Redirecting DNS for Ads and Profit

Total Page:16

File Type:pdf, Size:1020Kb

Redirecting DNS for Ads and Profit Redirecting DNS for Ads and Profit Nicholas Weaver Christian Kreibich Vern Paxson ICSI ICSI ICSI & UC Berkeley [email protected] [email protected] [email protected] Abstract In the ICSI Netalyzr [8], our widely used network de- bugging and diagnostic tool,2 we have employed tests Internet Service Providers (ISPs) increasingly try to grow their for various forms of NXDOMAIN wildcarding since we profit margins by employing “error traffic monetization,” the started offering the service in mid-2009. In this paper we practice of redirecting customers whose DNS lookups fail to illuminate the DNS error monetization market by com- advertisement-oriented Web servers. A small industry of com- bining Netalyzr’s measurements with an analysis of the panies provides the associated machinery for ISPs to engage in this monetization, with the companies often participating in redirection pages collected between January 2010 and operating the service as well. We conduct a technical analysis May 2011, the location and content of the ad servers, of DNS error traffic monetization evident in 66,000 Netalyzr and the marketing material provided by the companies sessions, including fingerprinting derived from patterns seen involved. We identify ISPs employing DNS error mon- in the resulting ad landing pages. We identify major players etization, their choice of monetization provider (includ- in this industry, their ISP affiliations over time, and available ing shifts of provider and apparent in-house realization), user opt-out mechanisms. One monetization vendor, Paxfire, potential redirection policy customizations, as well as transgresses the error-based model and also reroutes all user availability of opt-out mechanisms. search queries to Bing, Yahoo, and (sometimes) Google via We also observe a more aggressive form of DNS- proxy servers controlled or provided by Paxfire. driven traffic manipulation, search-engine proxying. 1 Introduction One monetization provider, Paxfire [11], optionally sup- ports blanket redirection of users’ entire Web traffic for Error traffic monetization solutions leverage the con- www.bing.com, search.yahoo.com, and some- text provided by ISP customer traffic in order to rewrite times www.google.com. Paxfire routes Bing and Ya- protocol error messages to valid responses, redirecting hoo through its own servers while treatment of Google users to Web servers—ad servers, in the following—that depends on ISP policy, for which we observe three alter- show advertisements or search results hopefully of inter- natives: Google’s traffic remains unmolested; redirected est to the user. Examples of such protocol errors include through Paxfire’s servers; or redirected through Paxfire HTTP 404 status codes and, more commonly, DNS re- proxies located within the ISP’s network. sponses with return code 3 (Name Error), indicating that In x 2 we sketch the typical architecture used for error the looked-up name could not be resolved to an IP ad- traffic monetization. In x 3 we describe our methodol- dress. Rewriting of such DNS responses also goes by ogy, including DNS and HTTP data collection and redi- the name “NXDOMAIN wildcarding,” and is the focus rection page categorization. Next, we briefly summa- of this paper. rize the monetization providers and their modes of op- ISPs commonly deploy this controversial practice eration (x 4), along with the corresponding ISP relation- with the assistance of a monetization provider. These ships and monetization policies (x 5). We then discuss third parties supply the infrastructure needed to rewrite Paxfire’s search-engine proxying and which ISPs em- the name errors, and Web servers to redirect traffic to ploy this feature (x 6) before we conclude the paper (x 7). the ad servers. One provider claims that ISPs deploy- ing their solution will see profits of 1–3 USD per cus- 2 DNS Error Monetization tomer per year [14].1 ICANN has criticized this prac- tice due to its potential to cause both security and stabil- DNS-based error monetization tries to convert DNS ity problems, and called out the existence of third-party name errors into clicks on advertisements that are hope- involvement [5]. Security researchers have exploited fully relevant in the context of the user’s error-causing cross-site scripting vulnerabilities in two providers’ ad traffic. This conversion generally operates under the as- servers to demonstrate fairly sophisticated phishing and sumption that the error occurs in Web surfing, as the cookie theft attacks [7]. redirection of the otherwise failing traffic only succeeds for Web traffic. For other applications, say VoIP, email, 1We currently have no way of validating these profit claims. The same provider previously claimed 2–4 USD per customer per year. 2http://netalyzr.icsi.berkeley.edu Figure 1: The typical architecture employed by ISPs Figure 2: A typical search results page resulting from in tandem with monetization