Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy Your Rights Online

Is Comcast Intercepting Packets? 403

nihilist_1137 writes: "According this page, comcast is intercepting your packets to gain knowledge of your whereabouts and then reselling it to marketers." According to the linked message, "This allows them to not only log all http requests, but to also log the response. Maybe they want to profile their customer browsing history for subsidiaries or resale to marketers. Maybe they want to do their part in The War on Freedom. Maybe they just want passwords to porn sites. Apparently they aren't using it to maximize bandwidth, because it's not configured to serve cached data."
This discussion has been archived. No new comments can be posted.

Is Comcast Intercepting Packets?

Comments Filter:
  • by tupps ( 43964 ) on Monday February 11, 2002 @11:52PM (#2992200) Homepage
    Both Cable Internet Providers and I am sure many other ISP's in Australia use Transparent Proxies.

    Much easier to setup on the client side and you catch people who leave out the proxy information.

    The fact that the server has other capabilities doesn't mean that they are actually using this stuff. If someone can show me a link to the page where I can buy the marketing data, *then* i will believe you.

    This is just speculation.

  • Comment removed (Score:4, Informative)

    by account_deleted ( 4530225 ) on Monday February 11, 2002 @11:54PM (#2992211)
    Comment removed based on user account deletion
  • by DaSyonic ( 238637 ) <DaSyonic.yahoo@com> on Monday February 11, 2002 @11:55PM (#2992213) Homepage
    I think the fact that this was mailed to bugtraq yet it apparantly got denied is proof of that...

    Many ISPs do transparent caching. Transparent caching at ISPs is more than acceptable. It's not acceptable when major backbones do it, as has happened in the past.

    The fact that they can log what you do is just a side effect. The same can be done WITHOUT transparent caching. The 'author' says they added hardware just for this. Well of course they did! They're just trying to speed up access without needing as big of a link needed without using transparent caching.

    And at any rate, I'm surprised this got posted. It's just some guy posting to two mailing lists, which got denied at that!

    Ultimately though, I feel ISPs should provide a means to remove you from having your link transparently cached. If they do that, then you can't blame them for trying to save bandwidth. The results of a transparent cache can be substantial!
  • New service packages (Score:4, Informative)

    by hex1848 ( 182881 ) on Monday February 11, 2002 @11:55PM (#2992217) Homepage
    I got forwarded this by one of my buddies at work. At this prices its plain sick that they also want to sell your usage statistics to the SPAMERS. On top of that I've been told that they want every computer on there network using proxy clients in order to connect.

    I'm glad sprint just hooked up DSL in my area, I'm switching providers.

    According to insiders at Comcast there will be three tiers of service. The current service will be called Silver and it will be 1500/128 for $49.95 plus modem rental. Yes that is true, they are planning on a $10 price increase within the next year after the transition is complete and the merger with AT&T Broadband Internet is finalized. Comcast doesn't want to mess with the rates right now until they get regulatory approval for the merger. But the S.O.P. at AT&T and Comcast is a price increase after a merger. Look at what Cable rates did after the Mediaone transition.

    Gold service will be 1500/300 and will allow VPN access and something they are calling priority traffic. This is the old Pro service. The cost will be $99.95. If you are a gamer used to the old MediaOne performance, this Gold level should get you back close to the perf you had with the old system. And yes that means you will be paying double for the same service you had last year.

    The new low price option is Bronze. Expected to be 128/64 or maybe 256/128 it should be priced at $29.95. This is the one that is most in the air. I haven't seen a bronze config file yet to see what they are planning.

    Modem rentals will be $5 and may increase to $7.
  • Evidence, please? (Score:5, Informative)

    by 1010011010 ( 53039 ) on Monday February 11, 2002 @11:56PM (#2992226) Homepage
    How do we not know they're just implementing a web cache to save money and provide better service? Lots of ISPs do this. Why page to get the pictures from the homepage of cnn.com 458,765 times an hour when once will do?

    This allows them to monitor and change (or insert ads into) what you read.

    Posh. Fear-mongering. Come back with some evidence -- and I'll be as against it as the next guy. And if they are actually inserting ads, then they'll probably be in court with CNN, Disney, etc, so forth, for modifying and distributing copyrighted material.

    Interestingly, regardless of what IP you address the packet to, the Inktomi Traffic-Server reads the Host: field to determine where to send the packet. I sent several packets from my home machine to one of my office machines, inside the packet was "Host: www.comcast.net". Comcast illegally intercepted, misinterpreted and altered this packet, and sent it to www.comcast.com. So, you might say there's a bug in this evil Inktomi Traffic-Server thing.


    Oh, shut up. That's how a transparent proxy works. I suppose the Linux facilities for transparent proxing -- available for years now -- are also evil?

