On Tue, 28 Apr 2009, Mike Cardwell wrote:

Alternatively, just stick the original email address in the TXT record. So in rbldnsd, you'd have a record like this:

98f22901b17b13d910456597685c1963 :127.0.0.1:the.r...@email.address

I was going to suggest that. Another thing to put in the TXT record might be a URL to evidence - e.g. (one of) the phishing emails containing that address as the contact point.

There's no advantage of sticking the email address in the TXT record rather than having a separate file, apart from keeping the data together.

Ease of access?

OTOH, if you're (not you, Mike) going to host this data, you'll probably have a webby interface for interactive lookups, and that might be the proper way to publish the evidence. If the email address typed into the web form hits, offer a link to view the evidence supporting the listing.

I don't think there's any reason to keep the email address or the evidence (suitably sanitized of the targeted victim's contact information) confidential.

--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org    FALaholic #11174     pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  Windows Genuine Advantage (WGA) means that now you use your
  computer at the sufferance of Microsoft Corporation. They can
  kill it remotely without your consent at any time for any reason;
  it also shuts down in sympathy when the servers at Microsoft crash.
-----------------------------------------------------------------------
 10 days until the 64th anniversary of VE day

Reply via email to