Re: US internet providers hijacking users' search queries

2011-08-09 Thread Christopher Morrow
On Mon, Aug 8, 2011 at 11:52 PM, David Conrad d...@virtualized.org wrote:
 Chris,

 On Aug 8, 2011, at 2:56 PM, Christopher Morrow wrote:
 messing with basic plumbing will have unintended consequences, they will be 
 bad.

 If the users her WANT to have this experience, there are lots of
 in-browser/application methods to achieve this, hijacking DNS at the
 resolver is really just NOT the right answer, ever.

 See that ship off on the horizon?  It appears to have sailed...

doesn't mean I can't be the cranky old man shaking my fist, right?


 I'm told that non-trivial revenue is being generated by ISPs who are doing 
 this redirection.  As long as that is true, I suspect it's unlikely pointing 
 out how broken hijacking DNS is will be particularly effective.


yea... so that, so I understand, depends a lot on who's telling the
tale. From one source at an ISP doing this, the revenues are not
anywhere near what was promised by the vendor(s). Anyway, I'm not sure
what they are, we probably won't ever know what they really are :(

I suppose it'll continue as long as people consider it 'ok' to be
subjected to this and don't leave their ISP for an alternative. (where
available!) Oh, maybe dns-sec will help us with this problem too?
nsec3 to the rescue?



Re: US internet providers hijacking users' search queries

2011-08-08 Thread Christopher Morrow
On Sat, Aug 6, 2011 at 10:03 PM, Scott Helms khe...@ispalliance.net wrote:
 Not trying to be obtuse, but none of the technical docs you cite appear to
 talk about HTTP proxies nor does the newswire report have any technical
 details.  I have tested several of the networks listed in the report and in
 none of the cases I saw was there HTTP proxy activity.  Picking up on
 WCCP/TCS isn't that hard (I used to install those myself) so unless there is
 some functionality in IOS and/or JUNOS that allows I don't see it happening.
  Paxfire can operate all of the proxies they want but the network
 infrastructure has to be able to pass the traffic over to those proxies and
 I don't see it (on at least 3 of the networks cited).

barefruit/paxfire/nominum/etc all do essentially the same thing:
1) install a dns-appliance in-line (some form of in-line, there are
lots of options, it's not really important in the end which is used)
between 'cache resolver' and 'user'. (198.6.1.1 has a paxfire
appliance literally in-line between it's customer facing port and the
world)

2) chose a set/subset of queries to falsify answers for (nxdomain
only? autosearch.msn.com? *.google.com? *?)

3) run a farm of servers somewhere else (in the case of paxfire they
are the jomax.net servers:
  ;; QUESTION SECTION:
;asdkjad912jd.123adsad.com. IN  A
;; ANSWER SECTION:
asdkjad912jd.123adsad.com. 60   IN  A   64.158.56.49
asdkjad912jd.123adsad.com. 60   IN  A   63.251.179.49
;; AUTHORITY SECTION:
asdkjad912jd.123adsad.com. 65535 IN NS  WSC2.JOMAX.NET.
asdkjad912jd.123adsad.com. 65535 IN NS  WSC1.JOMAX.NET.

  In the case of barefruit it's another complex and in the case of
nominum it's a third complex ...

4) accept http/https/etc on the complex of servers, funnel you an
answer which is essentially 'hostname == search-query'. For non-http
most of these complexes are SUPPOSED to not permit a connect to
happen... for jomax at least they don't accept tcp/443, they do accept
25 though :(

5) profit if users click on these results.

It's not black magic, it's annoying and wrong for some versions
(depending upon your ethics I guess?) of wrong :( I wish ISP's would
stop doing this, and it seems that some folk have luck twisting arms
at ISP's to make this stop.

-chris



Re: US internet providers hijacking users' search queries

2011-08-08 Thread Cameron Byrne
On Aug 8, 2011 4:24 PM, Christopher Morrow morrowc.li...@gmail.com
wrote:

 On Sat, Aug 6, 2011 at 10:03 PM, Scott Helms khe...@ispalliance.net
wrote:
  Not trying to be obtuse, but none of the technical docs you cite appear
to
  talk about HTTP proxies nor does the newswire report have any technical
  details.  I have tested several of the networks listed in the report and
in
  none of the cases I saw was there HTTP proxy activity.  Picking up on
  WCCP/TCS isn't that hard (I used to install those myself) so unless
there is
  some functionality in IOS and/or JUNOS that allows I don't see it
happening.
   Paxfire can operate all of the proxies they want but the network
  infrastructure has to be able to pass the traffic over to those proxies
and
  I don't see it (on at least 3 of the networks cited).

 barefruit/paxfire/nominum/etc all do essentially the same thing:
 1) install a dns-appliance in-line (some form of in-line, there are
 lots of options, it's not really important in the end which is used)
 between 'cache resolver' and 'user'. (198.6.1.1 has a paxfire
 appliance literally in-line between it's customer facing port and the
 world)

 2) chose a set/subset of queries to falsify answers for (nxdomain
 only? autosearch.msn.com? *.google.com? *?)

