Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-09 Thread Joe Greco
> no, not the email address is the key, rather a unique string > issued by the receiver to each potentuial sender. In the system I describe, the email address *is* "a unique string issued by the receiver to each potent[u]ial sender." This has the charming property of working very well with the ex

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-09 Thread Sven Olaf Kamphuis
no, not the email address is the key, rather a unique string issued by the receiver to each potentuial sender. the email address does not stop spam originating from lets say, hacked windows boxes. -- Greetings, Sven Olaf Kamphuis, CB3ROB Ltd. & Co. KG

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-08 Thread Joe Greco
> On 10/07/2010 04:16 PM, Sven Olaf Kamphuis wrote: > > you just give contacts for the passwords with which you have received > > a new one. > > Hi Sven/others, > > This very much sounds like TMDA: > > http://tmda.net/ > http://en.wikipedia.org/wiki/Tagged_Message_Delivery_Agent > > Where by ea

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-08 Thread Robert Bonomi
> From nanog-bounces+bonomi=mail.r-bonomi@nanog.org Thu Oct 7 23:37:29 > 2010 > Date: Fri, 08 Oct 2010 15:38:12 +1100 > From: Ben McGinnes > To: Leen Besselink > Subject: Re: New hijacking - Done via via good old-fashioned Identity Theft > Cc: nanog@nanog.org > &

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Ben McGinnes
On 8/10/10 10:00 AM, Leen Besselink wrote: > > k...@domain.tld for when you have a personal domain > key-u...@domain.tld for when you have a server which understand address > extensions Actually I think it's user+...@domain.tld for the second one. At least that's what I've seen for Postfix. Not

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Leen Besselink
On 10/07/2010 04:16 PM, Sven Olaf Kamphuis wrote: > you just give contacts for the passwords with which you have received > a new one. > Hi Sven/others, This very much sounds like TMDA: http://tmda.net/ http://en.wikipedia.org/wiki/Tagged_Message_Delivery_Agent Where by each person that needs t

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Sven Olaf Kamphuis
When was email *ever* expected to be real-time? If you need real time, use IM (the clue is in the "I"), or pick up the phone. if you simply run the smtpd on port 25 of the little boxy thing with the blinking lights and the big shiney apple on it on your desk (which has for most applications

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Tim Franklin
> If i have to wait for 20 minutes for an email, i've started skype > already.. You know what, why don't we simply turn the smtp servers > -off- and use skype and msn for everything... saves electricity :P By that argument, why don't we turn off the Internet and use SMS for everything? > It may

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Nick Hilliard
On 07/10/2010 13:10, Sven Olaf Kamphuis wrote: You know what, why don't we simply turn the smtp servers -off- This is an excellent idea. I invite you to do everyone a favour and turn yours off first. Nick

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Valdis . Kletnieks
On Thu, 07 Oct 2010 14:16:00 -, Sven Olaf Kamphuis said: > you just give contacts for the passwords with which you have received a > new one. > > each potential person that can send email to your email address, gets a > unique password from you. You missed the point. How does perso...@gmai

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Sven Olaf Kamphuis
you just give contacts for the passwords with which you have received a new one. each potential person that can send email to your email address, gets a unique password from you. sending person/maillist 1 gets password abcdefg to send to b...@example.com (no matter from which email address)

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Valdis . Kletnieks
On Thu, 07 Oct 2010 12:10:37 -, Sven Olaf Kamphuis said: > If what you're asking under point c is "what happens if a system that > contains such a password for your email address gets compromised" the > answer is simple, you remove that specific password from your approved > passwords list

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-07 Thread Sven Olaf Kamphuis
we have run a simular system for a while, the problem is still with mailinglists and online shops (by lack of a standardised field the password was put anywhere in the email, all email not containing a password was rejected with a message to call sales) a) you print unique passwords on each

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Rich Kulawiec
On Wed, Oct 06, 2010 at 10:14:27PM +, Sven Olaf Kamphuis wrote: > (keep in mind, each sender gets a unique password from the receiver, > this can be stored in the address book along with the email address > itself). I'd like to see the I-D which explains how this is going to work, with particu

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Ben McGinnes
On 7/10/10 6:28 AM, Eric Brunner-Williams wrote: > On 10/6/10 10:34 AM, Owen DeLong wrote: >> >> Number resources are not and should not be associated with domain >> resources at the policy level. This would make absolutely no sense >> whatsoever. > > hmm. ... "are not" ... so the event complained

RE: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread George Bonser
> -Original Message- > From: Heath Jones > Sent: Wednesday, October 06, 2010 3:24 PM > To: nanog@nanog.org > Subject: Re: New hijacking - Done via via good old-fashioned Identity > Theft > > Wouldn't it have to be illegal before punishments could be determi

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Sven Olaf Kamphuis
- Exactly when and where did RIR whois databases gain any legal status as an authoritive source of information, rather than just an internal tool for network operators? (as far as i see, the rirs are legally nothing more than a collective of network operators, not an authority in any way). - E

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Heath Jones
>>1) Is spamming from within the US criminal activity? > > Sadly, it appears not. > > In many cases it is however actionable.  (And in other cases involving > actual criminal activity, e.g. as prohibited by 18 USC 1030, `Fraud and > related activity in connection with computers', it may, I think, b

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Ronald F. Guilmette
In message , Heath Jones wrote: >> Certainly, fine folks at Reliance Globalcom Services, Inc. could tell >> us who is paying them to connect these hijacked blocks to their network, >> but I rather doubt that they are actually going to come clean and do >> that. > >Ron, I haven't been following

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Eric Brunner-Williams
On 10/6/10 10:34 AM, Owen DeLong wrote: On Oct 6, 2010, at 6:35 AM, Ben McGinnes wrote: On 7/10/10 12:08 AM, Eric Brunner-Williams wrote: so ... should domains associated with asn(s) and addr block allocations be subject to some expiry policy other than "it goes into the drop pool and one of

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Owen DeLong
On Oct 6, 2010, at 6:35 AM, Ben McGinnes wrote: > On 7/10/10 12:08 AM, Eric Brunner-Williams wrote: >> so ... should domains associated with asn(s) and addr block allocations >> be subject to some expiry policy other than "it goes into the drop pool >> and one of {enom,pool,...} acquire it (and t

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Ben McGinnes
On 7/10/10 12:08 AM, Eric Brunner-Williams wrote: > so ... should domains associated with asn(s) and addr block allocations > be subject to some expiry policy other than "it goes into the drop pool > and one of {enom,pool,...} acquire it (and the associated non-traffic > assets) for any interested

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Eric Brunner-Williams
so ... should domains associated with asn(s) and addr block allocations be subject to some expiry policy other than "it goes into the drop pool and one of {enom,pool,...} acquire it (and the associated non-traffic assets) for any interested party at $50 per /24"? Eric

Re: New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Heath Jones
> Certainly, fine folks at Reliance Globalcom Services, Inc. could tell > us who is paying them to connect these hijacked blocks to their network, > but I rather doubt that they are actually going to come clean and do > that. Ron, I haven't been following this anti-spam stuff much since it went po

New hijacking - Done via via good old-fashioned Identity Theft

2010-10-06 Thread Ronald F. Guilmette
[[ Note: There are three more apparently hijacked blocks that are related to the 75 specific blocks I am reporting on herein. I'll be reporting on those other three blocks later on, but right now I just want to keep it simple and report on just the ones relating to directnet.net. ]] S