Back in the 20th century, someone propagated the IP address of ftp.warez.org to be 127.0.0.1 — the same address as localhost, your own computer. So when kids would pop onto the Internet and ask “where can I grab free games?” folks could tell him to ftp to ftp.warez.org, and then giggle at the thought of some kid FTP’ing himself.
Ok, it wasn’t that great a joke.
Well, girlscouts-hawaii.org seems to be doing the same thing now:
bash-3.1$ whois girlscouts-hawaii.org | grep Server
bash-3.1$ nslookup - NS1.TWTELECOM.NET
184.108.40.206.in-addr.arpa name = loopback.girlscouts-hawaii.org.
220.127.116.11.in-addr.arpa name = localhost.
This has propagated to most DNS servers we could find.
bash-3.1$ nslookup loopback.girlscouts-hawaii.org w20ns.mit.edu
And, here’s the kicker, it shows up reverse lookups for anyone using Time Warner’s DNS servers.
bash-3.1$ dig +short -t ptr 18.104.22.168.in-addr.arpa
Thankfully this last one hasn’t propagated, and hopefully it won’t. Still, Time Warner isn’t exactly tiny. For all the homes and businesses hanging off of their networks, any tools that do reverse lookups are going to generate some very confusing results. It also suggests risks to an organization relying upon reverse lookups for any kind of access control.
UPDATE: Time Warner has fixed the DNS so the reverse-lookup doesn’t happen any more. Forward does, but that’s not hurting anybody.
Related Posts: On this day...
- Ubuntu 11.10 will not ship with "classic" GNOME desktop - 2011
- I just opened up my brand new Apple iPad and was SHOCKED with what the internals looked like. - 2010
- Blu-ray Discs expand to 128GB under new BDXL spec - 2010
- Behind the scenes at Netflix - 2009
- Bemoaning the death of Hacker Culture - 2009
- Public Search Engines Mine Private Facebook Details - 2009
- Obama may have turned the Queen of England into a copyright crook - 2009
- Thank God, BBC Reports: "Daily caffeine protects brain" - 2008
- Server Room In A Rain Shower - 2008