 3) run a farm of servers somewhere else (in the case of paxfire they
 are the jomax.net servers:
  ;; QUESTION SECTION:
 ;asdkjad912jd.123adsad.com. IN  A
 ;; ANSWER SECTION:
 asdkjad912jd.123adsad.com. 60   IN  A   64.158.56.49
 asdkjad912jd.123adsad.com. 60   IN  A   63.251.179.49
 ;; AUTHORITY SECTION:
 asdkjad912jd.123adsad.com. 65535 IN NS  WSC2.JOMAX.NET.
 asdkjad912jd.123adsad.com. 65535 IN NS  WSC1.JOMAX.NET.

  In the case of barefruit it's another complex and in the case of
 nominum it's a third complex ...

 4) accept http/https/etc on the complex of servers, funnel you an
 answer which is essentially 'hostname == search-query'. For non-http
 most of these complexes are SUPPOSED to not permit a connect to
 happen... for jomax at least they don't accept tcp/443, they do accept
 25 though :(

 5) profit if users click on these results.

 It's not black magic, it's annoying and wrong for some versions
 (depending upon your ethics I guess?) of wrong :( I wish ISP's would
 stop doing this, and it seems that some folk have luck twisting arms
 at ISP's to make this stop.

 -chris


Some people believe the search results are a better user experience than the
error page they would otherwise receive.  The awesome bar is a similar
featureimho

Cb


Re: US internet providers hijacking users' search queries

2011-08-08 Thread Oren Levin

On 8/7/11 12:10 PM, Joe Provo wrote:
This is finally something new, and I retract my assertion that the new 
scientist got it wrong. Drilling through to actual evidence and 
details, rather than descriptions which match previous behavior, we 
have both 
http://www.usenix.org/event/leet11/tech/full_papers/Zhang.pdf (a 
little indirect with 'example.com', etc) and 
http://www.payne.org/index.php/Frontier_Search_Hijacking (with actual 
domains) provide detail on the matter. Cheers! Joe 
I noticed that the payne.org link calls out the insertion of an Amazon 
affiliate code. Section 7 of the Amazon affiliate agreement 
(https://affiliate-program.amazon.com/gp/associates/agreement) appears 
to explicitly prohibit payment for this type of traffic.


Oren



Re: US internet providers hijacking users' search queries

2011-08-08 Thread Christopher Morrow
On Mon, Aug 8, 2011 at 7:47 PM, Cameron Byrne cb.li...@gmail.com wrote:

 On Aug 8, 2011 4:24 PM, Christopher Morrow morrowc.li...@gmail.com
 wrote:

 On Sat, Aug 6, 2011 at 10:03 PM, Scott Helms khe...@ispalliance.net
 wrote:
  Not trying to be obtuse, but none of the technical docs you cite appear
  to
  talk about HTTP proxies nor does the newswire report have any technical
  details.  I have tested several of the networks listed in the report and
  in
  none of the cases I saw was there HTTP proxy activity.  Picking up on
  WCCP/TCS isn't that hard (I used to install those myself) so unless
  there is
  some functionality in IOS and/or JUNOS that allows I don't see it
  happening.
   Paxfire can operate all of the proxies they want but the network
  infrastructure has to be able to pass the traffic over to those proxies
  and
  I don't see it (on at least 3 of the networks cited).

 barefruit/paxfire/nominum/etc all do essentially the same thing:
 1) install a dns-appliance in-line (some form of in-line, there are
 lots of options, it's not really important in the end which is used)
 between 'cache resolver' and 'user'. (198.6.1.1 has a paxfire
 appliance literally in-line between it's customer facing port and the
 world)

 2) chose a set/subset of queries to falsify answers for (nxdomain
 only? autosearch.msn.com? *.google.com? *?)

