
US .gov WHOIS Info Restricted Over Attacker Fears 178
An anonymous reader writes "VeriSign Inc has stopped providing access to information about the .gov internet domain, which is restricted to US government bodies, over concerns the data could be used in planning internet attacks."
I see no problem with this... (Score:2)
So if they take them down, even to say it's for protection, are we losing a facility, really?
Re:I see no problem with this... (Score:2, Insightful)
Re:I see no problem with this... (Score:2)
So just Verisign taking it offline isn't a problem, for whatever reason. We shouldn't be noting it as newsworthy, really.
Re:I see no problem with this... (Score:3, Insightful)
Frankly, yes. It is an instance of the government taking away information that should be available to the public under the guise of "national security."
And in the current climate, this is exactly the kind of thing we should be fighting against, with Ashcroft in power.
Granted that this is a relatively minor instance, but it is one that is part of a much greater whole.
The interests of "security" cannot supercede the interests of liberty.
Re:I see no problem with this... (Score:1)
With all due respect, for what legitimate purpose would you need to know the IP address of a government computer? I understand that some people get scared when information that was once available is taken away, but let's not slide down the slippery slope.
Re:I see no problem with this... (Score:3, Informative)
If you want to participare in a public network... (Score:4, Insightful)
Any information that is so critical to national security shouldn't be on the internet in the first place.
Re:I see no problem with this... (Score:2)
So if you spot a network problem or have an issue with abuse(it's happened) comming from a
info on /whois (Score:5, Funny)
C/O George W. Bush
1600 Pennsylvania Avenue
Washington, DC.
Yup, wouldn't want anyone to know where HE lives, do we?
Re:info on /whois (Score:1)
Re:info on /whois (Score:1)
What are the terrorists gunna do, plant peanuts?
That's incorrect, it should say Crawford, TX (Score:2, Funny)
Re:That's incorrect, it should say Crawford, TX (Score:2)
Look at the guy. Listen to him. Would you want him doing any real work?
Oh and if you see Blair, call him a murderous decietful conman. And that Ali will see him this saturday [stopwar.org.uk].
Ali
Talk about a non-news item... (Score:5, Informative)
sshhh! (Score:3, Funny)
Re: and another (Score:2, Informative)
Well (Score:5, Insightful)
It should be
Re:Well (Score:1)
Re:Well (Score:5, Interesting)
www.theregister.co.uk [theregister.co.uk]
www.hrdc-drhc.gc.ca [hrdc-drhc.gc.ca]
But the USA is the Internet, right? That's why you have
It's always bugged me a bit, especially when companies in my country use
I honestly don't know if there is even a TLD for the USA...
Re:Well (Score:1)
.ca is not a country. (Score:5, Funny)
Just because you somehow tricked the powers that be into making a
Re:.ca is not a country. (Score:2, Funny)
Re:.ca is not a country. (Score:2)
you be the 8th largest ecomony in the world, and then not get all ego on us.... then we'll see if maybe
Re:.ca is not a country. (Score:1)
I've actually seen proposals to the effect that California ought to be separate from the US in some things (such as international sporting events).
Re:.ca is not a country. (Score:1)
Structure of the .us domain (Score:2, Informative)
The .us country-code domain is not organised by entity type except in some special cases way down into the heirarchy.
First, there's a state code which uses the standard two-letter abbreviations for the states, then there's a 'region code' which will either be a city, region or large town. Under that people are free to register whatever they like, with some special cases.
The special cases are 'state' for special state-running bodies (are they called 'state government'?) and then a 'k-12' domain under which schools are organised by their respective school district.
The .us domain, then, is a lot more organised and distributed than most other countries, which is probably a good thing given its size. The RFC which proposed the organisation of the .us domain (whose number escapes me now -- try looking on the .us registry site [www.nic.us]) explains that they did not create .gov.us and similar because it would cause confusion, and that the US Federal Government alone would use .gov while state governments use .state.tx.us (or similar). At this stage in the game, moving the .gov domain to .gov.us would just cause a lot of problems as invalidating that many URLs en-masse is never a good idea.
Re:Structure of the .us domain (Score:2)
Well, it used to be. Now Neustar (the bozos of .BIZ) are running it, and selling off every name they can. For example, random.us is already registered [whois.us].
The .us domain used to be one of the last sections of the DNS that used an actual hierarchical scheme, instead of the usual "let's reinvent the flat namespace" of so many other TLDs. Now, it's just another land rush. Sigh.
