New owner of elite EM.com domain name appears to be Enterprise Holdings (not Exxon Mobil)!

Several weeks ago, I noticed that the elite 2-letter dot-com domain name EM.com had changed hands, with the “WHOIS” information of MarkMonitor’s stealth acquisition unit:

https://twitter.com/GeorgeKirikos/status/1697188222302859628

I’ve been monitoring that domain since that time, and it appears that Exxon Mobil is NOT the new owner of the domain name!

Instead, using the “dig” tool to view the TXT records for the EM.com domain name, I saw that they finally came alive very recently, with values for the SPF records (which relate to email) of:

“v=spf1 ip4:38.133.153.128/26 ip4:216.251.248.18 ip4:208.185.229.40/29 ip4:208.18” “5.235.45 ip4:139.131.76.33 ip4:207.166.92.11 ip4:207.166.95.11 ip4:74.209.251.0/” “24 ip4:199.255.192.0/22 ip4:199.127.232.0/22 ip4:54.240.0.0/18 ip4:213.139.100.4” “8 ip4:207.166.92.11 ip4:207.166.95.11 ip4:216.20.248.25 ip4:216.20.244.25 ip4:19” “9.102.164.25 ip4:35.163.201.1 ip4:35.166.146.0 ip4:35.167.47.63 ip4:18.219.199.1” “49 ip4:35.190.247.0/24 include:_spf.google.com include:sendgrid.net include:mail” “.zendesk.com include:spf.tmes.trendmicro.com ?all”

and the MX records (for delivery of email) have delivery of email to the server:

ehi1.in.tmes.trendmicro.com.

Using the “Reverse MX” tool at WhoisXMLAPI, I noticed that there were only 70 records, and they’re all related to Enterprise Holdings, which owns brands like Alamo, National, and of course Enterprise. According to their website, they’re the 9th largest private company in the USA, with $30 billion in revenue for 2022, and 80,000 global employees.

They own the 3-letter domain name “ehi.com” (which presumably is the “ehi” in “ehi1.in.tmes.trendmicro.com”!!), and it turns out that the SPF records for ehi.com (using the “dig” tool) are:

“v=spf1 ip4:38.133.153.128/26 ip4:216.251.248.18 ip4:208.185.229.40/29 ip4:208.185.235.45 ip4:139.131.76.33 ip4:207.166.92.11″ ” ip4:207.166.95.11 ip4:74.209.251.0/24 ip4:199.255.192.0/22 ip4:199.127.232.0/22 ip4:54.240.0.0/18″ ” ip4:213.139.100.48 ip4:207.166.92.11 ip4:207.166.95.11 ip4:216.20.248.25 ip4:216.20.244.25 ip4:199.102.164.25 ip4:35.163.201.1 ip4:35.166.146.0″ ” ip4:35.167.47.63 ip4:18.219.199.149 ip4:35.190.247.0/24 include:_spf.google.com include:sendgrid.net include:mail.zendesk.com include:spf.tmes.trendmicro.com -all”

which nearly matches those for “em.com”. [It appears someone botched the “copy and paste” of ehi.com’s records, as some values appear to have been split by mistake, e.g. it should be “include:mail.zendesk.com”, as in the one for ehi.com, but instead it was “include:mail” and “.zendesk.com”). Same mistake for some of the IP addresses, e.g “ip4:208.18” “5.235.45” should be “ip4:208.185.235.45”]

Thus, while we wait for a live website to provide absolute confirmation, we can conclude with a high degree of confidence that Enterprise Holdings is the new owner of the em.com domain name. Perhaps this will be used for a rebranding of the company (instead of “Holdings”, the “M” might stand for “Mobility” as they describe themselves as a leader in transportation and mobility).

Millions Of Sensitive US Military Emails Misdirected To Mali, Despite 2014 Warning From Me

In August 2014, I noticed a potential security vulnerability in relation to the .mil top-level domain, which is operated by the US military. As such, I reported the issue to CERT, describing the issue in sufficient detail that they could understand the problem.

Today, I learned via a tweet from Elliot Silver:

about the report in the Financial Times concerning millions of US military emails being misdirected, and quote-tweeted that I had reported the issue many years ago:

https://twitter.com/GeorgeKirikos/status/1680925062621216768

Elliot Silver later blogged about it, and it’s been reported on by many other news outlets.

You can read my August 6, 2014 CERT “Vulnerability Report” here (I had prudently saved a copy), and the confirmation was VRF#HYIXW4Z4. [The PDF is redacted, as it had contained my cell phone number, which I rarely disclose.]

Continue reading “Millions Of Sensitive US Military Emails Misdirected To Mali, Despite 2014 Warning From Me”

Another ICANN Sham Review of Public Comments

ICANN has posted their Public Comment Summary Report of the Proposed Renewal of the Registry Agreement for .NET. Once again, it is another sham review of the submissions of the public.