 3) run a farm of servers somewhere else (in the case of paxfire they
 are the jomax.net servers:
  ;; QUESTION SECTION:
 ;asdkjad912jd.123adsad.com.     IN      A
 ;; ANSWER SECTION:
 asdkjad912jd.123adsad.com. 60   IN      A       64.158.56.49
 asdkjad912jd.123adsad.com. 60   IN      A       63.251.179.49
 ;; AUTHORITY SECTION:
 asdkjad912jd.123adsad.com. 65535 IN     NS      WSC2.JOMAX.NET.
 asdkjad912jd.123adsad.com. 65535 IN     NS      WSC1.JOMAX.NET.

  In the case of barefruit it's another complex and in the case of
 nominum it's a third complex ...

 4) accept http/https/etc on the complex of servers, funnel you an
 answer which is essentially 'hostname == search-query'. For non-http
 most of these complexes are SUPPOSED to not permit a connect to
 happen... for jomax at least they don't accept tcp/443, they do accept
 25 though :(

 5) profit if users click on these results.

 It's not black magic, it's annoying and wrong for some versions
 (depending upon your ethics I guess?) of wrong :( I wish ISP's would
 stop doing this, and it seems that some folk have luck twisting arms
 at ISP's to make this stop.

 -chris


 Some people believe the search results are a better user experience than the
 error page they would otherwise receive.  The awesome bar is a similar
 featureimho

sure, but users requested that 'feature' and it's there for only
http/https traffic. it's not being done at the lower layers of the
stack, for all applications off the client machine.

messing with basic plumbing will have unintended consequences, they will be bad.

If the users her WANT to have this experience, there are lots of
in-browser/application methods to achieve this, hijacking DNS at the
resolver is really just NOT the right answer, ever.

-chris



Re: US internet providers hijacking users' search queries

2011-08-08 Thread Christopher Morrow
On Mon, Aug 8, 2011 at 7:57 PM, Oren Levin li...@pinetree.net wrote:
 On 8/7/11 12:10 PM, Joe Provo wrote:

 This is finally something new, and I retract my assertion that the new
 scientist got it wrong. Drilling through to actual evidence and details,
 rather than descriptions which match previous behavior, we have both
 http://www.usenix.org/event/leet11/tech/full_papers/Zhang.pdf (a little
 indirect with 'example.com', etc) and
 http://www.payne.org/index.php/Frontier_Search_Hijacking (with actual
 domains) provide detail on the matter. Cheers! Joe

 I noticed that the payne.org link calls out the insertion of an Amazon
 affiliate code. Section 7 of the Amazon affiliate agreement
 (https://affiliate-program.amazon.com/gp/associates/agreement) appears to
 explicitly prohibit payment for this type of traffic.

interesting, one wonders if maybe amazon will 'do the right thing'
(much like they did with wikileaks?) and remove the account's access.



Re: US internet providers hijacking users' search queries

2011-08-08 Thread David Conrad
Chris,

On Aug 8, 2011, at 2:56 PM, Christopher Morrow wrote:
 messing with basic plumbing will have unintended consequences, they will be 
 bad.
 
 If the users her WANT to have this experience, there are lots of
 in-browser/application methods to achieve this, hijacking DNS at the
 resolver is really just NOT the right answer, ever.

See that ship off on the horizon?  It appears to have sailed...

I'm told that non-trivial revenue is being generated by ISPs who are doing this 
redirection.  As long as that is true, I suspect it's unlikely pointing out how 
broken hijacking DNS is will be particularly effective.

Regards,
-drc




Re: US internet providers hijacking users' search queries

2011-08-07 Thread Joe Provo
On Sat, Aug 06, 2011 at 01:25:18PM -0500, Jimmy Hess wrote:
 On Sat, Aug 6, 2011 at 12:08 PM, Joe Provo nanog-p...@rsuc.gweep.netwrote:
 
  On Sat, Aug 06, 2011 at 10:41:10AM -0400, Scott Helms wrote:
   Correct, I don't believe that any of the providers noted are actually
  [snip]
Disappointing that nanog readers can't read
  http://www.paxfire.com/faqs.php and get
 
 a clue, instead all the mouth-flapping about MItM and https. a clue,
  instead all the mouth-flapping about MItM and https. While
 
 
 Maybe  instead of jumping to the conclusion NANOG readuers should get a
 clue,
 you should actually do a little more research than reading a glossyware/
 vacant FAQ  that doesn't actually explain everything Paxfire is reported to
 do, how it works,  and what the criticism is?