providers to facilitate DNS DNS wildcarding. error monetization. know which ISP sourced the traffic. On occasion mon- or FTP, the advertisement context does not exist and etization providers also locate redirection servers within redirection would imply serious privacy implications. the ISPs’ networks. ISPs and monetization providers most commonly im- Finally, the ad server may operate in-house at the ISP plement the redirection procedure using four compo- or at the monetization provider. It serves pages branded nents, shown in Figure1: a recursive DNS resolver, a to the ISP and commonly containing a combination of DNS response rewriter, a redirection Web server, and the “sponsored” search results (i.e., advertisements), actual ad server itself. Whether ISP or monetization provider search results derived from the attempted domain name owns, controls, or operates these components varies. and any keywords it can extract from the original URL, The ISP usually provides the recursive DNS resolver. and a link to opt-out instructions for the customer. Fig- When a user enters a URL into the browser or clicks ure2 shows an example search page Cox Communica- on a link (Ê), the browser sends a DNS request to this tions presents to its users. DNS resolver, which performs the actual DNS queries Monetization providers explicitly sell this service to on behalf of the customers and acts as a cache for DNS ISPs as a method to increase revenue, while ISPs ad- Ë replies ( ). When the name lookup fails, it forwards vertise it to their users as a navigational aid presenting the resulting NXDOMAIN error ( ) to the response search results and sometimes also providing a link cor- rewriter, which consists of a software module on the ex- recting common spelling mistakes (e.g. a link on the isting resolver [9] or an in-path device placed between page for yahoo.cmo pointing to yahoo.com). the recursive resolver and the user [11]. The rewriter Name error rewriting causes significant collateral inspects incoming DNS responses and depending on damage. Web browsers commonly rely on these errors its rule-set rewrites responses indicating name error re- to present browser-specific assistance, such as falling sponses to regular A-record responses containing the IP back to a web search. Wildcarding names that do not address of a redirection server (Í). The rule-set’s cov- begin with www assumes that a Web browser generated erage varies, and may trigger on all name errors, only the lookup. This may break non-HTTP protocols, dis- on those for names beginning with a www subdomain, rupt local services that rely on name suffixes in the lo- or exclude name errors only affecting the given subdo- cal DNS search path, and expose the user to cross-site main. When triggering, the redirection server redirects scripting vulnerabilities [7]. Therefore it is critical the the client to the ad server (Î), which provides the adver- ISPs provide effective opt-out mechanisms [2]. tisements and search results to the client (Ï). Typically, the monetization provider operates the redi- 3 Wildcard Detection and Redirection rection server, a simple web server whose only task is to examine the Host headers and URLs the Web browsers Fingerprinting request, and to generate an HTTP-level redirection re- Since mid-2009 we have provided the ICSI Netalyzr ser- sponse with a suitable URL pointing the browser at vice, a popular network diagnostic, measurement, and the ad server. According to our dataset, monetization debugging applet. Users around the world run it from providers typically assign a different redirection server their browsers in order to debug or clarify their network IP address to each ISP, allowing the redirection sever to connectivity. To date, we have collected 259,000 ses- sions from 193,000 distinct IP addresses located in vir- While other competitors may exist, the major ISPs in the tually every country of the world. For more details, we Netalyzr dataset do not employ them. refer the reader to our main paper on the service [8]. The differences between monetization providers lie Netalyzr includes tests to detect NXDOMAIN wild- mostly in the rule determining the set of names whose re- carding. We employ random string nonces to com- sulting name errors they rewrite, the implementation of pose nonexistent names in the following ways. Net- the redirection, and the opt-out mechanism. The rewrit- alyzr first uses the system’s DNS library to check if ing rule in practice either matches all name errors or only a name of the form www.nonce.com is wildcarded. those whose names begin in www, and thus reflects dif- If so, it explores variations to determine the policy ferent levels of collateral damage. The redirection mech- for non-Web names (nonce.com), alternative TLDs anism is also important, as the methods vary in reliabil- (nonce.org), common typos (www.yahoo.cmo), ity. The HTTP specification provides for clean redirec- subdomains (nonce.example.com), and DNS server tions using status code 302, which any HTTP client un- failures.
