Re: [mailop] Spammers mining SPF records (of all things)

2017-03-11 Thread Rich Kulawiec
On Sat, Mar 11, 2017 at 10:52:21AM +0800, ComKal Networks wrote:
> I have noticed the scrapping of whois and dns records
> appears to have increased dramatically over the past
> 2 years.

Both of those are poor sources of email addresses, though: the duplication
across many domains and the frequent use of role accounts means that even
someone with WHOIS data for 100M domains may only have 30M valid addresses
and half of those may be role accounts.  (Real data point pulled from
some info I have on hand: 790876 domains, 309907 unique email addresses,
about 125K of those using obfuscated registration, 3K "hostmaster" or
"postmaster", 4K "admin", so roughly 200K or 25% viable spam targets.)

I'm not saying they're not doing it: of course they are.  I've done
some manipulation of WHOIS and DNS records in order to track it, so
I've got proof in hand.  I'm sure others do as well.  I'm just saying
that it's not one of the more productive approaches.

---rsk

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] Spammers mining SPF records (of all things)

2017-03-11 Thread Dave Warren
On Sat, Mar 11, 2017, at 16:19, Rich Kulawiec wrote:
> On Sat, Mar 11, 2017 at 10:52:21AM +0800, ComKal Networks wrote:
> > I have noticed the scrapping of whois and dns records
> > appears to have increased dramatically over the past
> > 2 years.
> 
> Both of those are poor sources of email addresses, though: the
> duplication
> across many domains and the frequent use of role accounts means that even
> someone with WHOIS data for 100M domains may only have 30M valid
> addresses
> and half of those may be role accounts.  (Real data point pulled from
> some info I have on hand: 790876 domains, 309907 unique email addresses,
> about 125K of those using obfuscated registration, 3K "hostmaster" or
> "postmaster", 4K "admin", so roughly 200K or 25% viable spam targets.)
> 
> I'm not saying they're not doing it: of course they are.  I've done
> some manipulation of WHOIS and DNS records in order to track it, so
> I've got proof in hand.  I'm sure others do as well.  I'm just saying
> that it's not one of the more productive approaches.

In my very limited experiments there is far more WHOIS scraping than DNS
SOA scraping.

I get very little spam to an address that only exists as a SOA record,
far more to the WHOIS contacts, especially after registering a new
domain. I suspect ICANN's current process of requiring an address that
doesn't bounce makes WHOIS a richer source than it otherwise would be,
while SOA records are unlikely to be maintained by less technical users
(and are more likely to point to a provider who will simply disregard
the crap). 



___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


[mailop] Fwd: [pe...@piermont.com: [Cryptography] ADMIN: Anyone at Microsoft able to lend some assistance?]

2017-03-11 Thread Rich Kulawiec
Forwarded with permission.  Perry's cryptography mailing list is
an excellent resource and is very well-run, so any assistance
would benefit part of the 'net's crypto community.

Thanks,
---rsk


- Forwarded message from "Perry E. Metzger"  -

> Date: Fri, 10 Mar 2017 22:11:41 -0500
> From: "Perry E. Metzger" 
> To: cryptogra...@metzdowd.com
> Subject: [Cryptography] ADMIN: Anyone at Microsoft able to lend some
>   assistance?
> 
> Sorry for the administrative blast, but email to hotmail and outlook
> addresses is bouncing for the list, apparently because the ISP subnet
> that the list's SMTP server is on is being blacklisted by Microsoft.
> 
> If anyone at Microsoft could get in touch with me privately so that I
> can arrange to get this fixed, I'd appreciate it.
> 
> Perry
> -- 
> Perry E. Metzger  pe...@piermont.com

- End forwarded message -

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop