Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

amborin

(16,631 posts)
Fri May 27, 2016, 12:20 AM May 2016

Did the Clinton Email Server Have an Internet-Based Printer?

http://krebsonsecurity.com/2016/05/did-the-clinton-email-server-have-an-internet-based-printer/

The Associated Press today points to a remarkable footnote in a recent State Department inspector general report on the Hillary Clinton email scandal: The mail was managed from the vanity domain “clintonemail.com.” But here’s a potentially more explosive finding: A review of the historic domain registration records for that domain indicates that whoever built the private email server for the Clintons also had the not-so-bright idea of connecting it to an Internet-based printer.

According to historic Internet address maps stored by San Mateo, Calif. based Farsight Security, among the handful of Internet addresses historically assigned to the domain “clintonemail.com” was the numeric address 24.187.234.188. The subdomain attached to that Internet address was….wait for it…. “printer.clintonemail.com“.

Interestingly, that domain was first noticed by Farsight in March 2015, the same month the scandal broke that during her tenure as United States Secretary of State Mrs. Clinton exclusively used her family’s private email server for official communications.

I should emphasize here that it’s unclear whether an Internet-capable printer was ever connected to printer.clintonemail.com. Nevertheless, it appears someone set it up to work that way.

Ronald Guilmette, a private security researcher in California who prompted me to look up this information, said printing things to an Internet-based printer set up this way might have made the printer data vulnerable to eavesdropping.

“Whoever set up their home network like that was a security idiot, and it’s a dumb thing to do,” Guilmette said. “Not just because any idiot on the Internet can just waste all your toner. Some of these printers have simple vulnerabilities that leave them easy to be hacked into.”

More importantly, any emails or other documents that the Clintons decided to print would be sent out over the Internet — however briefly — before going back to the printer. And that data may have been sniffable by other customers of the same ISP, Guilmette said.
19 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Did the Clinton Email Server Have an Internet-Based Printer? (Original Post) amborin May 2016 OP
Yep. Read that. Very interesting. Barack_America May 2016 #1
Remote Desktop was enabled at some point too. Waiting For Everyman May 2016 #2
Thanks for that tip dreamnightwind May 2016 #4
didn't realize that! amborin May 2016 #18
Printer data my ass, even with WPA-2 networks, you can hack into a wireless printer and go upstream. TheBlackAdder May 2016 #3
This is why we have nothing sensitive nadinbrzezinski May 2016 #6
cert-based 802.1x is a good way to do wireless if you need to, but obviously her setup DisgustipatedinCA May 2016 #8
Even these networks are insecure. Proper enterprise EAP and 802.1x are still vulnerable. TheBlackAdder May 2016 #12
That is what I assume. nadinbrzezinski May 2016 #13
Let me guess...it was not part of a secured network nadinbrzezinski May 2016 #5
At this point, it looks like nothing at clintonemail.com was part of a secured network. (nt) jeff47 May 2016 #7
I know my home network has holes nadinbrzezinski May 2016 #9
Oh ffs, worse and worser Arazi May 2016 #10
bookmarked. silvershadow May 2016 #11
kick nt grasswire May 2016 #14
The Clinton's probably would like to strangle Pagliano. JudyM May 2016 #15
Pagliano's a young guy. Wonder who he works for now Arazi May 2016 #16
Likely they did have a printer Internet accessible Paulie May 2016 #17
that's a very interesting question Cheese Sandwich May 2016 #19

Waiting For Everyman

(9,385 posts)
2. Remote Desktop was enabled at some point too.
Fri May 27, 2016, 12:37 AM
May 2016

On at least one device on the system, for how long wasn't stated. When I read that I was gobsmacked.

I'm not super savvy, but even I know that's a wide open door security risk, even for private individuals with nothing special to secure.

dreamnightwind

(4,775 posts)
4. Thanks for that tip
Fri May 27, 2016, 12:48 AM
May 2016

I knew about this (not to enable it), but checked my settings just in case. To my surprise, it was enabled! Disabled now.

TheBlackAdder

(28,205 posts)
3. Printer data my ass, even with WPA-2 networks, you can hack into a wireless printer and go upstream.
Fri May 27, 2016, 12:43 AM
May 2016

.


Internet connected printers are a severe network exposure. But, let's not forget the wireless home networks too.


If a person sets up a cantana, or other directional wireless antenna, you greatly extend the range someone can hack. Those WPA-2 encryptions create a false sense of security, since cracking software on a linux laptop will probably break that network within hours. Some neighborhood kid could tap into that easily. The only secure way is dedicated cable connections. Printers and other embedded devices pose risks for networks.


People even think that their home cordless phones are secure. While many use spread spectrum and other technologies, several of the phones will also send unencrypted side signals to keep the phone from cutting out or dropping the call. Many of these can be hacked too.


A 3-foot boom mast, on any scanner or interceptor, can receive home cordless signals from over 1 mile away. That's a 1 mile radius that people can work on cracking the calls.


.

 

nadinbrzezinski

(154,021 posts)
6. This is why we have nothing sensitive
Fri May 27, 2016, 12:52 AM
May 2016

Like financials, in the computer. Old fashioned pen and notebook log.

 

DisgustipatedinCA

(12,530 posts)
8. cert-based 802.1x is a good way to do wireless if you need to, but obviously her setup
Fri May 27, 2016, 12:53 AM
May 2016

was appalling, based on what we know so far.

TheBlackAdder

(28,205 posts)
12. Even these networks are insecure. Proper enterprise EAP and 802.1x are still vulnerable.
Fri May 27, 2016, 01:10 AM
May 2016

.


The best wireless network is about secure as an Internet cloud network.

The question isn't if your data gets hacked, but when.


.

 

nadinbrzezinski

(154,021 posts)
9. I know my home network has holes
Fri May 27, 2016, 12:54 AM
May 2016

That is why we have the financials off the network. No quicken fir me

JudyM

(29,250 posts)
15. The Clinton's probably would like to strangle Pagliano.
Fri May 27, 2016, 01:49 AM
May 2016

I guess when you're doing some unsavory things you can't take the risk of hiring a top tier IT firm.

Arazi

(6,829 posts)
16. Pagliano's a young guy. Wonder who he works for now
Fri May 27, 2016, 06:41 AM
May 2016

Have the Clintons protected him or is he out in the cold with a very public hole blown in his resume a mile deep

Paulie

(8,462 posts)
17. Likely they did have a printer Internet accessible
Fri May 27, 2016, 08:19 AM
May 2016

looking up the historical records, the authoritative DNS servers haven't changed since 2009 for the clintonemail.com domain. So printer would have had to be manually added as an A record on Network Solutions dns (they are also the registrar). You wouldn't do that unless you specifically wanted that name to resolve.

24.187.234.186 rosencrans.dyndns.ws
24.187.234.187 wjcoffice.com
24.187.234.187 mail.clintonemail.com
24.187.234.187 mail.presidentclinton.com
24.187.234.188 printer.clintonemail.com
24.187.234.188 printer.presidentclinton.com
24.187.234.190 sslvpn.clintonemail.com

Wonder if there are any historical nmap scans from say late 2009, what actually enumerated on that ip prefix...

Latest Discussions»Retired Forums»2016 Postmortem»Did the Clinton Email Ser...