew, that the GUID contains - by design and specification - the machine's absolutely unique LAN adapter MAC address, or some other relatively invariant machine-specific tagging information if the system has no LAN card. Next, RealNetworks apparently commits two blunders: They employ Arthur Andersen to provide a third-party blessing of a second-party product. Since I doubt that the folks from Arthur Andersen are grossly incompetent, it can only be that they don't really care about, or understand, the nature and requirements for personal privacy. They put the Arthur Andersen eSeal of Approval on a product which is not only sending a unique identifier, but managing to transmit its user's unique MAC adapter address across the Internet while intimately associating it with every file download. Yikes! RealNetworks, for its part, either didn't perform its own effective or useful code review on a second-party acquired product, or it, too, is not sufficiently aware of the requirements for personal privacy. Oh sure, RealNetworks has license agreements, privacy policies, and rampaging lawyers galore, but its actual products suffer time and again from significant privacy concerns. RealNetworks has, undeniably, fumbled their acquisition of Download Demon and the release of RealDownload, but . . . A completely fair reading of the evidence suggests that RealNetworks never meant to violate anyone's privacy. And, significantly, this is absolutely different from the conclusion I would draw from the design of Netscape's superficially similar Smart Download product. As you will see below, Smart Download creates an ID Tag in the registry of any machine it's installed on and transmits that Tag with every file download report. Tuesday, July 25 CONFIRMED: The currently downloadable new version of RealDownload omits the infamous downloadid from its "phoning home" per-file download reports. The reports (enabled by default) continue to be sent, but any user-tracking would be much less accurate now, needing to be based upon the user's potentially dynamic IP address ("Phoning home" is a fundamentally non-private action for any Internet software). CONFIRMED: Previous version(s) of RealDownload continue to retrieve images from RealNetworks' eCommerce server domain. RealNetworks customers who received an insecure personal cookie containing their name and address, will have this private and personally identifiable information transmitted as a result of the use of previous version(s) of RealDownload. I was told this privacy breach would be eliminated five days ago . . . yet it continues. Thursday, August 3 RealNetworks continues to bend the truth and fails to take responsibility for the behavior of their software. I receive a copy of an eMail from its recipient. It is reproduced here in full so that the excerpt below can be seen in context. This was apparently generated and sent by RealNetworks' Vice President of Government Affairs and Privacy - the person with whom I have been dealing at RealNetworks. It may be, at least in part, a form letter sent to anyone who questions RealNetworks about the conduct of RealDownload. If that is the case; if this is the message everyone is receiving; I need to address the glaring inaccuracy it promotes since it is the main topic of concern: "Unfortunately, recent reports have incorrectly stated that RealNetworks is capable of tracking or somehow "monitoring" individuals' downloads. If the folks at RealNetworks really believe what they are saying, they must be using a very odd definition of the term "monitoring" since we all know that in its default configuration (unless deliberately disabled by the end user) RealDownload transmits a report for every file that any user downloads, which is received and accepted by web servers at RealNetworks'. And furthermore, by their own admission, they do employ this information for customizing the advertisements which their users' see, based upon the type of file downloaded. They also claim