I'm not jumping to conclusions, merely speaking to evidence. My 
personal experience involves leaving a job at a network that 
insisted on implementing some of this dreck. There is a well-known, 
long-standing monetization by breaking NXDOMAIN. DSLreports 
and plenty of other end-user fora have been full of information 
regarding this since Earthlink starded doing it in ... 2006?

 Changing NXDOMAIN queries to an ISP's  _own_ recursive servers is old hat,
 and not the issue.

That sentence makes no sense. Hijacking NXDOMAIN doesn't have anything
to do with pointing to a recursive resolver, but returning a partner/
affiliate web site, search helper site or proxy instead of the 
NXDOMAIN.

 What the FAQ doesn't tell you is that the Paxfire  appliances can tamper
 with DNS
 traffic  received from authoritative DNS servers not operated by the ISP.
 A paxfire box can alter NXDOMAIN queries, and  queries that respond with
 known search engines' IPs.
 to send your HTTP traffic to their HTTP proxies instead.
 
 Ty,  http://netalyzr.icsi.berkeley.edu/blog/

This is finally something new, and I retract my assertion that the new
scientist got it wrong. Drilling through to actual evidence and details, 
rather than descriptions which match previous behavior, we have both
http://www.usenix.org/event/leet11/tech/full_papers/Zhang.pdf (a little
indirect with 'example.com', etc) and 
http://www.payne.org/index.php/Frontier_Search_Hijacking (with actual 
domains) provide detail on the matter. 

Cheers!

Joe

-- 
 RSUC / GweepNet / Spunk / FnB / Usenix / SAGE / NewNOG



Re: US internet providers hijacking users' search queries

2011-08-06 Thread Owen DeLong

On Aug 5, 2011, at 6:03 PM, Mark Andrews wrote:

 
 In message 4e3c9228.4050...@paulgraydon.co.uk, Paul Graydon writes:
 On 08/05/2011 02:53 PM, Brielle wrote:
 Until they start MitM the ssl traffic, fake certs and all.  Didn't a certai
 n repressive regime already do this tactic with facebook or some other major 
 site?
 
 Syria did: 
 https://www.eff.org/deeplinks/2011/05/syrian-man-middle-against-facebookhttp
 s://www.facebook.com/note.php?note_id=10150178983622358comments 
 
 Which is countered by DNSSEC + DANE.  A country may be able to fake everything
 under their tld but not the rest of the net.
 
Unless they start proxying all queries and putting their own trust anchors on 
all the
results.

Owen



smime.p7s
Description: S/MIME cryptographic signature


Re: US internet providers hijacking users' search queries

2011-08-06 Thread Scott Helms
Correct, I don't believe that any of the providers noted are actually 
hijacking HTTP sessions instead all of these are DNS based tricks.  
Since the service providers are also providing DNS (via Paxfire and 
others) users don't have a lot of choice.  You can switch to using a 
known public name server (Google's 8.8.8.8 for example) but I hesitate 
to recommend that to most end users because in non-evil networks its 
better to have local name resolution (because of GSLB  other reasons).


On 8/5/2011 9:14 PM, Joe Provo wrote:

On Fri, Aug 05, 2011 at 05:04:51PM -0700, Bino Gopal wrote:

http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html

It is more than slightly misleading to say hijacking search
queries; paxfire is evil as it hijacks dns and breaks NXDOMAIN
and they've been doing that for ages. The user behavior of
searching in the address bar has become more common place, and
browser behavior to try and resolve first, fallback to search
for the same input field has both trained the humans to keep
doing this and made it possible for DNS query interlopers to
appear to be generic-search interlopers.





--
Scott Helms
Vice President of Technology
ISP Alliance, Inc. DBA ZCorum
(678) 507-5000

http://twitter.com/kscotthelms





Re: US internet providers hijacking users' search queries

2011-08-06 Thread Owen DeLong
I prefer running my own resolver. It's pretty trivial to do on a Mac and I 
would tend to
think wouldn't be all that hard on Windows, though I have no idea.

A resolver doesn't get much more local than ::1/128.

Owen

On Aug 6, 2011, at 7:41 AM, Scott Helms wrote:

 Correct, I don't believe that any of the providers noted are actually 
 hijacking HTTP sessions instead all of these are DNS based tricks.  Since the 
 service providers are also providing DNS (via Paxfire and others) users don't 
 have a lot of choice.  You can switch to using a known public name server 
 (Google's 8.8.8.8 for example) but I hesitate to recommend that to most end 
 users because in non-evil networks its better to have local name resolution 
 (because of GSLB  other reasons).
 
