[4364] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Access Logfile Question

daemon@ATHENA.MIT.EDU (Christopher Petrilli)
Tue Feb 11 18:26:54 1997

Date: Tue, 11 Feb 1997 14:21:00 -0500
To: dmurray@pdssoftware.com, Anton J Aylward <anton@the-wire.com>
From: petrilli@uol.com (Christopher Petrilli)
Cc: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

At 11:28 AM 2/10/97 -0500, David Murray wrote:

>I can't remember where I saw it, but I recently read an 
>interesting article about mis-uses of DNS.  Several backbone 
>organizations put such detail into their host (and gateway and 
>router) names, that using nslookup, it possible to physically map 
>their network.  Not many companies are willing to publish such vital 
>corporate information, yet this is a perfectly reasonable and 
>accepted policy for DNS.  Personally, I don't feel the need to 
>publish host names for every PC we have connected to the Internet.  
>Is this wrong? I don't know.  Can I ftp to uunet?  No, but there are 
>other mirrors with the same information.  While reverse lookup may be 
>reasonable, its not common.

I will only say that it's simply something to try and make sure people are
who they say they are.  Having said THAT, the solution I use is to assign
nonsense names ot everything, or names which are obvious, like:

	155.0.55.1 -> H-155-0-55-1.bigcompany.com

What could anyone gain from THAT?

Chris
--
| Christopher Petrilli                                 http://www.uol.com
| petrilli@uol.com

home help back first fref pref prev next nref lref last post