Recommended publications
  • Elastic Load Balancing Application Load Balancers Elastic Load Balancing Application Load Balancers
    Elastic Load Balancing Application Load Balancers Elastic Load Balancing Application Load Balancers Elastic Load Balancing: Application Load Balancers Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Elastic Load Balancing Application Load Balancers Table of Contents What is an Application Load Balancer? .................................................................................................. 1 Application Load Balancer components ......................................................................................... 1 Application Load Balancer overview ............................................................................................. 2 Benefits of migrating from a Classic Load Balancer ........................................................................ 2 Related services ......................................................................................................................... 3 Pricing ...................................................................................................................................... 3 Getting started .................................................................................................................................
    [Show full text]
  • TR-069 CPE WAN Management Protocol V1.1
    TECHNICAL REPORT TR-069 CPE WAN Management Protocol v1.1 Version: Issue 1 Amendment 2 Version Date: December 2007 © 2007 The Broadband Forum. All rights reserved. CPE WAN Management Protocol v1.1 TR-069 Issue 1 Amendment 2 Notice The Broadband Forum is a non-profit corporation organized to create guidelines for broadband network system development and deployment. This Technical Report has been approved by members of the Forum. This document is not binding on the Broadband Forum, any of its members, or any developer or service provider. This document is subject to change, but only with approval of members of the Forum. This document is provided "as is," with all faults. Any person holding a copyright in this document, or any portion thereof, disclaims to the fullest extent permitted by law any representation or warranty, express or implied, including, but not limited to, (a) any warranty of merchantability, fitness for a particular purpose, non-infringement, or title; (b) any warranty that the contents of the document are suitable for any purpose, even if that purpose is known to the copyright holder; (c) any warranty that the implementation of the contents of the documentation will not infringe any third party patents, copyrights, trademarks or other rights. This publication may incorporate intellectual property. The Broadband Forum encourages but does not require declaration of such intellectual property. For a list of declarations made by Broadband Forum member companies, please see www.broadband-forum.org. December 2007 © The Broadband
    [Show full text]
  • Alibaba Cloud
    AAlliibbaabbaa CClloouudd Alibaba Cloud SSerrvveer rL oLaoda Bda laBnaclearncer ListLeinsetresners Document Version: 20210922 Document Version: 20210922 Server Load Balancer List eners·Legal disclaimer Legal disclaimer Alibaba Cloud reminds you t o carefully read and fully underst and t he t erms and condit ions of t his legal disclaimer before you read or use t his document . If you have read or used t his document , it shall be deemed as your t ot al accept ance of t his legal disclaimer. 1. You shall download and obt ain t his document from t he Alibaba Cloud websit e or ot her Alibaba Cloud- aut horized channels, and use t his document for your own legal business act ivit ies only. The cont ent of t his document is considered confident ial informat ion of Alibaba Cloud. You shall st rict ly abide by t he confident ialit y obligat ions. No part of t his document shall be disclosed or provided t o any t hird part y for use wit hout t he prior writ t en consent of Alibaba Cloud. 2. No part of t his document shall be excerpt ed, t ranslat ed, reproduced, t ransmit t ed, or disseminat ed by any organizat ion, company or individual in any form or by any means wit hout t he prior writ t en consent of Alibaba Cloud. 3. The cont ent of t his document may be changed because of product version upgrade, adjust ment , or ot her reasons. Alibaba Cloud reserves t he right t o modify t he cont ent of t his document wit hout not ice and an updat ed version of t his document will be released t hrough Alibaba Cloud-aut horized channels from t ime t o t ime.
