Security Concerns
Supplying such detailed information as e-mail addresses and full names was considered acceptable and convenient in the early days of networking, but later was considered questionable for privacy and security reasons. Finger information has been frequently used by hackers as a way to initiate a social engineering attack on a company's computer security system. By using a finger client to get a list of a company's employee names, email addresses, phone numbers, and so on, a cracker can telephone or email someone at a company requesting information while posing as another employee. The finger daemon has also had several exploitable security holes which crackers have used to break into systems. The Morris worm, in 1988, exploited an overflow vulnerability in fingerd
(among others) to spread. The finger protocol is also incompatible with Network Address Translation (NAT) from the private network address ranges (e.g. 192.168.0.0/16) that are used by the majority of home and office workstations that connect to the Internet through routers or firewalls.
For these reasons, while finger was widely used during the early days of Internet, by the late 1990s the vast majority of sites on the internet no longer offered the service.
Read more about this topic: Finger Protocol
Famous quotes containing the words security and/or concerns:
“A well-regulated militia being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.”
—U.S. Constitution, Second Amendment.
“Our ideal ... must be a language as clear as glassthe person looking out of the window knows there is glass there, but he is not concerned with it; what concerns him is what comes through from the other side.”
—Elizabeth Bowen (18991973)