    Where's my clue-by-four...
  • by gmhowell ( 26755 ) <gmhowell@gmail.com> on Tuesday February 12, 2002 @12:00AM (#2992245) Homepage Journal
    I probably signed some BS license agreement that gave them the right to do that. Doesn't matter. With spamcop, spamassassin, and all of that (plus the fact that they STILL don't have a working email address for me) they can't send me spam. And with caller id, I haven't spoken to a salesman since I stopped answering blocked numbers. And, finally, with my hosts file, I don't even see 90% of the ads anymore.

  • by Anonymous Coward on Tuesday February 12, 2002 @12:01AM (#2992255)
    Watch out -- redirect to something called oralse.cx, which failed to load before I whacked the close button. Asshole. Oh, wait. Not an asshole. I don't know what it was. But the poster is an asshole.

    ~~~

  • by hex1848 ( 182881 ) on Tuesday February 12, 2002 @12:04AM (#2992268) Homepage
    Its all in the terms of service: [comcast.net]

    COLLECTION, USE AND DISCLOSURE OF INFORMATION ON
    SUBSCRIBER USE

    Collection of Information: Comcast collects, uses and releases information on Customer use of the Service as necessary to render the Service, to otherwise undertake legitimate business activities related to the Service and to comply with law. Comcast may collect information in accordance with applicable law concerning Customer's use of the Service and customer preferences which are reflected in the choices that a customer makes among the range of services offered as part of the Service, the time that the customer actually uses the Service, the menus and features used most often by the Customer, and other information about a customer's "electronic browsing."

    Use of Information: Collecting information contained in transmissions made by Customer through the Service directed at Comcast, its Underlying Providers, Internet web sites, or other service providers to which access is provided as part of the Service, is necessary to provide the Service. Comcast's detailed business records generally are used to help make sure customers are properly billed; to send customers pertinent information about the Service; and for accounting purposes. Customer information is also used to execute requests and orders placed by customers with advertisers, merchants, and other service providers; to understand customers' reactions to various features of the Service or the Internet; and to personalize the Service based on the interests of customers. Such information helps Comcast improve the Service and uncover unauthorized access to the Service or Customer data and may be provided to law enforcement agencies in the event of such unauthorized access.

    Confidentiality of Information: Comcast considers the personally identifiable Customer information that is collected to be confidential. Comcast will disclose to third parties personally identifiable information that Comcast maintains related to customers only when it is necessary to deliver the Service to customers or carry out related business activities, in the ordinary course of business, for ordinary business purposes, and at a frequency dictated by Comcast's particular business need, or pursuant to a court order or order of any regulatory body having jurisdiction over matters which are the subject of this Agreement. Additional information regarding disclosure of personally identifiable information is described in the Privacy Statement which can be accessed through the Comcast High-Speed Internet Service home page.
  • by compumike ( 454538 ) on Tuesday February 12, 2002 @12:07AM (#2992276) Homepage
    Take a look at this thread [phillylinux.org] from the Philadelphia Linux User Group. It sounds like the new software update that Comcast has asked its users to install contains spyware and changes internet settings...

    So now they can track you from your own (Windows) machine, and also through their transparent proxy.
  • Re:Tangent (Score:2, Informative)

    by djmoore ( 133520 ) on Tuesday February 12, 2002 @12:17AM (#2992312) Homepage
    Can someone explain why the Good Guys always have to keep the Bad Guy on the line for something like three minutes in order to trace the call, when all they should have to do is call up the Phone Company (on another line) and ask them to punch up the number of the person calling this number right now?

    Because Hollyweird is out of date. That used to be true in the days of mechanical switches, but now...pfft.

    Well, that, and it provides a lazy director three minutes worth of free suspense.

    I recently saw the modern version of this old chestnut on Fox's 24, where the Good Guys (a powerful and secretive yet benevolent government organization, hm) were unable to track down the exact physical location of a cell phone before the desperate-to-found caller was cut off.
  • by Anonymous Coward on Tuesday February 12, 2002 @12:24AM (#2992339)
    "The phone company doesn't tap converstations, but they sure as hell have a database of which line called which number, when, and for how long."

    I work for a phone company.
    No, we sure as hell DON'T have a database. (atleast in Canada). There are only 3 times we keep track.

    1. As per customer request (traffic studies, getting prank calls)

    2. As per warrant (court order required!)

    3. For long distance billing. (we need to know how much to charge you)

    local calls are not recorded - we have to add an option in your line programming for that - after meeting one of the above requirements.

  • Re:Tangent (Score:2, Informative)

    by synx ( 29979 ) on Tuesday February 12, 2002 @12:27AM (#2992355)
    hollywood bullshit. With modern switches the phone system doesnt have to "trace" worth shit. It just _knows_ these things. There are limits, but with ANI and ANI2, the phone number comes down the wire with the signaling/setup.