 On 8/5/2011 9:14 PM, Joe Provo wrote:
 On Fri, Aug 05, 2011 at 05:04:51PM -0700, Bino Gopal wrote:
 http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html
 It is more than slightly misleading to say hijacking search
 queries; paxfire is evil as it hijacks dns and breaks NXDOMAIN
 and they've been doing that for ages. The user behavior of
 searching in the address bar has become more common place, and
 browser behavior to try and resolve first, fallback to search
 for the same input field has both trained the humans to keep
 doing this and made it possible for DNS query interlopers to
 appear to be generic-search interlopers.
 
 
 
 
 -- 
 Scott Helms
 Vice President of Technology
 ISP Alliance, Inc. DBA ZCorum
 (678) 507-5000
 
 http://twitter.com/kscotthelms
 
 



smime.p7s
Description: S/MIME cryptographic signature


Re: US internet providers hijacking users' search queries

2011-08-06 Thread Joe Provo
On Sat, Aug 06, 2011 at 10:41:10AM -0400, Scott Helms wrote:
 Correct, I don't believe that any of the providers noted are actually 
[snip]

Belief has nothing to do with it. The article is vaguely referring
to 'search' and incorrectly jumps to https. Disappointing that 
nanog readers can't read http://www.paxfire.com/faqs.php and get
a clue, instead all the mouth-flapping about MItM and https. While 
collectively encouraging more https is a *good* thing, it is utterly
tangential and misses the meat of this matter.

-- 
 RSUC / GweepNet / Spunk / FnB / Usenix / SAGE / NewNOG



Re: US internet providers hijacking users' search queries

2011-08-06 Thread Jimmy Hess
On Sat, Aug 6, 2011 at 12:08 PM, Joe Provo nanog-p...@rsuc.gweep.netwrote:

 On Sat, Aug 06, 2011 at 10:41:10AM -0400, Scott Helms wrote:
  Correct, I don't believe that any of the providers noted are actually
 [snip]
   Disappointing that nanog readers can't read
 http://www.paxfire.com/faqs.php and get

a clue, instead all the mouth-flapping about MItM and https. a clue,
 instead all the mouth-flapping about MItM and https. While


Maybe  instead of jumping to the conclusion NANOG readuers should get a
clue,
you should actually do a little more research than reading a glossyware/
vacant FAQ  that doesn't actually explain everything Paxfire is reported to
do, how it works,  and what the criticism is?
I mean... don't  you see a problem relying on _their own publication_  to
say what they are doing, when they
might like to keep their methods quiet  to avoid negative attention?

Changing NXDOMAIN queries to an ISP's  _own_ recursive servers is old hat,
and not the issue.


What the FAQ doesn't tell you is that the Paxfire  appliances can tamper
with DNS
traffic  received from authoritative DNS servers not operated by the ISP.
A paxfire box can alter NXDOMAIN queries, and  queries that respond with
known search engines' IPs.
to send your HTTP traffic to their HTTP proxies instead.

Ty,  http://netalyzr.icsi.berkeley.edu/blog/

In addition, some ISPs employ an optional, unadvertised Paxfire feature that
redirects the entire stream of affected customers' web search requests to
Bing, Google, and Yahoo via HTTP proxies operated by Paxfire. These proxies
seemingly relay most searches and their corresponding results passively, in
a process that remains invisible to the user. Certain keyword searches,
however, trigger active interference by the HTTP proxies.


http://www.icir.org/christian/publications/2011-satin-netalyzr.pdf
http://newswire.xbiz.com/view.php?id=137208


--
-JH


Re: US internet providers hijacking users' search queries

2011-08-06 Thread Brielle Bruns

On 8/6/11 11:08 AM, Joe Provo wrote:

Belief has nothing to do with it. The article is vaguely referring
to 'search' and incorrectly jumps to https. Disappointing that
nanog readers can't readhttp://www.paxfire.com/faqs.php  and get
a clue, instead all the mouth-flapping about MItM and https. While
collectively encouraging more https is a*good*  thing, it is utterly
tangential and misses the meat of this matter.



Disappointing that certain nanog readers depend on information put out 
by the vendor to be 100% honest and forthcoming in what their product does.


There's more to hijacking queries/dns/etc then just ISPs mucking with 
queries.  MitM attacks, SSL hijacking, etc is all a valid concern, and 
completely within the realm of the discussion here and this topic.


