[154130] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Whois data compromised?

daemon@ATHENA.MIT.EDU (Jon Lewis)
Tue Jun 26 20:57:21 2012

Date: Tue, 26 Jun 2012 20:56:39 -0400 (EDT)
From: Jon Lewis <jlewis@lewis.org>
To: Paul Graydon <paul@paulgraydon.co.uk>
In-Reply-To: <4FEA580B.3080808@paulgraydon.co.uk>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Tue, 26 Jun 2012, Paul Graydon wrote:

> On 06/26/2012 11:53 AM, Mark Andrews wrote:
>> In message 
>> <CADfGf67aMjhr+bSDo4kLpfzcyZJZw5bx0uscW_9sgrQ7rz6nsQ@mail.gmail.com>
>> , Eric Rosenberry writes:
>>> Not sure where this data got injected into the system (or who knows,
>>> perhaps it's a DNS injection attack or something), but this certainly is
>>> not right.  :-(
>> It's perfectly NORMAL.  Just the owners of SWINGINGCOMMUNITY.COM,
>> BEYONDWHOIS.COM, SHQIPHOST.COM, NASHHOST.NET and UNIMUNDI.COM playing
>> games.
>> 
>> 
> Probably a stupid question, but what do they gain by doing such?

Vanity.  Poking fun at the domains in question.  People have been doing it 
at least 10 years, probably longer.

http://attrition.org/news/content/00-01-26.001.html

That's a page about it from 2000.  So, obviously, it has been going on 
more than 10 years.

----------------------------------------------------------------------
  Jon Lewis, MCP :)           |  I route
  Senior Network Engineer     |  therefore you are
  Atlantic Net                |
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________


home help back first fref pref prev next nref lref last post