    In the past, it used to be that someone had to go actually TRACE the path of the physical switches as they connected the outgoing trunk to the local line. Someone actually had to do this manually physically, which is probably the 3 minute thing, but thats ancient tech. Only backwards places like North Dakota uses that.
  • Re:Tangent (Score:2, Informative)

    by dachshund ( 300733 ) on Tuesday February 12, 2002 @12:29AM (#2992366)
    I recently saw the modern version of this old chestnut on Fox's 24, where the Good Guys (a powerful and secretive yet benevolent government organization, hm) were unable to track down the exact physical location of a cell phone before the desperate-to-found caller was cut off.

    I recently read an interview with 24's creators. When asked how much law enforcement and intelligence agencies cooperated in the writing of the show, they said something like "We've got a great relationship with the government. We pay our taxes and they leave us alone." So don't expect enormous amounts of realism from that show (eg, people running around shouting classified info over cell and cordless phones.)

  • Re:Tangent (Score:2, Informative)

    by yintercept ( 517362 ) on Tuesday February 12, 2002 @12:37AM (#2992391) Homepage Journal
    The other Hollywood twist is that the bad guy routes their phone through several different switches, making it more difficult to track down the user.
  • by cicadia ( 231571 ) on Tuesday February 12, 2002 @12:39AM (#2992398)
    Dude, they're your ISP. They are, and have always been, the first stop your packets make after they leave your local machine (or firewall, border router, or what have you).

    They've always been able to intercept your passwords, assuming they're over plain HTTP basic authentication, or some other insecure protocol (POP, FTP, etc).

    And no, they can't compromise VPN traffic or SSL-protected traffic. Those are encrypted end-to-end. It's the same thing with S/MIME or PGP email. If you use a VPN, or HTTPS, or IPSEC, then you are safe from eavesdroppers anywhere on the net, including your ISP, or whatever evil proxies they have set up to trap your packets.

    If you don't trust your ISP to be responsible with your unencrypted traffic, though, you should think about switching ISPs. And if your passwords are that important, then you shouldn't be sending them over insecure protocols.
  • by Romancer ( 19668 ) <romancer@[ ]thsdoor.com ['dea' in gap]> on Tuesday February 12, 2002 @12:41AM (#2992404) Journal
    It's because the actual "bad guy" is using spoofing hardware and software that makes his/her call look like it's comming from somewhere else unless you actually trace it back to the source. The more spoofing programs/hardware they comendere the more hops and therefore traces the good guys need to run to get back to the real number.

    It's still in practice but now it's seconds not minutes that it takes to trace a call that's trying not to be traced.
  • by Anonymous Coward on Tuesday February 12, 2002 @12:53AM (#2992453)
    The phone company does indeed keep a record of any and all calls made on its networks. Back in the day, AMA records used to only record long distance calls for billing, but in the age of the digital switch, all calls are logged. Same goes for cellular networks also. And added onto the reasons for pulling call records, any use the phone company deems important enough to do it, also counts. They dont need a warrant to pull the records, they just cant give it out without said warrant.

    But gone are the days of the pin register to log local calls (which is what was used pre digital switching). Bits are cheap compared to then, and the biggest reason why they log it all is for the "you never know and since it requires very little to do it, they do it by default"

  • by Phrack ( 9361 ) on Tuesday February 12, 2002 @02:02AM (#2992661)
    In a previous life, I was an experienced admin of Inktomi traffic server. It's simply a proxy cache. Yes, it can do many of the things mentioned.. insert ads? Sure... capture user into private portal hell? Sure. Track usage via logs? Sure. Do most care? Ehh.. not sure about that.

    That previous life was working with a large Regional Bell company... the mere mention of selling of consumer info (even just anonymized web logs) caused the blood to run out of their faces. I don't think it'll happen there, but I don't make promises for anyone else. It's quite the panacea of information, even if just used internally.

    BTW, Novell's proxy cache is actually faster, easier and quite a bit cheaper. Squid, while free, will likely never reach the same performance levels.
  • by the frizz ( 242326 ) on Tuesday February 12, 2002 @02:08AM (#2992675)
    While comcast and other ISPs may be running a transparent proxy, note that non-transparent proxies are coming. The Open Pluggable Edge Services (OPES) [ietf-opes.org] group is working on standard framework for non-transparent proxies.

    Personally I approve of this because it will allow for a more efficient operation of many useful web services like content filtering, virus checking and ad stripping. An important part of this work will also be define a standard way for conforming OPES software to only invoke edge services after authorization from end-users and/or content providers.

