Entertaining privacy problem with PacBell DSL service - doesn't apply to DHCP users, but apparently does with static IP. ~~~~~~~~~~~~~~~~~ http://www.infoworld.com/cgi-bin/deleteframe.pl?story=/articles/op/xml/00/06 /19/000619opswatch.xml >From InfoWorld.com Published at: Friday, Jun. 16, 2000 1:01 pm PT Internet privacy shows troubling prospects; constant erosion leads to lots of exposed data By Stuart McClure & IN OUR RUSH to utilize the Internet, someone forgot to consider the enormous impact of disclosure. We send unencrypted e-mail messages that are stored on mail servers (or their backup tapes) for years. We respond to public newsgroup postings for all the world to see. With information at our fingertips comes the inevitable conclusion that privacy is in for a beating. Now with the advent of banner ad-and traffic-tracking companies such as DoubleClick and AdForce, privacy is a dwindling privilege. For the right price, companies can learn about your buying habits and tie that to your e-mail address for mass marketing and the usual spam. Now a recent discovery has surfaced that brings this invasion even closer to home. Where do you live? Just ask ARIN We've found another example of why you need to worry about your information on the Internet. A growing number of home DSL customers are requesting static IP addresses to have a place to serve up their family pictures and post their r�sum�s online. Typically, when an ISP registers a block of IP addresses with the American Registry of Internet Numbers (ARIN), it submits its own street address rather than the client's. But as one bright reader discovered, at least one major ISP, Pacific Bell Internet, gives the DSL customer's home address instead of the ISP's. The phenomenon appears to show up only with certain ISPs and only when the IP addresses for DSL are static. From a privacy standpoint, this simply boils our blood. The effect of this privacy violation is that anyone using a chat room or IRC channel can look up anyone else's IP address and discover their home address. For example, if you are an IRC user, someone can use the "/who *.pacbell.net" command to list all those users coming from a Pacific Bell domain and then target you. If you support SOHO (small office/home office) corporate users or have employees who work from home and connect into your corporate network, attackers can target your employees at their houses. Believe us when we say that "dumpster diving" is by no means a vanished art. If you care about your privacy, check out ARIN and see whether your static IP addresses (and, more important, your home address) is registered with them. Point your browser to www.arin.net , select the Whois link, and then submit either your last name or your static IP addresses into the search field. Now if your name appears on the screen, select the NETBLK name to the right. If your home address is listed there, you should call your ISP and have them do one of three things: change your billing address to a P.O. box or personal mailbox, have them change the address to their own address, or switch to dynamic IP addressing. Loose DNS lips The next Internet privacy concern is the way Network Solutions stores records in DNS servers and the domains over which they have authority. This "feature" of Network Solutions' database is not new, but it is worthy of your attention. With either a command-line Whois client or your favorite Web browser, you can view the first 50 domain names of almost any DNS server on the Internet. Why is this trick such a big deal? Well, where do you think attackers go when they can't hack a box they really want? They can attack both your ISP and your neighbors, looking for low-hanging fruit. To discover the information your DNS is leaking, just ask Network Solutions. For example, to check out how simple it is to view your DNS records, just point your Web browser to www.networksolutions.com and select WHOIS Lookups. Now input your domain name (e.g., mydomain.com) and hit Submit. You will see your normal Network Solutions registration information, including the primary and secondary (maybe more) DNS servers. Now click on the first DNS entry's IP address. With any luck this will show you the HST (host) record for your DNS server. Now for the undocumented trick. In the lookup field, insert "server NS0000-HST" replacing NS0000-HST with the DNS's HST name, and up will pop the first 50 domain names that your DNS server hosts. Knowing the alternate domain names being hosted on a particular DNS server encourages attackers to turn their focus from your neighbor's box to yours. Instead of wasting time on a difficult original target, an attacker can take advantage of a weaker system nearby. Perhaps an attacker will listen to the network and catch your cleartext FTP passwords used during your NetObjects Web site updates. Sleep tight now, ya hear. Internet privacy is undoubtedly disappearing at an exponential rate, and little is being done to slow the process. With little legal backing for enforcing information privacy, the problem is only going to grow and affect the way we do business on the Internet. What do you think about your right to privacy? Let us know at [EMAIL PROTECTED] Stuart McClure is president and CTO and Joel Scambray is managing principal at security consultant Foundstone ( www.foundstone.com ). Their best-selling book, Hacking Exposed, has sold more than 100,000 copies in six months. ~~~~~~~~~~~~~ Thanks! Bill Bill Stewart, [EMAIL PROTECTED] PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639