    [Show full text]
  • Memento: Time Travel for the Web
    Memento: Time Travel for the Web Herbert Van de Sompel Michael L. Nelson Robert Sanderson Los Alamos National Old Dominion University, Los Alamos National Laboratory, NM, USA Norfolk, VA, USA Laboratory, NM, USA [email protected] [email protected] [email protected] Lyudmila L. Balakireva Scott Ainsworth Harihar Shankar Los Alamos National Old Dominion University, Los Alamos National Laboratory, NM, USA Norfolk, VA, USA Laboratory, NM, USA [email protected] [email protected] [email protected] ABSTRACT 1. INTRODUCTION The Web is ephemeral. Many resources have representa- \The web does not work," my eleven year old son com- tions that change over time, and many of those represen- plained. After checking power and network connection, I tations are lost forever. A lucky few manage to reappear realized he meant something rather more subtle. The URI as archived resources that carry their own URIs. For ex- (http://stupidfunhouse.com) he had bookmarked the year ample, some content management systems maintain version before returned a page that didn't look like the original at pages that reflect a frozen prior state of their changing re- all, and definitely was not fun. He had just discovered that sources. Archives recurrently crawl the web to obtain the the web has a terrible memory. actual representation of resources, and subsequently make Let us restate the obvious: the Web is the most pervasive those available via special-purpose archived resources. In information environment in the history of humanity; hun- both cases, the archival copies have URIs that are protocol- dreds of millions of people1 access billions of resources2 using wise disconnected from the URI of the resource of which a variety of wired or wireless devices.
    [Show full text]
  • TR-069: CPE WAN Management Protocol
    TECHNICAL REPORT TR-069 CPE WAN Management Protocol Issue: Amendment 6 Corrigendum 1 Issue Date: June 2020 CWMP Version: 1.4 © Broadband Forum. All rights reserved. CPE WAN Management Protocol TR-069 Issue Amendment 6 Corrigendum 1 Notice The Broadband Forum is a non-profit corporation organized to create guidelines for broadband network system development and deployment. This Technical Report has been approved by members of the Forum. This Technical Report is subject to change. This Technical Report is owned and copyrighted by the Broadband Forum, and all rights are reserved. Portions of this Technical Report may be owned and/or copyrighted by Broadband Forum members. Intellectual Property Recipients of this Technical Report are requested to submit, with their comments, notification of any relevant patent claims or other intellectual property rights of which they may be aware that might be infringed by any implementation of this Technical Report, or use of any software code normatively referenced in this Technical Report, and to provide supporting documentation. Terms of Use 1. License Broadband Forum hereby grants you the right, without charge, on a perpetual, non- exclusive and worldwide basis, to utilize the Technical Report for the purpose of developing, making, having made, using, marketing, importing, offering to sell or license, and selling or licensing, and to otherwise distribute, products complying with the Technical Report, in all cases subject to the conditions set forth in this notice and any relevant patent and other intellectual property rights of third parties (which may include members of Broadband Forum). This license grant does not include the right to sublicense, modify or create derivative works based upon the Technical Report except to the extent this Technical Report includes text implementable in computer code, in which case your right under this License to create and modify derivative works is limited to modifying and creating derivative works of such code.
    [Show full text]
  • Flow-Based Compromise Detection Rick Hofstede Graduation Committee
    Flow-based Compromise Detection Rick Hofstede Graduation Committee Chairman: Prof. dr. P.M.G. Apers Promotor: Prof. dr. ir. A. Pras Co-promotor: Prof. Dr. rer. nat. G. Dreo Rodosek Members: dr. A. Sperotto University of Twente, The Netherlands Prof. dr. P.H. Hartel University of Twente, The Netherlands Delft University of Technology, The Netherlands TNO Cyber Security Lab, The Netherlands Prof. dr. ir. L.J.M. Nieuwenhuis University of Twente, The Netherlands Prof. dr. ir. C.T.A.M. de Laat University of Amsterdam, The Netherlands Prof. dr. ir. H.J. Bos VU University, The Netherlands Prof. Dr. rer. nat. U. Lechner Universit¨atder Bundeswehr M¨unchen, Germany Prof. Dr. rer. nat. W. Hommel Universit¨atder Bundeswehr M¨unchen, Germany Funding sources EU FP7 UniverSelf { #257513 EU FP7 FLAMINGO Network of Excellence { #318488 EU FP7 SALUS { #313296 EIT ICT Labs { #13132 (Smart Networks at the Edge) SURFnet GigaPort3 project for Next-Generation Networks CTIT Ph.D. thesis series no. 16-384 Centre for Telematics and Information Technology CTIT P.O. Box 217 7500 AE Enschede, The Netherlands ISBN: 978-90-365-4066-7 ISSN: 1381-3617 DOI: 10.3990/1.9789036540667 http://dx.doi.org/10.3990/1.9789036540667 Typeset with LATEX. Printed by Gildeprint, The Netherlands. Cover design by David Young. This thesis is licensed under a Creative Commons Attribution- NonCommercial-ShareAlike 3.0 Unported License. http://creativecommons.org/licenses/by-nc-sa/3.0/ This thesis has been printed on paper certified by FSC (Forest Stewarding Council). FLOW-BASED COMPROMISE DETECTION THESIS to obtain the degree of doctor at the University of Twente, on the authority of the Rector Magnificus, prof.