  • by Boatman ( 127445 ) on Tuesday February 12, 2002 @02:40AM (#2992770)
    This is what Orangatango [orangatango.com] is all about; run a virtual browser through SSL and all Comcast will ever see of your surfing is www.orangatango.com:443.
  • by Afrosheen ( 42464 ) on Tuesday February 12, 2002 @03:07AM (#2992826)
    I think I smell an Uplink [uplink.co.uk] player here. In reality, you can't spoof, ANI will show your originating phone number and that number gets bounced around with each successive call. It is true, however, that starting a few conference calls, chaining them together, then calling Sears, explaining that you're new in Automotive and you need the operator, getting a dialtone, and continuing the chain of calls can slow things down a little.
  • by pestihl ( 16433 ) on Tuesday February 12, 2002 @07:21AM (#2993228) Homepage Journal
    I work for QWEST, which is a huge phone company here in the US. It is impossible to have digital switches and not be tracking the calls in some database somewhere.
    Mostly because of one reason, Inter-State Inter-Lata rules and other smaller FCC phone line fair use rules. Qwest, Sprint, MCI and thousands of other businesses and sometimes counties own the phone lines and the switches. If I make a call, EVEN Out of country, and Go from Qwest owned phone lines to your Canada owned phone lines, Qwest and the Canadian owned company have to reach a agreement on what to charge for the usage, BY THE SECOND.
    Third party companies house these charges. The company Qwest uses is called Telview, found at http://www.telveiw.com; it's called a TARIFF library, Telview makes their money by handling these charges and selling them to telecoms. EVERY digital switch in the world uses some system like this, or in conjunction with.
    Now the database in play comes in not to track who you are calling so much. But because once your voice packet leaves Qwest lines it is not their propriety anymore and someone has to pay for the usage. Thus MCI can say you as a Qwest user, used X amount of trunk access on their lines, and charge Qwest X amount of dollars for those seconds. Qwest logs roughly about 140+ million phone calls a day, their system is considered by the FCC to be the definitively correct system, In audit type disputes The FCC will even use Qwest records as a third party advisor, because we track EVERYTHING, even all of the other telecoms, and almost all in the world. We just made it into Europe last summer. Anyway these millions and millions of minutes are charged at as low as -5 cent a minute to crazy 15+ cents a minute. It goes negative because of anti-monopoly issues regarding start up telecoms. Seconds are rounded and tracked to the nearest thousandth. On Qwest's system, an audit system HAS to be in place, this is part of FCC regulation crap, not to mention allows the FCC to more or less do their job. Generally that database doesn't have names in it. But the billing database that does have all your names in it if you subscriber to Qwest, private or not.... is a simple sql call away, it quite latterly lives in the same server farm... No stored procedures can link the two databases by LAW. Unless a search warrant is in place. Then with the officer there, we can link them. But the link has to be deleted also under the officer's super vision. Your records are tracked as up to two years, then deleted off, one month at a time. So two years ago to last month, we have no clue of whom you called, and are really glad to have a little more space.
    The rule is if you can't use a blue box on your phone line, then you are traceable down to that specific phone. Digital Switch = Trackable.

    p.s. For those who wonder, The system is Called NTU, Network Transaction Usage. We use Perl to gather data off the switches, not every switch is alike, including the os they run and the data needs to be parsed for the database. A HP/UX demon is used to process rules, and sort out how they should be poked into the database. While an oracle database floating on 36 partitions in a huge raid system is used to house the data while it lives. The machine NEVER goes down, even it does go down, monitor machines can quite literally mirror the drives and swap out so no data is ever lost. The coolest thing I've ever seen was my cowboy boss walk over to this multi-billion dollar a year machine and say, "Time to test the emergency backup units." These machines are located in other states altogether btw. Then he just pulls the power cord out of this rack mounted 8 by 8.
  • Transparent Proxies (Score:3, Informative)

    by frost22 ( 115958 ) on Tuesday February 12, 2002 @08:26AM (#2993344) Homepage
    So they have transparent web caches. The company I work for does this as well. And it sucks big time, for a number of reasons:
    • we have all kinds of quality problems. There's a shitload of web apps out there that break with transparent caches, one way or the other, and often in subtile ways. There's even an RFC [faqs.org] about some of them.
    • when metering traffic independently of the cache statistics we found that we actually did not save any bandwidth worth mentioning. The statistics for the caches of course say different, but interface counters don't lie :-)
    • customer satisfaction goes down the drain. The reason is, even if there is no problem with the caches, people blame any problem with internet and web site availability on the caches - and thus on us.
    But, no, we have nothing in place to collect and evaluate logs. It's just much too much data right now to handle or even store it professionally. OTOH, given technological advances, this kind of storage and evalutaion probably will be trivial a few years from now. So the tendency is definitely dangerous.

    f.
  • by Alioth ( 221270 ) <no@spam> on Tuesday February 12, 2002 @06:41PM (#2996755) Journal
    Try iptraf. My data light on my cable modem blinks a lot (I'm on rr.com) and iptraf shows it's all ARP packets. Nothing to be suspicious of.

Mystics always hope that science will some day overtake them. -- Booth Tarkington

Working...