[77967] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Phishing Name Server?

daemon@ATHENA.MIT.EDU (Eric Brunner-Williams in Portland )
Tue Feb 15 16:13:16 2005

To: "Fergie (Paul Ferguson)" <fergdawg@netzero.net>
Cc: nanog@merit.edu, brunner@nic-naa.net
In-Reply-To: Your message of "Tue, 15 Feb 2005 20:38:27 GMT."
             <20050215.123908.16941.55083@webmail29.lax.untd.com> 
Date: Tue, 15 Feb 2005 12:12:08 -0500
From: Eric Brunner-Williams in Portland Maine <brunner@nic-naa.net>
Errors-To: owner-nanog-outgoing@merit.edu


Howdy Paul,

rgid:id:domain
ENOM:048:SAFE-KEYNET.com
YESN:100:CITIFINANCUPDATE.com
YESN:100:WAMU4U.com
YESN:100:WAMUCORP

From prior experience I don't see anything novel. Yup. Real domains, and
possibly real certs.

From my last go around with Vint, <registrar_hat="on> if I were of a mind
to, I could sell bulk to even poor sniff-text buyers, cause I don't know
in advance they actually do smell poorly, and my RRA doesn't really make
that revenue enhancement a risk to my accreditation. No. I don't have a
mind to.</registrar_hat>

I wrote a longer piece on a related list recently, but I don't see much
in the way of effective recourse that isn't leased-host-in-cage-seizure
with the intangibles trivially rehosted.

Cheers,
Eric

home help back first fref pref prev next nref lref last post