On Wed, 17 Sep 2003, Jack Bates wrote:

> Not sure about IP, but there are privacy issues. Verisign has
> intentionally redirected all email that was mistyped on the recipient to
> their server. Instead of immediately rejecting and terminating the
> connection, they allow the send to issue 3 commands, which would
> typically give them the sender and rcpt information where previously the
>   information would not leave the originating mail server. How could
> this be construed as anything but address harvesting and a breach of
> privacy?
>
> In addition, at no point has Verisign obtained permission to steal
> information in this way. They are eavesdropping! Every time I've
> checked, port 80 was down on the destination IP, but 25 was running full
> speed. It makes me wonder if their real intent wasn't to collect that
> information to begin with.

Regardless of Verisign's intent, there are definite privacy concerns here.
Verisign is now able to obtain all URL information from a browsing session
in which the domain name is mistyped (and the domain doesn't exist.) This
is of secondary concern to the NANOG list, which has been preoccupied with
the numerous technical and political problems this change poses, but is
nonetheless very serious.

Whereas ISP-provided search pages, such as AOL's, or local browser search
pages, such as IE's will be presented under identical circumstances (the
user mistypes a domain name), they don't have the same privacy problems
associated with them. As Microsoft's features are client-side, no user
information is leaked without the user's knowledge. And as the user is
already entrusting AOL, as her ISP, with her privacy, the problem is moot
there as well. Prior to this change, users never had to consider that
Verisign might be obtaining and recording their URL requests.

The email problem has been discussed here a bit more than the URL
requesting issue, and is troublesome in a number of other ways. The
potential for spam, the lack of clear reporting of a typo failure, and the
potential for privacy violations via the harvesting of email addresses,
and email address sender/recipient correlation are of concern.

Anonymizer has modified our name servers to correctly report unregistered
domains as such. Users of our anonymous web browsing proxy service are
protected from the web privacy problems created by Verisign's change;
users of our SSH tunneling service are protected from both the web and
email privacy problems.

We hope that Verisign will reconsider their actions. In the mean time,
we'll be doing everything we can to mitigate the risks to our users.


--Len.

Reply via email to