    [Show full text]
  • Kernel HTTPS/TCP/IP Stack for HTTP Ddos Mitigation
    Kernel HTTPS/TCP/IP stack for HTTP DDoS mitigation Alexander Krizhanovsky Tempesta Technologies, Inc. [email protected] Who am I? CEO & CTO at Tempesta Technologies (Seattle, WA) Developing Tempesta FW – open source Linux Application Delivery Controller (ADC) Custom software development in: ● high performance network traffic processing e.g. WAF mentioned in Gartner magic quadrant ● Databases e.g. MariaDB SQL System Versioning https://github.com/tempesta-tech/mariadb https://m17.mariadb.com/session/technical-preview-temporal- querying-asof HTTPS challenges HTTP(S) is a core protocol for the Internet (IoT, SaaS, Social networks etc.) HTTP(S) DDoS is tricky ● Asymmetric DDoS (compression, TLS handshake etc.) ● A lot of IP addresses with low traffic ● Machine learning is used for clustering ● How to filter out all HTTP requests with “Host: www.example.com:80”? ● "Lessons From Defending The Indefensible": https://www.youtube.com/watch?v=pCVTEx1ouyk TCP stream filter IPtables strings, BPF, XDP, NIC filters ● HTTP headers can cross packet bounds ● Scan large URI or Cookie for Host value? Web accelerator ● aren’t designed (suitable) for HTTP filtering IPS vs HTTP DDoS e.g. Suricata, has powerful rules syntax at L3-L7 Not a TCP end point => evasions are possible SSL/TLS SSL terminator is required => many data copies & context switches or double SSL processing (at IDS & at Web server) Double HTTP parsing Doesn’t improve Web server peroformance (mitigation != prevention) Interbreed an HTTP accelerator and a firewall TCP & TLS end point Very fast
    [Show full text]
  • Stopping DNS Rebinding Attacks in the Browser
    Stopping DNS Rebinding Attacks in the Browser Mohammadreza Hazhirpasand, Arash Ale Ebrahim and Oscar Nierstrasz University of Bern, Switzerland Keywords: DNS Rebinding, Browser Security, Web Security. Abstract: DNS rebinding attacks circumvent the same-origin policy of browsers and severely jeopardize user privacy. Although recent studies have shown that DNS rebinding attacks pose severe security threats to users, up to now little effort has been spent to assess the effectiveness of known solutions to prevent such attacks. We have carried out such a study to assess the protective measures proposed in prior studies. We found that none of the recommended techniques can entirely halt this attack due to various factors, e.g., network layer encryption renders packet inspection infeasible. Examining the previous problematic factors, we realize that a protective measure must be implemented at the browser-level. Therefore, we propose a defensive measure, a browser plug-in called Fail-rebind, that can detect, inform, and protect users in the event of an attack. Afterwards, we discuss the merits and limitations of our method compared to prior methods. Our findings suggest that Fail- rebind does not necessitate expert knowledge, works on different OSes and smart devices, and is independent of networks and location. 1 INTRODUCTION bypass firewalls, gain access to either internal ma- chines in the victim’s private network or the victim’s In a DNS rebinding attack, an attacker uses a custom resources, fetch sensitive resources, and compromise DNS server to spoof the IP address of the victim, and vulnerable internal machines. thus obtain read access to the victim’s server.