As pointed out, there are ISPs and whole countries who have no qualms 
with doing this type of thing.  Further, who cares if the company says 
their product isn't made or won't do what it may be doing?  We all know 
full well that people use products in ways they aren't meant or intended 
to be used.


When companies realize that they can't just transparently muck with 
traffic anymore because 90% of customer traffic is encrypted, do you 
really think, in all honesty, that companies won't find a way to regain 
this revenue stream, even if it runs afoul of laws/ethics/etc?


--
Brielle Bruns
The Summit Open Source Development Group
http://www.sosdg.org/ http://www.ahbl.org



Re: US internet providers hijacking users' search queries

2011-08-06 Thread Scott Helms
Not trying to be obtuse, but none of the technical docs you cite appear 
to talk about HTTP proxies nor does the newswire report have any 
technical details.  I have tested several of the networks listed in the 
report and in none of the cases I saw was there HTTP proxy activity.  
Picking up on WCCP/TCS isn't that hard (I used to install those myself) 
so unless there is some functionality in IOS and/or JUNOS that allows I 
don't see it happening.  Paxfire can operate all of the proxies they 
want but the network infrastructure has to be able to pass the traffic 
over to those proxies and I don't see it (on at least 3 of the networks 
cited).




What the FAQ doesn't tell you is that the Paxfire  appliances can 
tamper with DNS

traffic  received from authoritative DNS servers not operated by the ISP.
A paxfire box can alter NXDOMAIN queries, and  queries that respond 
with known search engines' IPs.

to send your HTTP traffic to their HTTP proxies instead.

Ty, http://netalyzr.icsi.berkeley.edu/blog/

In addition, some ISPs employ an optional, unadvertised Paxfire 
feature that redirects the entire stream of affected customers' web 
search requests to Bing, Google, and Yahoo via HTTP proxies operated 
by Paxfire. These proxies seemingly relay most searches and their 
corresponding results passively, in a process that remains invisible 
to the user. Certain keyword searches, however, trigger active 
interference by the HTTP proxies.



http://www.icir.org/christian/publications/2011-satin-netalyzr.pdf
http://newswire.xbiz.com/view.php?id=137208


--
-JH



--
Scott Helms
Vice President of Technology
ISP Alliance, Inc. DBA ZCorum
(678) 507-5000

http://twitter.com/kscotthelms





Re: US internet providers hijacking users' search queries

2011-08-06 Thread Mark Andrews

In message d8fbcdcb-bcd1-4847-9d23-d5745a5c6...@delong.com, Owen DeLong write
s:
 On Aug 5, 2011, at 6:03 PM, Mark Andrews wrote:
 
 =20
  In message 4e3c9228.4050...@paulgraydon.co.uk, Paul Graydon writes:
  On 08/05/2011 02:53 PM, Brielle wrote:
  Until they start MitM the ssl traffic, fake certs and all.  Didn't a =
 certai
  n repressive regime already do this tactic with facebook or some =
 other major=20
  site?
 =20
  Syria did:=20
  =
 https://www.eff.org/deeplinks/2011/05/syrian-man-middle-against-facebookh=
 ttp
  s://www.facebook.com/note.php?note_id=3D10150178983622358comments=20=
 
 =20
  Which is countered by DNSSEC + DANE.  A country may be able to fake =
 everything
  under their tld but not the rest of the net.
 =20
 Unless they start proxying all queries and putting their own trust =
 anchors on all the
 results.

Which still won't work unless they can get a false trust anchor for the
root installed.
 
Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: US internet providers hijacking users' search queries

2011-08-06 Thread Damian Menscher
I can confirm the report is about DNS providers that are doing hijacking by
sending the traffic through dedicated proxies, either in the ISP's network
or in the DNS provider's network.

If you didn't see this happening, it might be because you were testing on
www.google.com rather than on Yahoo or Bing traffic.  While the hijacking
*used* to affect Google also, we took a fairly aggressive stance and got it
stopped a while ago.  The fact that there are no currently-known cases where
it affects Google was unfortunately not made clear in the Netalyzer/EFF
reports.  If any of you find evidence of hijacking of Google, please shoot
me an email with details (DNS server, destination IP, etc) and I'll do what
I can to get it stopped.

