Tracksters

From ConShell
Jump to navigation Jump to search

There are numerous marketing companies who will track you by your Internet usage (aka click streams), web bugs, etc. Doubleclick is probably the most notorious example. (Now owned by Google... are you worried yet?)

I call them "Tracksters".

The host or domain names used by them can be easily determined by browsing your cookies after surfing the web for a while.

Shown below are some real-world domains found in my cookies file.

A condensed & clean version of this list is at http://bit.ly/18fyINq

Host/Domain             Cookie name     Notes
data.coremetrics.com    CoreID6 
doubleclick.net         id
.ehg-etoys.hitbox.com   DM541004C4EZV6  }
.ehg-hasbro.hitbox.com  DM550217FKDEV6  } A pattern emerges!
.ehg-f5.hitbox.com      DM53123059DMV6  } others are oreilly, techtarget vmware
fastclick.net           rt
hitbox.com              CTG
ice.112.2o7.net         s_vi            } [1]
kanoodle.com            (multiple)
kontera.com             (multiple)
media.adrevolver.com    (multiple)
mediaplex.com           (multiple)
msnportal.112.2o7.net   s_vi            } [1]
m.webtrends.com         ACOOKIE
networksolutions.112.2o7.net  s_vi
optimize.indieclick.net MAXID           } aka Openads
overture.com            (multiple)
pa.penny-arcade.com     phpAds_id
partner2profit.com      (multiple)
paypal.112.2o7.net      s_vi             } [1]
perf.overture.com       SYSTEM_USER_ID   } another overture.com
phg.hitbox.com          (multiple)       } all start with WR54122...
quantserve.com          uid
qnsr.com                (multiple)       } aka QuinStreet Media
rad.msn.com             (multiple)       } Advertising Delivery System (ADS)
rotator.adjuggler.com   (multiple)
rotator.juggler.inetinteractive.com (multiple)
searchmarketing.com     SM
serving-sys.com         (multiple)
sixapart.adbureau.net   (multiple)       } probably *.adbureau.net
specificclick.net       (multiple)
statcounter.com         (multiple)
statse.webtrendslive.com (multiple)
t4.trackalyzer.com       trackalyzer
tacoda.net               (multiple)      } "behavioral targeting", yikes
trafficmp.com            (multiple)
tribalfusion.com         ANON_ID         } ANON == ANONYMOUS? yea, right
turn.com                 (multiple)
web.checkm8.com          (multiple)
rocketprofit.com         (multiple)      } touts "Detailed, state of the art tracking capability"

See Also

Notes

Most cases, just blackhole the SLD, e.g. coremetrics.com instead of data.coremetrics.com.

[1] See http://en.wikipedia.org/wiki/Omniture & http://www.omniture.com/privacy/2o7

There are LOTS of other references and resources for this type of information.

blackhole-gen script

I run this on my FreeBSD name servers.

Step 1. Create the /var/named/etc/namedb/master/blackhole.zone file

$TTL    1d
@                        IN SOA @ root (
                                        2006051201  ; serial
                                        1H          ; refresh
                                        15M         ; retry
                                        4W          ; expiry
                                        5M )        ; negativeTTL

                        1D IN NS        ns1.foster.dmz.
                        1D IN NS        ns2.foster.dmz.
                        1D IN A         127.0.0.2
*                       1D IN A         127.0.0.2

Note: You should change the NS lines to match your OWN authoritative name servers.

Step 2. Add this line to named.conf:

include "named.conf.blackhole";

Step 3. Put this script in /var/named/etc/namedb/blackhole-regen

#!/bin/sh
# Warning, this script probably only works well on FreeBSD 5.5 or newer
# Stick it in cron to run once daily or so, as root
# Regenerate named.conf.blackhole file from updates "targets"
# file maintained by mark.foster
# also reloads named.
cd /var/named/etc/namedb/

mv -f named.conf.blackhole named.conf.blackhole.old
fetch http://mark.foster.cc/trackers

for d in `cat trackers`; do
  cat <<EOF >> named.conf.blackhole
zone "$d" { type master; file "master/blackhole.zone"; };
EOF
done

/etc/rc.d/named reload


Step 4. Run the script, and restart your name servers

/var/named/etc/namedb/blackhole-regen
/etc/rc.d/named restart

Step 5. Optional but recommended, add crontab entry in /etc/crontab so this runs daily

0  12  *  *  *  root  /var/named/etc/namedb/blackhole-regen