to use this information for other purposes when dealing with "partner web sites." As far as I know, the nature of those "other purposes" has never been clearly articulated. But in any event, it is simply not true that RealNetworks is incapable of monitoring individuals' downloads. They clearly are, and they apparently do. To Summarize before we examine the details . . . In order to confirm or deny the reports alleging that the Real Networks and Netscape/AOL download utilities might be spying on their users by secretly "phoning home" with detailed reports of every file their users download, I used a readily available "packet sniffer" to monitor the data being sent from one of my machines when downloading a handful of my own website's files. I was able to quickly confirm that the NetZip-descended downloaders used by Real Networks and Netscape/AOL were, indeed, sending detailed reports of every download "back to base" every time they were used to download a file. These reports contained the complete Internet URL of the file being downloaded and were accompanied by an apparently unique "ID Tag" which was associated with each machine. To confirm this, I experimented with downloads from several different computers. In every case the "apparently unique ID" being sent out never changed on the same computer, and each computer has its own. Netscape's Smart Download goes one step further by including the computer's IP address in a separate "cookie" header. This is troubling, since "cookie" headers tend to be left alone as they pass through proxies and anonymizers. This would thwart deliberate attempts at keeping the computer's IP address confidential. When you consider that each user's computer is uniquely identified, and that reports are being sent back for every file downloaded - and accompanied by a unique ID tag (and, in the case of Netscape, the machine's unique IP address) . . . . . . It is NATURAL to wonder WHY this information is being transmitted, and to what end the data is being put! Dissecting RealDownload's Packet Traffic After installing RealNetworks' RealDownload utility, I clicked on a web link to download the file "id.exe" from my server at "grc.com". The following TCP/IP data packet was immediately sent out of my computer to one of Real's servers: MAC source address: 00-20-18-25-27-99 MAC dest address: 00-90-7F-01-21-E8 Frame type: IP Protocol: TCP->HTTP Source IP address: 207.71.92.206 Dest IP address: 207.188.30.49 Source port: 1107 Destination port: 80 SEQ: 3073973 ACK: 169605441 Packet size: 417 Packet data: 0000: 00 90 7F 01 21 E8 00 20 18 25 27 99 08 00 45 00 ....!.. .%'...E. 0010: 01 93 1C 0A 00 00 40 06 43 58 CF 47 5C CE CF BC [email protected]\... 0020: 1E 31 04 53 00 50 00 2E E7 B5 0A 1B F9 41 50 18 .1.S.P.......AP. 0030: FF FF 44 5A 00 00 47 45 54 20 2F 73 61 32 2E 61 ..DZ..GET /sa2.a 0040: 73 70 3F 70 72 6F 64 75 63 74 3D 52 65 61 6C 44 sp?product=RealD 0050: 6F 77 6E 6C 6F 61 64 26 76 65 72 73 69 6F 6E 3D ownload&version= 0060: 34 2E 30 2E 30 2E 31 38 26 70 6C 61 74 66 6F 72 4.0.0.18&platfor 0070: 6D 3D 57 69 6E 39 38 26 65 76 65 6E 74 3D 64 6F m=Win98&event=do 0080: 77 6E 6C 6F 61 64 53 74 61 72 74 26 75 72 6C 3D wnloadStart&url= 0090: 68 74 74 70 25 33 41 25 32 46 25 32 46 67 72 63 http%3A%2F%2Fgrc 00A0: 2E 63 6F 6D 25 32 46 66 69 6C 65 73 25 32 46 69 .com%2Ffiles%2Fi 00B0: 64 2E 7A 69 70 26 72 65 66 75 72 6C 3D 67 72 63 d.exe&refurl=grc 00C0: 2E 63 6F 6D 26 66 69 6C 65 73 69 7A 65 3D 31 32 .com&filesize=12 00D0: 33 32 38 26 6D 69 6D 65 3D 61 70 70 6C 69 63 61 328&mime=applica 00E0: 74 69 6F 6E 25 32 46 7A 69 70 26 70 65 72 63 65 tion%2Fzip&perce 00F0: 6E 74 3D 30 26 64 6F 77 6E 6C 6F 61 64 69 64 3D nt=0&downloadid= 0100: 39 42 31 34 35 30 34 39 35 42 46 32 31 31 44 34 9B1450495BF211D4 0110: 41 30 32 35 30 30 32 30 31 38 32 35 32 37 39 39 A025002018252799 0120: 26 73 62 69 64 3D 26 73 70 6F 6E 73 6F 72 3D 72 &sbid=&sponsor=r 0130: 64 62 61 73 69 63 20 48 54 54 50 2F 31 2E 30 0D dbasic HTTP/1.0. 