Turtle you are way over my head here. What is your opinion on connections made through wireless Verizon EVDO. This is not considered a ISP, right?
And what about the DSL line at home?
Sorry, I'm kind of a network geek.
Short answer, the DNS attack has nothing to do with how you connect to the Internet.
Long answer...
An ISP is an Internet Service Provider, so yeah, if you access the Internet through Verizon, they are providing Internet acess for you. But while it may be an ISP, the difference is how you connect to the ISP. You can connect to an ISP via a phone line (dial-up or DSL), a cable or satellite modem, WiFi, or with an Aircard or Smartphone through your cell phone carrier.
WiFi connections can be spoofed, to make you think you are connecting to the Flying J, for example, but in reality you are connecting to a laptop in a truck 3 rows over. Everything you do on the Intenet goes through, and can be seen and captured, by the laptop. This really isn't a big issue, but it's something to be aware of. There are safeguards in the computer to help prevent such a thing, and to alert you if it thinks there is a possibility of it going on.
ISP connections through the phone line, like dial-up and DSL, those are hard wired connections and cannot be spoofed. The lines can be tapped, just like a voice phone call, but that's not something many people would do.
Same with cable and satellite modems, they are hard wired and cannot be spoofed.
Aircard cell phone connections are via a radio signal, and while they are not going to be spoofed, the radio signals can be intercepted and monitored, but most of that traffic is scrambled and encrypted, so anyone intercepting it won't get much use out of it.
But these are just the connections to your ISP, to get you onto the Internet. Connecting to the Internet has nothing to do with what happens to you after you get there. That's where the DNS comes into play. And for that matter, if you never open your Web browser and you instead use non-Web clients and tools, like a Usenet Newsreader, an FTP client, and an external e-mail client like Eudora, resolving Domain Names via DNS is a non-issue.
But, if you use your Web browser, then the DNS Attack vunerability is a real issue, regardless of how to connect to the Internet, WiFi, Aircard, Cable, doesn't matter.
Every computer on the Internet has an IP address (Internet Protocol address), like a phone number. It's in the form of xxx.xxx.xxx.xxx, or, as in the case of the EO Web site, it's 69.20.16.56. Every data packet that leaves your computer has your IP address stamped on it. The bazillions of data packets running around the aethernet all have a FROM: and TO: address stamped on them.
It's a lot easier and people friendly to remember something like [noparse]http://www.expeditersonline.com[/noparse] than it is to try and remember
69.20.16.56, but either one will get you to Expediters Online.
When you type [noparse]http://www.expeditersonline.com[/noparse] into your browser's URL address bar, that text is sent to a Domain Name Server (DNS server) where it looks up [noparse]http://www.expeditersonline.com[/noparse] and sees that it corresponds to (resolves to) the IP address of 69.20.16.56, so your computer is sent to 69.20.16.56. (or the server located at,
122704-www1.expeditersonline.com)
The best analogy I can come up with is Web sites and their corresponding IP address is like Voice Dialing on your cell phone, and your phone book is the DNS server. You say, "Call Mom," and the phone matches up what you said with what it can find in your phone book, then calls the number. When you input [noparse]http://www.microsoft.com[/noparse], the computer goes to it's own address book (a DNS server somewhere) and looks up the phone number (65.55.21.250) for Microsoft, then dials that number. Same thing. In the URL address bar of you browser, you can type 66.55.21.250 and it'll take you right to Microsoft's site without youy having to waste time going through a DNS server.
Sooo, for example, let's say I have a spare server sitting at home, and I do a site rip (copy most or all of the Web pages) from EO, and put it all on my server. Then, I do the DNS cache poisoning attack on as many DNS servers as my computer can get its grubby little bytes on, including the ones at
NS3.EXPEDITERSONLINE.COM and
NS4.EXPEDITERSONLINE.COM
as well as the ones at
NS.RACKSPACE.COM and
NS2.RACKSPACE.COM (where EO's servers are hosted)
and change the address for EO to be xxx.xx.xx.xxx (the IP address of my own computer) instead of 69.20.16.56. Then, whenever anyone out there types in [noparse]http://www.expeditersonline.com[/noparse] and their computer checks any of the DNS servers that I have attacked and changed, they will be sent to my computer instead of EO's server. They'll log on to EO and it'll look like EO, only it'll be my computer instead.
And since those servers get their data from the above mentioned DNS servers at EO and Rackspace, the attack will be populated to other DNS servers that are otherwise secure. Pretty soon most or all of the Web traffic going to and from EO will be going to and from my server, instead. I'd get everyone's password. Golly.
But I could also rig up a special message, like a popup window, that asks users to confirm personal information, and some would fall for it.
That's not really that big a problem for users of OE, but it sure could be a problem for users of a bank, or Paypal, or Amazon.com.
And it won't matter how you connect to the Intenet, Aircard, WiFi, cable or dial-up, all this DNS shenanigans happens
after your connected. And that's why, with whatever connection you use to get on the Internet, you need to go in to the Internet Connection preferences and set a static DNS server address instead of letting the ISP give you one automatically. If your ISP, be it Road Runner, Verizon Wireless, or the Flying J, has their DNS servers compromised, and you try to access one of the redirected DNS IP addresses, you won't end up where you think you are, and you won't even know it.