Re:Well (Score:5, Insightful)
I don't know if you ever noticed, but postage stamps in every country in the world carry the name of that country somewhere on the stamp, except for one. Which one? The UK. Why? Because they were first with adhesive postage stamps as we now know them and started the tradition.
I don't have any more of a problem with the US not having to tag
Re:Well (Score:1)
Re:Well (Score:3, Insightful)
Why Still TLD's Mapped To Countries? (Score:2)
Re:Why Still TLD's Mapped To Countries? (Score:2)
Re:Well (Score:2, Insightful)
www.gov.us could be the central directory to states and federal goverment agencies. That such a site doesn't exist (it sorta does in firstgov, and some news sites, but that's difficult to remember) is rather sad.
The whole point of this heirarchy would be to have a website on anything and everything in the government, and have that site name be obvious.
And another thing.. try going to http://state.pa.us
this era of stupid web architecture must end.
Re:Well (Score:2)
The international telephone prefix for the USA is 1, because we invented the telephone. Same deal here.
So if you'd like your country to be the default for the next wave of communication technology, write your government officals encouraging them to invest in this sort of research so your country can beat the rest of the world to the punch.
Re:Well (Score:1)
Not the same deal
There is a reason for this.... (Score:1)
Ergo the
Are they going to... (Score:5, Insightful)
...hide the contents of the websites too?
Not much point hiding the whois information of a domain if its accompanying website tells the whole world who and where they are...
Re:Are they going to... (Score:2, Troll)
Not much point hiding the whois information of a domain if its accompanying website tells the whole world who and where they are...
Generally the contents of a website don't list the DNS servers for that domain. Verisign has restricted access to
Oh, that's a tough one (Score:2)
; > DiG 8.3 > whitehouse.gov soa
whitehouse.gov. 1D IN SOA eopc.eop.gov. postmaster.whitehouse.gov. (
2002072201 ; serial
15M ; refresh
5M ; retry
1W ; expiry
2H ) ; minimum
You know, if you hide the root servers DNS stops working, don't you?!
Re:Are they going to... (Score:1)
Not much point hiding the whois information of a domain if its accompanying website tells the whole world who and where they are...
Does the web site typically list the name, address and phone number of the individual responsible for the site?
Re:Are they going to... (Score:1)
It did say "internet attacks". There's not much point knowing the name and address of the person running a website if you're going to attack them over the net...
Basically, it all sounds a little pointless to me. Security via obscurity.
Re:Are they going to... (Score:3, Informative)
What the names of their nameservers are
What the IPs of their nameservers are
You can still look this up via DNS, but it takes much, much longer.
Re:Are they going to... (Score:2)
Maybe I'm not understanding this correctly, but I think a script that does a dig on the domains would be a lot faster than manually looking each up in a whois.. Or the same amount of time as writing a script to run the whois. Someone please explain to me what I'm missing?
Re:Are they going to... (Score:2)
Now, they've removed the
You can still get that information by querying each domain, either through DNS or whois. But that takes much, much longer.
Even better ... (Score:5, Funny)
Re:Even better ... (Score:1)
Re:Even better ... (Score:1)
Q: I never checked, but what WAS in the whois info (Score:5, Insightful)
Is there anyone out there who can explain what this accomplishes really? I'm seriously asking because I might be missing something.
Re:Q: I never checked, but what WAS in the whois i (Score:1)
Re:Q: I never checked, but what WAS in the whois i (Score:2)
Re:Q: I never checked, but what WAS in the whois i (Score:1)
Re:Q: I never checked, but what WAS in the whois i (Score:1)
Re:Q: I never checked, but what WAS in the whois i (Score:1)
Well, it's better than spoon-feeding it to them isn't it? I'm sure any threat to our govt sites already has that information anyway. The only way to really make this even half work is for every govt agency to associate new IP address to their sites.
But whatever! Give them a break folks (not just this poster, but there is a lot of bashing going on here with this). Be glad they are doing something. We would all be bitching if they just sat around and did nothing. We are all well aware that the govt is trying to tighten up electronic security on every front. This is probably just a very tiny puzzle piece to homeland security. If all the techo-geeks here know better, then go ahead and right them your idea for a more digitally secure govt. They love white papers and case studies.
Re:Q: I never checked, but what WAS in the whois i (Score:2, Insightful)
I'd be more glad if they were doing something that had some hope of being effective.