Damian


On Sat, Aug 6, 2011 at 7:03 PM, Scott Helms khe...@ispalliance.net wrote:

 Not trying to be obtuse, but none of the technical docs you cite appear to
 talk about HTTP proxies nor does the newswire report have any technical
 details.  I have tested several of the networks listed in the report and in
 none of the cases I saw was there HTTP proxy activity.  Picking up on
 WCCP/TCS isn't that hard (I used to install those myself) so unless there is
 some functionality in IOS and/or JUNOS that allows I don't see it happening.
  Paxfire can operate all of the proxies they want but the network
 infrastructure has to be able to pass the traffic over to those proxies and
 I don't see it (on at least 3 of the networks cited).




  What the FAQ doesn't tell you is that the Paxfire  appliances can tamper
 with DNS
 traffic  received from authoritative DNS servers not operated by the ISP.
 A paxfire box can alter NXDOMAIN queries, and  queries that respond with
 known search engines' IPs.
 to send your HTTP traffic to their HTTP proxies instead.

 Ty, 
 http://netalyzr.icsi.berkeley.**edu/blog/http://netalyzr.icsi.berkeley.edu/blog/
 
 In addition, some ISPs employ an optional, unadvertised Paxfire feature
 that redirects the entire stream of affected customers' web search requests
 to Bing, Google, and Yahoo via HTTP proxies operated by Paxfire. These
 proxies seemingly relay most searches and their corresponding results
 passively, in a process that remains invisible to the user. Certain keyword
 searches, however, trigger active interference by the HTTP proxies.
 

 http://www.icir.org/christian/**publications/2011-satin-**netalyzr.pdfhttp://www.icir.org/christian/publications/2011-satin-netalyzr.pdf
 http://newswire.xbiz.com/view.**php?id=137208http://newswire.xbiz.com/view.php?id=137208


 --
 -JH



 --
 Scott Helms
 Vice President of Technology
 ISP Alliance, Inc. DBA ZCorum
 (678) 507-5000
 --**--
 http://twitter.com/kscotthelms
 --**--





-- 
Damian Menscher :: Security Reliability Engineer :: Google


US internet providers hijacking users' search queries

2011-08-05 Thread Bino Gopal
http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html

Thoughts?


Re: US internet providers hijacking users' search queries

2011-08-05 Thread Matthew Palmer
On Fri, Aug 05, 2011 at 05:04:51PM -0700, Bino Gopal wrote:
 http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html

I hope more ISPs start doing this; it'll increase the take up of HTTPS.

- Matt


-- 
Part[s] of .us are the global benchmark for pumpkin being a verb.
-- Anthony de Boer




Re: US internet providers hijacking users' search queries

2011-08-05 Thread Anthony Pardini
Not surprising..  Ten years ago a vender pitched inserting referral cookies
when customers visted shopping sites. We ultimately  convinced management
that collecting comissions in this manner wasn't the best of ideas.
On Aug 5, 2011 7:05 PM, Bino Gopal bino.go...@citrix.com wrote:


Re: US internet providers hijacking users' search queries

2011-08-05 Thread Brielle
Until they start MitM the ssl traffic, fake certs and all.  Didn't a certain 
repressive regime already do this tactic with facebook or some other major site?

-- 
Brielle
(sent from my iPhone)

On Aug 5, 2011, at 6:45 PM, Matthew Palmer mpal...@hezmatt.org wrote:

 On Fri, Aug 05, 2011 at 05:04:51PM -0700, Bino Gopal wrote:
 http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html
 
 I hope more ISPs start doing this; it'll increase the take up of HTTPS.
 
 - Matt
 
 
 -- 
 Part[s] of .us are the global benchmark for pumpkin being a verb.
-- Anthony de Boer
 
 



Re: US internet providers hijacking users' search queries

2011-08-05 Thread Valdis . Kletnieks
On Fri, 05 Aug 2011 17:04:51 PDT, Bino Gopal said:
 http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html

 Thoughts?

You're new here, aren't you? ;)

Anybody who was around when a certain DNS provider started providing a wildcard
for *.com and *.net so they could funnel the web page hits to their redirector
shouldn't be surprised. Unless they're surprised it took this long to make the
news again.




pgpBqMOgLCy2z.pgp
Description: PGP signature


Re: US internet providers hijacking users' search queries

2011-08-05 Thread Paul Graydon

On 08/05/2011 02:53 PM, Brielle wrote:

Until they start MitM the ssl traffic, fake certs and all.  Didn't a certain 
repressive regime already do this tactic with facebook or some other major site?