0140: 0A 48 6F 73 74 3A 20 73 61 2E 6E 65 74 7A 69 70 .Host: sa.netzip 0150: 2E 63 6F 6D 0D 0A 41 63 63 65 70 74 3A 20 2A 2F .com..Accept: */ 0160: 2A 0D 0A 43 6F 6F 6B 69 65 3A 20 4C 61 73 74 49 *..Cookie: LastI 0170: 6E 66 6F 49 44 3D 31 30 30 32 3B 73 62 69 72 73 nfoID=1002;sbirs 0180: 68 61 72 65 3D 72 64 62 61 73 69 63 0D 0A 52 61 hare=rdbasic..Ra 0190: 6E 67 65 3A 20 62 79 74 65 73 3D 30 2D 0D 0A 0D nge: bytes=0-... 01A0: 0A This rather intimidating looking hexadecimal data block (above) can be easily "parsed" into something far more intelligible. Breaking the block of ASCII text (over in the right hand column) into individual lines (at the '&' delimiter), and translating the "URL encoding" (those %3A and %2F which mean ":" and "/" respectively), the first long line we see, which is the "command" being given to RealNetworks' server, is: GET /sa2.asp? product=RealDownload version=4.0.0.18 platform=Win98 event=downloadStart url=http://grc.com/files/id.exe refurl=grc.com filesize=12328 mime=application/zip percent=0 downloadid=9B1450495BF211D4A025002018252799 sbid= sponsor=rdbasic HTTP/1.0 The balance of the data transmitted consists of the additional information "parameters" shown below: Host: sa.netzip.com Accept: */* Cookie: LastInfoID=1002;sbirshare=rdbasic Range: bytes=0- So, what does the data analysis show us? The complete URL of the file I downloaded was sent to the receiving server: "url=http://grc.com/files/id.exe". The receiving server thus knows the location and full filename of the link I clicked on to download. My machine and I have been "tagged" by the compound "Key" of: 9B1450495BF211D4A025002018252799 Which can be broken into its two component parts: 9B145049 5BF211D4A025002018252799 The left chunk is a "counter" which appears to be incremented once for every file downloaded. I believe that this serves as a "session ID" to separate and identify individual downloads being conducted by a single computer. The right-hand chunk is the "computer ID" which is, according to RealNetworks, based upon a Globally Unique ID (GUID) and is used to uniquely identify the computer into which RealDownload has been installed. The Big Bad Boondoggle... When I was re-examining the RealDownload system on Monday, July 17th, something caught my eye that I had missed on the previous Friday: My full name, and the private eMail alias I always use for on-line purchases, was sent out of my computer to one of Real's servers when I downloaded a file using RealDownload. RealNetworks' repetitious assertions that it is NOT POSSIBLE for them to associate our RealDownload mediated downloads with our actual identity, or that no "personally identifiable information" is transmitted without our informed consent, appear to be no more correct than their previous assertions about the lack of RealDownload's ID tagging. Just so we're really clear here: I am NOT alleging that RealNetworks IS making this association. I have no evidence of that one way or the other. But I AM proving that they absolutely COULD if they chose to. Furthermore, for some reason which is not known to me, they have repeatedly stated that they CAN NOT. MAC source address: 00-20-18-25-27-99 MAC dest address: 00-90-7F-01-21-E8 Frame type: IP Protocol: TCP->HTTP Source IP address: 207.71.92.206 Dest IP address: 208.147.89.135 Source port: 1108 Destination port: 80 SEQ: 3074088 ACK: 3078494647 Packet size: 339 Packet data: 0000: 00 90 7F 01 21 E8 00 20 18 25 27 99 08 00 45 00 ....!.. .%'...E. 0010: 01 45 1E 0A 00 00 40 06 05 79 CF 47 5C CE D0 93 [email protected]\... 0020: 59 87 04 54 00 50 00 2E E8 28 B7 7E 19 B7 50 18 Y..T.P...(....P. 0030: FF FF 05 FB 00 00 47 45 54 20 2F 61 64 73 2F 68 ......GET /ads/h 0040: 6F 75 73 65 5F 6A 75 6B 65 62 6F 78 31 2E 67 69 ouse_jukebox1.gi 0050: 66 20 48 54 54 50 2F 31 2E 31 0D 0A 41 63 63 65 f HTTP/1.1..Acce 0060: 70 74 3A 20 2A 2F 2A 0D 0A 41 63 63 65 70 74 2D pt: */*..Accept- 0070: 4C 61 6E 67 75 61 67 65 3A 20 65 6E 2D 75 73 0D Language: en-us. 0080: 0A 41 63 63 65 70 74 2D 45 6E 63 6F 64 69 6E 67 .Accept-Encoding 0090: 3A 20 67 7A 69 70 2C 20 64 65 66 6C 61 74 65 0D : gzip, deflate. 