Re:Q: I never checked, but what WAS in the whois i (Score:2)
i mean, i can put on my bulletproof vest, make sure i have body guards... but what about the not eating at the same place every day. doesnt that help make it harder to kill me too?
i think patterns make you predictable, and obvious ecurioty patterns dont help.... and its easy to implement isnt it?
Re:Q: I never checked, but what WAS in the whois i (Score:1)
Re:Q: I never checked, but what WAS in the whois i (Score:2)
It probably isn't a hard thing to find... (Score:2, Interesting)
This may have unintended consequences (Score:5, Insightful)
The quote that I found interesting is: "Also removed from the FTP site was the zone file for in-addr.arpa, which is used for reverse-DNS lookups (when somebody wants to find out what domain is associated with an IP address, rather than the other way around)." So is this a prelude for them to stop supporting rev. DNS? If it does stop, are they really aware of the potential consequences? (Stopped email, blocked access, etc.) What about who to contact and how to contact them about possible network outages?
Things like this might seem like a good idea at the time, but can (and do) lead to other problems. I am in favor of security as much as the next guy, but half though-out moves like this don't help.
-D.
P.S. I wonder if they are going to stop publishing things like the white pages (online or even the print edition)? Hey they do have government entity addresses and phone numbers?
Re:This may have unintended consequences (Score:1)
suposed to know whos DOSing you..
hmmm wonder why theyed want to stop
that..
Re:This may have unintended consequences (Score:1)
Futher, PTR records can be completely false, and the real useful data for finding a bad host is often found in ARIN/RIPE/APNIC local IP Registry database.
However, the in-addr zone is still online (but
ftp://ftp.rs.internic.net/domain/inaddr.zo
rfc-ignorant listing (Score:5, Funny)
Re:rfc-ignorant listing (Score:1)
The FAQ? (Score:3, Interesting)
What is WHOIS?
The .GOV WHOIS database is a tool that provides users with the ability to lookup records in the registrar database. Using WHOIS, you can search for people, name servers, and domains. From a UNIX system, you can use the -h option to point to the .GOV WHOIS server, nic.gov. For example, to find out about gsa.gov, use the following command: "WHOIS -h nic.gov gsa.gov".
(posted anonymously to avoid karma-whoring)
Whats the point? sources are everywhere (Score:1)
Non-authoritative answer:
Name: whitehouse.gov
Address: 198.137.240.92
whois -h whois.arin.net 198.137.240.92
OrgName: Executive Office Of The President USA
OrgID: EXOP
NetRange: 198.137.240.0 - 198.137.241.255
CIDR: 198.137.240.0/23
NetName: NETBLK-EOPNET-C
NetHandle: NET-198-137-240-0-1
Parent: NET-198-0-0-0-0
NetType: Direct Allocation
NameServer: DNSAUTH1.SYS.GTEI.NET
NameServer: DNSAUTH2.SYS.GTEI.NET
NameServer: DNSAUTH3.SYS.GTEI.NET
Comment:
RegDate: 1993-05-21
Updated: 2000-12-27
TechHandle: WDR1-ARIN
TechName: Reynolds, William
TechPhone: +1-202-395-6975
TechEmail: william_d._reynolds@oa.eop.gov
# ARIN Whois database, last updated 2002-09-20 19:05
# Enter ? for additional hints on searching ARIN's Whois database.
Had to remove directions from website as well (Score:3, Informative)
Re:Had to remove directions from website as well (Score:2)
Cool (Score:1)
Maybe they should restrict access to the
Great solution (Score:1)
Its stupid.
Why now? (Score:3, Interesting)
So, I read the attached article, and I understand what Verisign is doing. My question is: why? What is the motivation behind them blocking access to these whois records?
I agree with the article in saying "It seems so logical to take that
Actually, why do we have whois records for any domain?
Re:Why now? (Score:3, Informative)
To catch hackers.
When someone breaks into a a computer on your network, calling the owner of the domain can help you find the bastard. Or stop him in his tracks if he picks up the phone. You could probably get the same info by figuring out the ISP from their IP address or the route, then calling the ISP. This is probably even more accurate, but directness is good. Esp if the computer you see is just the first hop along the way to the bastard.
Re:Why now? (Score:2)
When someone breaks into a a computer on your network, calling the owner of the domain can help you find the bastard.
When someone breaks into a computer on your network, you can't tell what his domain name is, only his IP address.
Re:Why now? (Score:1)
Domain WHOIS is really only useful for researching forward resolving information.