    [Show full text]
  • Webdav) Protocol: Microsoft Extensions
    [MS-WDVME]: Web Distributed Authoring and Versioning (WebDAV) Protocol: Microsoft Extensions Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation (“this documentation”) for protocols, file formats, data portability, computer languages, and standards support. Additionally, overview documents cover inter-protocol relationships and interactions. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you can make copies of it in order to develop implementations of the technologies that are described in this documentation and can distribute portions of it in your implementations that use these technologies or in your documentation as necessary to properly document the implementation. You can also distribute in your implementation, with or without modification, any schemas, IDLs, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications documentation. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that might cover your implementations of the technologies described in the Open Specifications documentation. Neither this notice nor Microsoft's delivery of this documentation grants any licenses under those patents or any other Microsoft patents. However, a given Open Specifications document might be covered by the Microsoft Open Specifications Promise or the Microsoft Community Promise. If you would prefer a written license, or if the technologies described in this documentation are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected].
    [Show full text]
  • A Comprehensive Formal Security Analysis of Oauth 2.0
    A Comprehensive Formal Security Analysis of OAuth 2.0∗ Daniel Fett Ralf Küsters University of Trier, Germany University of Trier, Germany [email protected] [email protected] Guido Schmitz University of Trier, Germany [email protected] The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on (SSO) proto- cols and also serves as the foundation for the new SSO standard OpenID Connect. Despite the popularity of OAuth, so far analysis efforts were mostly targeted at finding bugs in specific implementations and were based on formal models which abstract from many web features or did not provide a formal treat- ment at all. In this paper, we carry out the first extensive formal analysis of the OAuth 2.0 standard in an ex- pressive web model. Our analysis aims at establishing strong authorization, authentication, and session integrity guarantees, for which we provide formal definitions. In our formal analysis, all four OAuth grant types (authorization code grant, implicit grant, resource owner password credentials grant, and the client credentials grant) are covered. They may even run simultaneously in the same and different relying parties and identity providers, where malicious relying parties, identity providers, and browsers are considered as well. Our modeling and analysis of the OAuth 2.0 standard assumes that security recommendations and best practices are followed in order to avoid obvious and known attacks. When proving the security of OAuth in our model, we discovered four attacks which break the security of OAuth. The vulnerabilities can be exploited in practice and are present also in OpenID Connect.
    [Show full text]
  • Understanding Internet Censorship Policy: the Case of Greece
    Understanding Internet Censorship Policy: The Case of Greece Vasilis Ververis George Kargiotakis Arturo Filasto` Humboldt University Berlin The Tor Project Benjamin Fabian Afentoulis Alexandros Humboldt University Berlin Abstract the offending blog post via automatic RSS syndication. In February 2010 ISP Tellas/Wind Hellas blocked the The Greek government has recently initiated large scale Piratebay site [1]. In May 2012 the Greek Organiza- content blocking that leads to Internet censorship. In tion for Intellectual Property Collective Administration this article we analyze the techniques and policies used (AEPI) went to court against every Greek ISP demand- to block content of gambling websites in Greece and ing to censor Ellinadiko.com, a music sharing forum and present the implications of the detected underblock- Music-Bazaar.com, an MP3 webstore, both under the ac- ing and overblocking. We have collected results prob- cusation of infringing copyright laws [2]. The court or- ing eight major broadband and cellular Internet Service dered the ISPs to block the IP addresses of the referred Providers (ISPs) that are a representative sample of In- websites [23]. ternet usage in Greece, and investigate the methods and Later in September 2012 a citizen was arrested on infrastructure used to conduct the contentfiltering. The charges of malicious blasphemy and religious insult af- results of this study highlight issues related to how trans- ter posting a Facebook page that ridiculed a well-known parently Internetfiltering is implemented in democratic Greek Orthodox monk [12]. Following in January 2013, countries and could indicate the presence of unfair com- a politicianfiled a defamation lawsuit against a Greek petition between ISPs.
    [Show full text]
  • Oracle CRM on Demand REST API Developer's Guide
    CRM On Demand Oracle CRM On Demand REST API Developer’s Guide Release 32 June 2016 Copyright © 2005, 2016 Oracle. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error- free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are “commercial computer software” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications.
    [Show full text]