00A0: 0A 55 73 65 72 2D 41 67 65 6E 74 3A 20 4D 6F 7A .User-Agent: Moz 00B0: 69 6C 6C 61 2F 34 2E 30 20 28 63 6F 6D 70 61 74 illa/4.0 (compat 00C0: 69 62 6C 65 3B 20 4D 53 49 45 20 35 2E 30 3B 20 ible; MSIE 5.0; 00D0: 57 69 6E 64 6F 77 73 20 39 38 3B 20 44 69 67 45 Windows 98; DigE 00E0: 78 74 29 0D 0A 43 6F 6F 6B 69 65 3A 20 52 4E 45 xt)..Cookie: RNE 00F0: 63 6F 6D 6D 3D 76 65 72 32 2E 30 7C ?? ?? ?? ?? comm=ver2.0|xxxx 0100: ?? ?? ?? ?? ?? ?? ?? ?? ?? 7C 53 74 65 76 65 7C xxxxxxxxx|Steve| 0110: 47 69 62 73 6F 6E 7C 4F 46 46 7C 39 58 33 47 38 Gibson|OFF|9X3G8 0120: 0D 0A 43 6F 6E 6E 65 63 74 69 6F 6E 3A 20 4B 65 ..Connection: Ke 0130: 65 70 2D 41 6C 69 76 65 0D 0A 48 6F 73 74 3A 20 ep-Alive..Host: 0140: 69 6D 61 67 65 73 2E 72 65 61 6C 2E 63 6F 6D 0D images.real.com. 0150: 0A 0D 0A ... As before, we can easily break this rather intimidating looking hexadecimal data block into its much more easily readable header lines: GET /ads/house_jukebox1.gif HTTP/1.1 Accept: */* Accept-Language: en-us Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt) Cookie: RNEcomm=ver2.0|xxxxxxxxxxxxxxxxxx|Steve|Gibson|OFF|9X3G8 Connection: Keep-Alive Host: images.real.com The "Cookie" header line (shown above) which is present in the outbound transmission to one of RealNetworks' servers - a transmission which was triggered by my use of RealDownload - not only demonstrates that RealNetworks has again misrepresented their capabilities, if not their actions and intentions, but also that they are careless in the extreme with their customer's personal and private data: Cookie: RNEcomm=ver2.0|xxxxxxxxxxxxxxxxxx|Steve|Gibson|OFF|9X3G8 Breaking this down with the benefit of what the RealNetworks technical manager told me: I am guessing that the "RNEcomm=ver2.0" string stands for "Real Networks Electronic Commerce version 2.0". The string of 'xxxxxxxxxxxxxxxxxx' shown above was, when captured on its way out of my computer, my personal and private eMail address alias which would have been used during an online eCommerce purchase. I hope that you (the reader) will understand that I desire to protect its privacy here even if RealNetworks hasn't. The next two fields: "Steve" and "Gibson" are rather clear. If this isn't "personally identifiable information" being sent during the use of RealDownload, I can't imagine what would be. I can't guess what the last two fields: "OFF" and "9X3G8" might refer to. But logic would indicate that the "9X3G8" is an identifier which refers in some way to my past purchase of "Real Producer" which the RealNetworks technical manager concluded was the event which planted this very persistent cookie onto my computer for subsequent re-transmission at various odd (and in some cases potentially awkward - and certainly non-anonymous) moments . . . such as whenever using their supposedly anonymous RealDownload agent. You will notice that the server ("Host:") to which the offending Cookie was sent appears to be 'images.real.com'. This is a different server, at a different Internet IP address, from the one which received RealDownload's file download report. However, Internet server-clustering technologies, for aggregating data across disparate servers, are readily available, and we would expect a company like RealNetworks to be at the forefront of such bandwidth management technology. Thus the fact that the information was sent to different servers does not prevent its ready association. Because this represents an extremely great concern for all of us, and especially for privacy advocates, I want to be very clear again that I am not alleging that such associating of these two separate communications IS being done, but only that RealNetworks' repeated assertion that it COULD NOT BE DONE, appears to be patently false. Dissecting Smart Download's Packet Traffic After installing Netscape's Smart Download utility, I clicked on a web link to download the file "tip.exe" from my server at "grc.com". The following TCP/IP data packet was immediately sent out of my computer to one of Netscape's servers: MAC source address: 00-20-18-25-27-99 MAC dest address: 00-90-7F-01-21-E8 Frame type: IP Protocol: TCP->HTTP Source IP address: 207.71.92.206 Dest IP address: 207.200.75.206 Source port: 1041 Destination port: 80 SEQ: 330513 ACK: 750466305 Packet size: 450 Packet data: 0000: 00 90 7F 01 21 E8 00 20 18 25 27 99 08 00 45 00 ....!.. .