(note, I'm guessing at the appropriate mailing list for cross-post)

Dennis Davis wrote:
> http://code.google.com/p/anti-phishing-email-reply/
> 
> is also useful as it attempts to detail the compromised accounts.
> Just block/quarantine email for those accounts.

Interesting ... this seems like it would be best served by DNS in a
manner similar to URIBLs ... does such an "emailBL" exist?

A lookup for 8h...@osu.edu (pulled from the live list) on emailBL
server "emailbl.org" could look like this:

$ host 8help.AT.osu.edu.emailbl.org
8help.AT.osu.edu.emailbl.org has address 127.0.0.1
$ host -t txt 8help.AT.osu.edu.emailbl.org
8help.AT.osu.edu.emailbl.org has descriptive text "20090310"
$

This maps 127.0.0.1 to type A, .2 to type B, etc.  Expirations, if
even necessary given the fact that the DNS entries should be updated
by the server, would be in the TXT records as illustrated above.

Since email addresses contain everything a valid domain can contain,
the user.AT.domain.tld (which is really user.at.domain.tld since
domains are not case-sensitive) could be ambiguous if the "user" or
the "domain" contains ".at." in itself, or whatever workaround we
create.  My proposed workaround is ".real-at." and an incremented
numeric suffix like ".real-at2." if needed.  As to pluses, just snip
them and their trailing data out.

8h...@osu.edu -> 8help.at.osu.edu
portal.ac.at....@live.com -> portal.ac.at.edu.real-at.live.com
123+...@789.xyz -> 123.at.789.xyz
abc.real-at....@ghi.jkl -> abc.real-at.def.real-at1.ghi.jkl
mno.real-at5....@stu.vwx -> mno.real-at5.pqr.real-at6.stu.vwx
y.real-at99...@a.at.real-at2.bc ->
    y.real-at4.z.real-at1000.a.at.real-at999.bc

This workaround should only find trouble when there are so many digits
that the overflow creates an invalid email address, which isn't a
realistic problem.

(Oh crap, is this a draft for an RFC?)

Reply via email to