A North Dakota judge issued a ruling in Sierra Corporate Design v. Ritz that has some pretty stunning implications about the use of the “host -l” command when accessing DNS records. In the judgment (which was prepared by the plaintiff’s counsel and sent to the judge), the use of the “host -l” command is tantamount to computer hijacking and hacking.
For the uninitiated, when using the “host -l” command on a DNS server, the user will receive a list (hence the “l”) of all information pertaining to the domain’s zone file, assuming it has not been protected. The same way WHOIS returns information on the owner of a domain, “host -l” returns information about hosts on that domain.
And although this was a civil matter, this ruling could (and we stress could, no need getting ahead of ourselves) lead to “unauthorized” “host-l” usage to be deemed a criminal act, per North Dakota’s computer crime statute.
Before even discussing the merits (or lack thereof) of the case in question, this judgment just strikes us as uninformed, bizarre and wrong. The “host -l” command when accessing DNS records does not reveal any information that is not set for public display. The plaintiff’s contention in this case was that the information obtained by “host -l,” non-routable IP addresses, host names and domain registrations was not meant to be publicly accessible. Because the defendant was able to procure this information and published it in various USENET groups, the plaintiff claims that the act was a violation of the computer crime statute.
Here’s the problem: “host -l” will only show information that the administrator has allowed to be public. Just because it is a DNS command that many computer users are unaware of does not mean that leaving information that one wishes to remain undisclosed is safe.