ReadyOne
Ready to Rock!
- Joined
- Mar 31, 2003
- Posts
- 2,112
If you miss-type a web address (or a web page has a bad address in a link) the bad request is now being intercepted by Verisign and redirected to their website.
What happens is that a request to a Domain Name Server goes out on the internet from your computer when ever a name needs to be turned into an IP address. All the "top level" DNS machines in the internet will get the request to look up the word before the ".com" or ".net" or ".tw" or whatever ends the name.
Verisign operates a top level DNS machine under authority of ICANN, so they see every request in the world that isn't resolved, and instead of answering "no address found", they answer with the address of their portal site. It's like using the telephone and never getting a "this number is not in service" message -- instead you get connected to a telemarketer.
This is a good article about what's going on. I've extracted the fix from it.
http://www.spywareinfo.net/sep24,2003#verisign
Blocking Verisign's Hijack
Most ISPs have applied the BIND patch to block Verisign's hijacking. If your ISP has not done this, then your privacy is at grave risk from Verisign. If you end up at Verisign's search portal when you mis-type a domain, then you need to contact your ISP immediately and ask them to apply the patch as soon as possible.
You can also block this web site yourself with these very simple steps posted by mjc at the SWI message boards.
Add the following to your HOSTS file:
127.0.0.1 sitefinder.Verisign.com #Block Verisign SiteFinder
127.0.0.1 sitefinder-idn.Verisign.com #Block Verisign SiteFinder
If you have Windows 95, 98, or ME, your HOSTS file is located at C:\windows\HOSTS. If you have NT or 2000, your HOSTS file is located at c:\winnt\system32\drivers\etc\HOSTS. If you have XP, the file is at c:\windows\system32\drivers\etc\HOSTS.
This will block most, if not all of the redirects.
If you have a firewall that allows IP blocking you can add the following IPs to its blocklist.
12.158.80.10
64.94.110.11
Block traffic to those IP address in both directions and in all applications and protocols.
What happens is that a request to a Domain Name Server goes out on the internet from your computer when ever a name needs to be turned into an IP address. All the "top level" DNS machines in the internet will get the request to look up the word before the ".com" or ".net" or ".tw" or whatever ends the name.
Verisign operates a top level DNS machine under authority of ICANN, so they see every request in the world that isn't resolved, and instead of answering "no address found", they answer with the address of their portal site. It's like using the telephone and never getting a "this number is not in service" message -- instead you get connected to a telemarketer.
This is a good article about what's going on. I've extracted the fix from it.
http://www.spywareinfo.net/sep24,2003#verisign
Blocking Verisign's Hijack
Most ISPs have applied the BIND patch to block Verisign's hijacking. If your ISP has not done this, then your privacy is at grave risk from Verisign. If you end up at Verisign's search portal when you mis-type a domain, then you need to contact your ISP immediately and ask them to apply the patch as soon as possible.
You can also block this web site yourself with these very simple steps posted by mjc at the SWI message boards.
Add the following to your HOSTS file:
127.0.0.1 sitefinder.Verisign.com #Block Verisign SiteFinder
127.0.0.1 sitefinder-idn.Verisign.com #Block Verisign SiteFinder
If you have Windows 95, 98, or ME, your HOSTS file is located at C:\windows\HOSTS. If you have NT or 2000, your HOSTS file is located at c:\winnt\system32\drivers\etc\HOSTS. If you have XP, the file is at c:\windows\system32\drivers\etc\HOSTS.
This will block most, if not all of the redirects.
If you have a firewall that allows IP blocking you can add the following IPs to its blocklist.
12.158.80.10
64.94.110.11
Block traffic to those IP address in both directions and in all applications and protocols.