Nah it's probably... (Score:1)
I am not in front of my mac right now... (Score:1, Troll)
"apple.is.the.choice.for.every.self.respecing.t
At least it worked in 10.1
Hey retard moderator! Here's the proof! (Score:2)
Who cares? (Score:1)
Opps...U.S. government uses other TLDs too! (Score:2)
And anyways restricting zone file access doesn't work - domain speculators and others have for years basically compiled their own for other TLDs such as
I'm sure idiots already are trading the
Off-topic ramble: It's sad to say, but it very much appears the terrorists are winning or some even argue already have won. Various people over the years used to warn that Americans could lose their freedoms quicker than they ever imagined - it's now happening; more detention camps are being constructed with vastly larger ones out on bid from my understanding - why would such large detention camps be needed? There aren't that many terrorists...unless the U.S. government now considers Americans terrorists...wait they already have...enemy combatants...and now the standard has been further lowered...query the
Ron
Google (Score:1)
LAMEIS (Score:1)
It is important.... (Score:1)
I think we should move the fences further out from the white house so that you need binoculars to see it.
I think we should close down streets around government buildings for a half mile around, and make security such an intrusion and frustrating experience no one will want to visit their lawmakers.
I think they should make snail mail even slower and have it sitting around for weeks at a time in some postal facility and then simply ignore email sent to them.
Then the lawmakers and executors of the law can live peacefully doing what ever they want irregardless of the citizens of the country.
abuses (Score:2)
How every sysadmin on the globe who would like to tell you that there's a problem with your servers, routers or users? Whois tells me who to contact (and sometimes, if it's a live attack, abuse@whoever.tld just doesn't cut it).
Maybe I should just firewall
.gov zone file available here (Score:1, Informative)
(11:45am EDT Saturday 21-Sep-2002)
Bad headline (Score:3, Interesting)
hypocritical government... (Score:2)
VeriSign Inc has stopped providing access to information about the .gov internet domain, which is restricted to US government bodies, over concerns the data could be used in planning internet attacks.
Meanwhile, the government is trying to pass a law [loc.gov] making it illegal for us to do the same thing.
Not fair... (Score:1)
This is just Verisign saying "Hey Look at us!" (Score:1)
pathetic asprinationlistic move (Score:1)
Perhaps it should be restricted for anyone that re (Score:1)
I asked and was told NO.. phfft.
Re:Perhaps it should be restricted for anyone that (Score:1)
Better yet, list your registry's address so they can see all the lovely spam you get.
Standard thing I do at Rat Shack, etc., when they ask for my address. I just look at a business card on the desk and give them the info from there.
is .gov really worth protecting? (Score:1)
It would seen to me that if someone wanted to attack us, they'd try to hit Microsoft. The majority of the computers out there have their os loaded... so it would make sense to try something that could affect as many systems as possible.
I also take offense to the fact that us "little people" are still left out the the open while the government saves its' own ass. If the whois info is so revealing, then they should just block it completely.
an idea? (Score:2)
-
The **ZONEFILES** have been restricted, NOT WHOIS! (Score:1, Informative)
whois data for
verisign for at least several years, it is maintained by nic.gov, and is still very much available on www.nic.gov.
It's the actual DNS zonesfiles that have been taken offline. These used to be available via FTP from ftp.internic.net. The
The problem is that they also make great seed material for `bad' search engines such as spam collectors or security scanners.
The
Interestingly ftp.ripe.net (the european version of arin) still makes the in-addr.arpa zone available for all the IPs that they manage.
This while issue has absolutly nothing to do with whois information or address/contact information. The zonesfiles that were removed do not contain anything other than domain names and the nameservers that control them.
The only reason for doing this is to make it slightly harder for search engines/scanners to get good seed data.
Personally I think this is a pointless thing to do. It raises the bar to finding information high enough to annoy legitimate information collection for use by good search engines but does little to stop a determinated attacker or in any way improve security.
It's trivially easy to get seed data from search engines like google, just make a script that searches for
Wow - think about Yellow Pages (Score:1)
Who are they helping? (Score:1)
They won't waste so much time on false leads.
How about... (Score:1)
Or, maybe, we should send 3 parties - the government, the terrorists, and then the rest of us?
WHOIS advertising attacks (Score:2)
Bush and Iraq (Score:2)
Does anyone in the US have the slightest interest in (a) invading Iraq or (b) using the "War on Terror" momentum up on Iraq, which had nothing the hell to do with Sept. 11th at all?
Re:Bush and Iraq (Score:1)
Spoken like a true brainwashed american. Do you believe everything the government tells you?
Re:drugs (Score:1)