In effect, a “special” DNS (domain name server) was intercepting *all* network traffic out of the EOP (Executive Office of the President).
~~~
This is above my pay grade, but I thought DNS servers resolved domains to IPs. If it was only intercepting DNS requests, than it would be more like spying on where traffic was being routed, and not necessarily logging any of the actual packet data. No?
If I’m right, that is plenty bad enough as it is. I’m not minimizing. I was just wondering. I think that Spoofing DNS services isn’t necessarily the same thing as a proxy that can log all of the data.
Ditto beyond my pay grade. I've been retired from IT for quite awhile so I am not current on current IT practices. That said, I would expect the WH would have it's own DNS servers as part of the infrastructure. Those servers might not have been directly located in the WH. If the DNS servers were directly on the main WH network trunk, anybody with access to that unclassified network could put a packet sniffer on the trunk.
This is above my pay grade, but I thought DNS servers resolved domains to IPs. If it was only intercepting DNS requests, than it would be more like spying on where traffic was being routed, and not necessarily logging any of the actual packet data. No?
If I’m right, that is plenty bad enough as it is. I’m not minimizing. I was just wondering. I think that Spoofing DNS services isn’t necessarily the same thing as a proxy that can log all of the data.
—
Not sure either. It might have been DNS cache snooping, which is basically seeing, as you mentioned, where requests are being directed. Sort of like the postman looking at the address of every letter you send.