Syria did: 
https://www.eff.org/deeplinks/2011/05/syrian-man-middle-against-facebookhttps://www.facebook.com/note.php?note_id=10150178983622358comments 





Re: US internet providers hijacking users' search queries

2011-08-05 Thread Mark Andrews

In message 4e3c9228.4050...@paulgraydon.co.uk, Paul Graydon writes:
 On 08/05/2011 02:53 PM, Brielle wrote:
  Until they start MitM the ssl traffic, fake certs and all.  Didn't a certai
 n repressive regime already do this tactic with facebook or some other major 
 site?
 
 Syria did: 
 https://www.eff.org/deeplinks/2011/05/syrian-man-middle-against-facebookhttp
 s://www.facebook.com/note.php?note_id=10150178983622358comments 

Which is countered by DNSSEC + DANE.  A country may be able to fake everything
under their tld but not the rest of the net.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: US internet providers hijacking users' search queries

2011-08-05 Thread Jeff Kell
On 8/5/2011 8:53 PM, Brielle wrote:
 Until they start MitM the ssl traffic, fake certs and all.  Didn't a certain 
 repressive regime already do this tactic with facebook or some other major 
 site?


Marketscore did (via installing root certs in the victim's machines),
and as far as I know, still does.

Jeff



Re: US internet providers hijacking users' search queries

2011-08-05 Thread Jimmy Hess
On Fri, Aug 5, 2011 at 7:45 PM, Matthew Palmer mpal...@hezmatt.org wrote:

 On Fri, Aug 05, 2011 at 05:04:51PM -0700, Bino Gopal wrote:
 
 http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html
 I hope more ISPs start doing this; it'll increase the take up of HTTPS.
 - Matt


I'd rather someone start making a blacklist of ISPs  that inspect and
modify packets  in transit
through their network  in any way  ( other than TTL decrementing ),   so
search engines could collectively
identify these ISPs and  choose to require  _all_  connections from them be
over SSL.


You know what's going to happen. The regulators are going to get involved in
response to things like this,
with sufficient outcry from the public.Once ISPs show the industry can't
be trusted to moderate itself,
a new government body is likely to be formed for the sole purpose of passing
as many arbitrary,
arcane, bureaucratic, and otherwise burdensome rules ISPs will have to
follow as possible.

ISP's  'redirection' of certain search terms is proof that they have the
full capability to block search terms,
if it becomes widespread it would show that it's not unreasonable to demand
ISPs  intercept or block certain
search queries.

So eventually, there could be a government body saying what any ISP may do
to search engine queries,
and even mandating that ISPs do examine searches and block certain keywords
or phrases

--
-JH


Re: US internet providers hijacking users' search queries

2011-08-05 Thread Joe Provo
On Fri, Aug 05, 2011 at 05:04:51PM -0700, Bino Gopal wrote:
 http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html

It is more than slightly misleading to say hijacking search 
queries; paxfire is evil as it hijacks dns and breaks NXDOMAIN 
and they've been doing that for ages. The user behavior of 
searching in the address bar has become more common place, and 
browser behavior to try and resolve first, fallback to search 
for the same input field has both trained the humans to keep 
doing this and made it possible for DNS query interlopers to
appear to be generic-search interlopers.


-- 
 RSUC / GweepNet / Spunk / FnB / Usenix / SAGE / NewNOG



Re: US internet providers hijacking users' search queries

2011-08-05 Thread Matthew Palmer
On Fri, Aug 05, 2011 at 06:53:50PM -0600, Brielle wrote:
 Until they start MitM the ssl traffic, fake certs and all.  Didn't a
 certain repressive regime already do this tactic with facebook or some
 other major site?

Yes, there's plenty of rogue CAs.  That's an easier problem to solve (though
still difficult) than trying to stop traffic interception with plain HTTP.

- Matt

-- 
There's a term for those who fantasize that the world works in precisely the
way that produces maximum convenience for them, despite years of evidence to
the contrary.  The term is Morons.
-- Greg Andrews, in the Monastery




Re: US internet providers hijacking users' search queries

2011-08-05 Thread Bradford Chatterjee
Search engines are the ones that are paying for this redirection. Most of
the companies that approached us about this technology partner with Yahoo
for their error monetization. They want the eyeballs that come from
redirecting these mistyped URIs.

-Bradford Chatterjee

On Fri, Aug 5, 2011 at 6:10 PM, Jimmy Hess mysi...@gmail.com wrote:


 I'd rather someone start making a blacklist of ISPs  that inspect and
 modify packets  in transit
 through their network  in any way  ( other than TTL decrementing ),   so
 search engines could collectively
 identify these ISPs and  choose to require  _all_  connections from them be
 over SSL.