NNSquad - Network Neutrality Squad

NNSquad Home Page

NNSquad Mailing List Information

 


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ NNSquad ] Verizon's TOS includes expanded DNS hijacking


Here is Verizons TOS.  Pay attention to section 5.5

<http://www.verizonbusiness.com/external/service_guide/reg/terms_conditions-nonregulated.htm>

(CAPS added for emphasis)

"where a Customer DNS query either (1)  does not resolve to a current, valid,
 operable IP address, or (2) reflects user-input text (e.g., a search term)
 that is not in the form of a resolvable URL (whether or not a browser-added
 URL is subsequently added to that user-input), then rather than returning
 an NXDOMAIN response or THE IP ADDRESS FOR THE BROWSER-SUPPLIED URL,
 Company may deliver the IP address for a web page containing information
 and links that it believes are responsive, relevant or related..."

As I suspected, they will be substituting their own A records for
otherwise legitimate A records.  This is not just NXDOMAIN hijacking,
it is equivalent to domain hijacking.

-- 
Bob Poortinga K9SQL
Bloomington, IN US

   [ The last reports I have on this indicate that -- while Verizon
     isn't as forthcoming with this info as previously -- it is still
     possible for users to configure their own machines to use
     non-Verizon DNS servers successfully.  If any Verizon users
     experience actual DNS port 53 hijacking (test procedure at
     http://lauren.vortex.com/archive/000377.html ) please let me
     know immediately.  Thanks.

            -- Lauren Weinstein
               NNSquad Moderator ]