%'...E. 0010: 01 B4 9C 00 40 00 80 06 15 97 CF 47 5C CE CF C8 [email protected]\... 0020: 4B CE 04 11 00 50 00 05 0B 11 2C BB 35 01 50 18 K....P....,.5.P. 0030: 22 38 44 F5 00 00 47 45 54 20 2F 63 67 69 2D 62 "8D...GET /cgi-b 0040: 69 6E 2F 73 64 5F 73 65 72 76 65 72 2E 63 67 69 in/sd_server.cgi 0050: 3F 70 6C 61 74 66 6F 72 6D 3D 77 69 6E 39 38 26 ?platform=win98& 0060: 76 65 72 73 69 6F 6E 3D 31 2C 2B 31 2C 2B 30 2C version=1,+1,+0, 0070: 2B 36 36 26 75 72 6C 3D 68 74 74 70 25 33 41 25 +66&url=http%3A% 0080: 32 46 25 32 46 67 72 63 2E 63 6F 6D 25 32 46 66 2F%2Fgrc.com%2Ff 0090: 69 6C 65 73 25 32 46 74 69 70 2E 65 78 65 26 4B iles%2Ftip.exe&K 00A0: 65 79 3D 42 52 55 4E 4F 33 39 36 44 46 32 37 33 ey=BRUNO396DF273 00B0: 20 48 54 54 50 2F 31 2E 30 0D 0A 50 72 61 67 6D HTTP/1.0..Pragm 00C0: 61 3A 20 6E 6F 2D 63 61 63 68 65 0D 0A 43 6F 6E a: no-cache..Con 00D0: 6E 65 63 74 69 6F 6E 3A 20 4B 65 65 70 2D 41 6C nection: Keep-Al 00E0: 69 76 65 0D 0A 55 73 65 72 2D 41 67 65 6E 74 3A ive..User-Agent: 00F0: 20 4E 65 74 5A 69 70 2D 44 6F 77 6E 6C 6F 61 64 NetZip-Download 0100: 65 72 2F 31 2E 30 2E 36 32 20 28 57 69 6E 33 32 er/1.0.62 (Win32 0110: 3B 20 44 65 63 20 20 37 20 31 39 39 38 29 0D 0A ; Dec 7 1998).. 0120: 48 6F 73 74 3A 20 63 67 69 2E 6E 65 74 73 63 61 Host: cgi.netsca 0130: 70 65 2E 63 6F 6D 3A 38 30 0D 0A 52 61 6E 67 65 pe.com:80..Range 0140: 3A 20 62 79 74 65 73 3D 30 2D 0D 0A 41 63 63 65 : bytes=0-..Acce 0150: 70 74 3A 20 2A 2F 2A 0D 0A 41 63 63 65 70 74 2D pt: */*..Accept- 0160: 4C 61 6E 67 75 61 67 65 3A 20 65 6E 0D 0A 41 63 Language: en..Ac 0170: 63 65 70 74 2D 43 68 61 72 73 65 74 3A 20 69 73 cept-Charset: is 0180: 6F 2D 38 38 35 39 2D 31 2C 2A 2C 75 74 66 2D 38 o-8859-1,*,utf-8 0190: 0D 0A 43 6F 6F 6B 69 65 3A 20 55 49 44 43 3D 32 ..Cookie: UIDC=2 01A0: 30 37 2E 37 31 2E 39 32 2E 32 30 36 3A 30 39 36 07.71.92.206:096 01B0: 33 35 33 33 30 30 32 3A 32 33 38 32 31 31 0D 0A 3533002:238211.. 01C0: 0D 0A This rather intimidating looking hexadecimal data block (above) can be easily "parsed" into something far more intelligible. Breaking the block of ASCII text (over in the right hand column) into individual lines, and translating the "URL Encoding" (those %3A and %2F which mean ":" and "/" respectively), the first long line we see, which is the "command" given to the Netscape server, is: GET /cgi-bin/sd_server.cgi?platform=win98 &version=1,+1,+0,+66&url=http://grc.com/ files/tip.exe&Key=BRUNO396DF273 HTTP/1.0 This long line can then be further broken down into its various components: GET /cgi-bin/sd_server.cgi platform=win98 version=1,+1,+0,+66 url=http://grc.com/files/tip.exe Key=BRUNO396DF273 HTTP/1.0 The balance of the data transmitted consists of the additional information "parameters" shown below: Pragma: no-cache Connection: Keep-Alive User-Agent: NetZip-Downloader/1.0.62(Win32;Dec 7 1998) Host: cgi.netscape.com:80 Range: bytes=0- Accept: */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 Cookie: UIDC=207.71.92.206:0963533002:238211 So, what does the data analysis show us? The complete URL of the file I downloaded was sent to Netscape: "url=http://grc.com/files/tip.exe". Netscape thus knows what site I was visiting and what file(s) I clicked on to download. My machine and I have been "tagged" by the "Key" of: "BRUNO396DF273" Interestingly, "Bruno" is the name of the machine I used for this testing. So, the machine's name is being sent as part of my "ID". Also, I performed this experiment