[154130] in North American Network Operators' Group
Re: Whois data compromised?
daemon@ATHENA.MIT.EDU (Jon Lewis)
Tue Jun 26 20:57:21 2012
Date: Tue, 26 Jun 2012 20:56:39 -0400 (EDT)
From: Jon Lewis <jlewis@lewis.org>
To: Paul Graydon <paul@paulgraydon.co.uk>
In-Reply-To: <4FEA580B.3080808@paulgraydon.co.uk>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Tue, 26 Jun 2012, Paul Graydon wrote:
> On 06/26/2012 11:53 AM, Mark Andrews wrote:
>> In message
>> <CADfGf67aMjhr+bSDo4kLpfzcyZJZw5bx0uscW_9sgrQ7rz6nsQ@mail.gmail.com>
>> , Eric Rosenberry writes:
>>> Not sure where this data got injected into the system (or who knows,
>>> perhaps it's a DNS injection attack or something), but this certainly is
>>> not right. :-(
>> It's perfectly NORMAL. Just the owners of SWINGINGCOMMUNITY.COM,
>> BEYONDWHOIS.COM, SHQIPHOST.COM, NASHHOST.NET and UNIMUNDI.COM playing
>> games.
>>
>>
> Probably a stupid question, but what do they gain by doing such?
Vanity. Poking fun at the domains in question. People have been doing it
at least 10 years, probably longer.
http://attrition.org/news/content/00-01-26.001.html
That's a page about it from 2000. So, obviously, it has been going on
more than 10 years.
----------------------------------------------------------------------
Jon Lewis, MCP :) | I route
Senior Network Engineer | therefore you are
Atlantic Net |
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________