[130697] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New hijacking - Done via via good old-fashioned Identity Theft

daemon@ATHENA.MIT.EDU (Joe Greco)
Sat Oct 9 20:36:50 2010

From: Joe Greco <jgreco@ns.sol.net>
To: sven@cb3rob.net (Sven Olaf Kamphuis)
Date: Sat, 9 Oct 2010 19:36:33 -0500 (CDT)
In-Reply-To: <Pine.LNX.4.64.1010092342100.15211@a84-22-97-10.cb3rob.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> no, not the email address is the key, rather a unique string
> issued by the receiver to each potentuial sender.

In the system I describe, the email address *is* "a unique string
issued by the receiver to each potent[u]ial sender."  This has the
charming property of working very well with the existing e-mail
system and without having to have each correspondent manage a directory
of "key" words for each person they want to correspond with, updates to
that directory, etc.

> the email address does not stop spam originating from lets say, hacked 
> windows boxes.

No system does.  The point is to be able to tell who leaked/abused/etc
it, and more importantly, to be able to trivially terminate the sender's
ability to use the address, making that entry on their list completely
useless, or better yet, annoying them by clogging up their mail server,
if you do sufficiently BOFHish things.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.


home help back first fref pref prev next nref lref last post