Not only do they dismiss comments and concerns relating to the changes in the RRA, which we wrote about extensively. ICANN staff went even further, and LIED about past comment submissions! At the bottom of page 13, they wrote:

Continue reading “Another ICANN Sham Review of Public Comments”

Our Comments to ICANN Opposing the Dot-NET Registry Agreement Renewal With Verisign

On April 19, 2023, I highlighted negative aspects of the proposed .NET Registry Agreement between ICANN and Verisign.

The public comment period ends on Thursday May 25, 2023 at 23:59 UTC (i.e. tomorrow), and I just submitted my company’s final comments.

I encourage others who care about the rights of registrants to do the same.

Others, including the Internet Commerce Association and TurnCommerce have submitted substantial comments. All of the public comments can be read here.

Red Alert: ICANN and Verisign Proposal Would Allow Any Government In The World To Seize Domain Names

ICANN, the organization that regulates global domain name policy, and Verisign, the abusive monopolist that operates the .COM and .NET top-level domains, have quietly proposed enormous changes to global domain name policy in their recently published “Proposed Renewal of the Registry Agreement for .NET”, which is now open for public comment.

Either by design, or unintentionally, they’ve proposed allowing any government in the world to cancel, redirect, or transfer to their control applicable domain names! This is an outrageous and dangerous proposal that must be stopped. While this proposal is currently only for .NET domain names, presumably they would want to also apply it to other extensions like .COM as those contracts come up for renewal.

Continue reading “Red Alert: ICANN and Verisign Proposal Would Allow Any Government In The World To Seize Domain Names”

Our January 30, 2023 Comments to ICANN Regarding IGO Issues and Preserving The Rights of Registrants

ICANN has a public comment period for the Final Report from the EPDP on Specific Curative Rights Protections for IGOs, which proposes to harm registrants’ rights, by making IGOs (intergovernmental organizations like the UN) exempt from the mutual jurisdiction clause of the UDRP/URS. This would mean that a domain owner’s rights to judicial review of an adverse UDRP/URS decision would be prejudiced.

Our comments can be read on the ICANN site, along with all the other public comment submissions. [including those of the Internet Commerce Association]

Continue reading “Our January 30, 2023 Comments to ICANN Regarding IGO Issues and Preserving The Rights of Registrants”

VPN.com v. George Dikian court case update of January 27, 2023

Konstantinos Zournas of OnlineDomain.com was the first to break the news concerning the lawsuit filed by VPN.com against “George Dikian”.

Today, both sides filed a “Joint Rule 26(f) Report” [PDF] which summarizes the case from the point of view of each side, and sets out scheduling going forward. Since it’s such a short document, it’s an excellent introduction to the dispute, for those who’ve not been following it from the beginning.

The entire docket can be followed via CourtListener.

Visualizing the Security Benefits of the Losing FOA for Domain Name Transfers

I’ve written extensively about the security implications of the “Losing FOA” step of domain name transfers. It’s the opportunity for registrants to “ACK” or “NACK” a pending transfer, before it completes. I wrote about this again yesterday,  and that post linked to all prior writings.

I wanted to give readers direct visual evidence of why the Losing FOA is so important as a security mechanism, so I intiated a transfer of a domain name from my company’s portfolio at Tucows/OpenSRS to GoDaddy. After I input the transfer code (currently called the “AuthInfo Code”, but it will be renamed the “Transfer Authorization Code” or “TAC”) at GoDaddy, Tucows/OpenSRS sent me (as registrant) an email, with a link to a page that would allow me to immediately approve the transfer (i.e. “ACK” it), or to reject the transfer (“NAK” it). Here’s a screenshot:

Example of OpenSRS Losing FOA page, allowing registrants to accept or reject an outgoing transfer request
Example of OpenSRS Losing FOA page, allowing registrants to accept or reject an outgoing transfer request

As you can clearly see, the page contains text saying:

The domain name listed above will be transferred to:

New Registrar
GoDaddy.com, Inc.

and gives me the opportunity to accept the transfer, or decline it (I’ve just left things in a pending state for now; I’ll perhaps “ACK” the transfer in a few days).

Continue reading “Visualizing the Security Benefits of the Losing FOA for Domain Name Transfers”

Response to ICANN Working Group Regarding Domain Name Transfer Issues

In August, I submitted extensive comments on behalf of my company to ICANN regarding proposed changes to domain name transfer policy.

I’d written multiple blog posts before then, warning about the negative ramifications should their recommendations be adopted. See herehereherehere and here for those past articles on the topic.

In September, I participated (as a member of the public, not as a member of the working group) in the public ICANN75 session on the topic (I wrote another blog post immediately before that session.). After that session, one of the ICANN working group members posted some thoughts on my proposals.

As I’ve yet to be invited to participate directly in that working group (which might correct the severe unbalanced and unrepresentative participation, where registrants’ views are not being taken seriously), I’ve written a public response to that email. You can read that response here (while it’s 20 pages long, it’s very generously spaced, so it shouldn’t take long to read and digest).

There is a lot wrong with this working group’s report and ongoing deliberations. The public deserves more than mere lip service during an ICANN75 meeting. We deserve active engagement throughout the remainder of the working group’s efforts, especially given the unbalanced participation at present.