PDA

View Full Version : Akamai and your cookies



realism
03-12-2014, 12:29 AM
After reviewing the multitude of forum posts on Akamai, their EULA, tin foil hat postings, and Turbine's reassurance that our data is safe and not able to be shared, I read some non DDO forum posts on Akamai. What I found prompted me to do some digging into my system.

I managed to locate Akamai in four separate locations. The first file folder was found in AppData Local, it contained the netsession installations that are used for DDO. The other 3 were located deeper in the local appdata system files under my main browser's #sharedObjects folder. The end folder name for these are #cdncache3-a.akamaihd.net cdncache3-a.akamaihd.net #fbstatic-a.akamaihd.net

each of the three folders contained a .sol file, which for those of you who don't know are cookie files. I opened these files .sol files with a cookie viewing software to see what it contained. Just in one .sol file it listed 341 cookie files that after skimming through the list reflecting my entire browser history dating back to the last time I cleared my cookies cache in September of last year. What I find further interesting is that by opening a specific Akamai file in notepad to see if any coding like dat files are in it, I am shown a settings line that sets something (not sure what) to 'allow' 'always' and '-klimit'
I am not a super guru of coding and files, but this seems to indicate that something is set to always allow with no limit.

I can certainly understand the topical folder for the netuser session for the purpose of using DDO, but I do not understand why I am finding hidden akamai files with cookie attachments under my browser hood that have lines suggesting something is always being shared.

I can't say if Turbine is aware of this or not, or even if it is even related. Given the devil of a time it took me to dig up the information I would assume that it is something Turbine is not aware of, or it is something that is not related.

In either case, I intent to dig some more and see if more information can be gained and if there is a way to explicitly block Akamai from anything other than DDO usage. For me, the red flag is up and I am suspicious of this new third party resource. Other things were found in connection to akamai, but I will let you google that for yourself.

Bob_of_QF
03-12-2014, 01:02 PM
The Akamai software is truly insidious malware.

I elected to use a 3rd party launcher (DDO-ML) and then proceeded to uninstall Akamai.

The "uninstall" trundled a bit, and then declared it was complete.

About the **only** thing it did, was remove the little Akamai app from Control Panel (an app which did exactly **nothing**-- it lied. It stated the service was stopped, when in fact, it was running)

So "uninstall complete"? Yeah, right-- a check of the Akamai install folder? Still there.

A scan of Windows Registry? Many-many instances of Akamai.

The worst of all? A check of running processes in Windows Task Manager? Akamai client was still running-- two instances-- even after an uninstall!

This is beyond malware-- this is bordering on virus-like behavior. How many people did not double-check, as I did?

So, nuke from Task manager. Manually delete the folder & files.

Then a registry scan-and-purge.

Finally? Reboot...

... meh.

Flavilandile
03-12-2014, 02:16 PM
After reviewing the multitude of forum posts on Akamai, their EULA, tin foil hat postings, and Turbine's reassurance that our data is safe and not able to be shared, I read some non DDO forum posts on Akamai. What I found prompted me to do some digging into my system.

I managed to locate Akamai in four separate locations. The first file folder was found in AppData Local, it contained the netsession installations that are used for DDO. The other 3 were located deeper in the local appdata system files under my main browser's #sharedObjects folder. The end folder name for these are #cdncache3-a.akamaihd.net cdncache3-a.akamaihd.net #fbstatic-a.akamaihd.net

each of the three folders contained a .sol file, which for those of you who don't know are cookie files. I opened these files .sol files with a cookie viewing software to see what it contained. Just in one .sol file it listed 341 cookie files that after skimming through the list reflecting my entire browser history dating back to the last time I cleared my cookies cache in September of last year. What I find further interesting is that by opening a specific Akamai file in notepad to see if any coding like dat files are in it, I am shown a settings line that sets something (not sure what) to 'allow' 'always' and '-klimit'
I am not a super guru of coding and files, but this seems to indicate that something is set to always allow with no limit.

I can certainly understand the topical folder for the netuser session for the purpose of using DDO, but I do not understand why I am finding hidden akamai files with cookie attachments under my browser hood that have lines suggesting something is always being shared.

I can't say if Turbine is aware of this or not, or even if it is even related. Given the devil of a time it took me to dig up the information I would assume that it is something Turbine is not aware of, or it is something that is not related.

In either case, I intent to dig some more and see if more information can be gained and if there is a way to explicitly block Akamai from anything other than DDO usage. For me, the red flag is up and I am suspicious of this new third party resource. Other things were found in connection to akamai, but I will let you google that for yourself.

There's perfectly legit ways for those cookies to end up there....
If you ever browse Microsoft website you will end up on an Akamai server.
If you ever browse Cisco website you will end up on an Akamai server.
If you ever browse Sony websites you will end up on an Akamai server.
I could probably make a long list that way...
And all those website are going to store totally legit cookies.