SEVERAL TIMES, shutting down the machine and rebooting . . . and the key's value never changed. Thus, it is clearly serving as a "persistent tag" and is being used to uniquely identify me from one use of the download utility to the next. After see ing the "BRUNO396DF273" tag being sent, I searched the Windows Registry for that tag string. I found it in my machine's Registry at: HKEY_LOCAL_MACHINE\Software\Nsda\1.1\Options\UserID This makes it pretty clear that the tag is, indeed, a persistent "UserID" (by their own label) which has been assigned to my machine for the purpose of long-term, unique, identification. Note that any time Netscape (or anyone else) ever wants to, they could access that public registry key and immediately tie me, and this machine, to my entire past download history. IMPORTANT!: Users of Netscape's Smart Download utility, who unwittingly joined Netscape's "NetCenter" system, are especially at risk of privacy violation because NetCenter members also have their NetCenter logon ID and their personal eMail address sent with each file download report! So much for never including any "personally identifiable" information. This means that the user's NetCenter logon ID - many people simply use their names - and eMail address are both being transmitted along with the name of every file downloaded by Smart Download. And finally ... check out the "Cookie" field that is being sent! (It is the last field of the last group above.) The glob at the end includes encoded date and time information, but immediately after the "UIDC=" is my machine's IP address!! So Netscape apparently thought that would be a good thing for them to have also. Since it's in a "cookie" field, it will pass through "anonymizers", "proxies", and NAT routers, which would otherwise obscure the user's true IP address. In other words, since the machine's own IP address has been included in this "cookie", using the Internet through an "IP anonymizing service" will NOT prevent Netscape/AOL from learning the machine's TRUE IP. Netscape receives it directly from their software running in the user's computer. In Summary . . . So what does it all mean? I am not a Netscape or RealNetworks programmer, so I can only go by the evidence presented through an analysis of the available data. For most people, the main issue revolves around whether or not a report of every file downloaded with those utilities is transmitted back to their home base . . . and there's just no question any longer that unless deliberately disabled by the user, this is being actively done. If that bothers you, you may wish to immediately remove these downloading tools from your system. Any of these file download spies may be removed through Windows' standard Add/Remove Programs feature located in the Windows Control Panel. You will find them listed as "Netscape SmartDownload", "RealDownload", and "NetZip Download Demon". An additional privacy risk involves whether, to what degree, and to what end, historical file downloading profiles are being compiled about individuals, whether or not they are known by name and address and "personally identifiable." Netscape has been completely silent on this issue, whereas RealNetworks has gone absolutely ballistic over my pointing out what it has apparently lied about and what it could be doing with the data that has been sent to its servers. As I have repeatedly stated, I have no evidence, information, or knowledge either way. But trust is what it all boils down to, and RealNetworks' record on that score seems to be getting shakier with every passing day. Why is a unique ID tag being transmitted at all? I can only address that larger question by asking: "If these companies do not care about us in any unique way - separate from everyone else (as they claim) - then WHY are they going to all the trouble of uniquely tagging every user's computer and deliberately transmitting not only that unique ID tag, but also - in the case of Netscape - sending the user's Internet IP address with each and every download file report?" This is not required for the purpose of identifying what files are downloaded "in aggregate", or learning when their downloading program is installed or removed from the host computer . . . contrary to what seems to be stated in their various license agreements. Therefore, it is difficult to understand the motivation behind collecting personal data which is, on its face, unnecessary for the stated objective. One Final Observation: The stated purpose behind all of this download profiling (in their respective licenses) is to inform these vendors about the files we are all (collectively) downloading so that they can provide some sort of additional, useful, or auxiliary information to us (this is never really made clear). Yet, the date shown for the NetZip Downloader (version 1.0.62 - which was captured in the outbound TCP/IP data packet shown above) is December 7th of 1998. So, this data gathering has presumably been underway since before that date. That's been quite a while. When does the payback for all these years of "aggregate" user profiling begin? And who receives the value? And, moreover, given the highly dynamic nature of Internet content, does the whole idea of collecting such data really make any sense anyway? It makes one wonder what's really going on here . . . doesn't it? Certainly Newsworthy . . . Frankly, once all of the facts are exposed and aired, I wouldn't blame anyone for being quite upset by the whole story. We now know, with absolute certainty, that more than 14 million NetZip Download Demon users have been misled by the product's license agreement. And it is this deceived "asset base" which RealNetworks recently purchased. How nice. So, it's hardly surprising that the online news media has picked up on and reported the news of a Class Action Lawsuit brought against Netscape/AOL over their Smart Download spyware. These stories provide some additional background information about the secret spying activities of these programs: Wired News: Privacy Suit Targets Netscape ZDNet News: AOL/Netscape hit with privacy lawsuit Keeping Yourself Informed Within hours of my confirmation of this potentially serious privacy breach, the 567,300 current members of our User-Managed eMail Notification System received a brief piece of eMail outlining my findings and inviting them to examine the additional resources here for additional information and interaction. So, if you are a newcomer to this site and are not already a member of our eMail Notification System, you might want to consider joining (just click the link). As detailed in our formal Privacy Statement, your eMail address will never be disclosed, and you are completely free to remove yourself from the system if you ever choose to. For Further Discussion . . . My findings and the questions they raise - about the behavior of the Netscape / Real Networks/NetZip download utilities - were first disclosed to members of our User-Managed eMail Notification System. Many of these people, and others, are discussing their concerns and news about this and similar Spyware concerns in our "OptOut" spyware discussion forum. If you are interested in learning more, please see our Discussions page for some orientation about our discussion groups, detailed instructions, and links. http://grc.com/discussions.htm And thanks very much for your interest and continued support of my work! --end file-- ======================================================= Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT FROM THE DESK OF: *Michael Spitzer* <[EMAIL PROTECTED]> The Best Way To Destroy Enemies Is To Change Them To Friends ======================================================= <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance�not soap-boxing�please! These are sordid matters and 'conspiracy theory'�with its many half-truths, mis- directions and outright frauds�is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
