OT: Being bombarded by e-mail trojans

From: J.C. Wren <jcwren_at_jcwren.com>
Date: Fri Sep 19 16:58:53 2003

        That's not the point. The point is Verisign has broken the RFC by not
returning NXDOMAIN for the lookup of an invalid domain. Which means that all
the email systems that use reverse DNS lookup to validate a domain now think
every domain in existence is valid.

        It's fine if the person who owns the site does this, but these are
UNREGISTERED domains with non-existent IP addresses.

        Verisgn is fixing to get bitch-slapped in a hard way, and if we're *really*
lucky, they'll be driven out of business. This kind of crap is not in their
charter.

        --John

On Friday 19 September 2003 17:31 pm, Patrick Rigney wrote:
> > -----Original Message-----
> > From: cctalk-admin_at_classiccmp.org [mailto:cctalk-admin_at_classiccmp.org]On
> > Behalf Of Feldman, Robert
> > Sent: Friday, September 19, 2003 12:38 PM
> > To: cctalk_at_classiccmp.org
> > Subject: RE: OT: Being bombarded by e-mail trojans
> >
> >
> > More on Verisign:
> > They have embed a cookie-placing "web bug" in their page that can
> > relay back info
> >
> > http://www.theregister.co.uk/content/6/32926.html
>
> This is an old, common trick that many marketing companies have used for
> years to gather statistical information about their clients' web sites.
> You may not like it, but it isn't specific to VeriSign and isn't new news.
>
> If you're using one of the more recent browsers, you can befuddle this
> effort by turning off "third-party cookies".
>
> Patrick
Received on Fri Sep 19 2003 - 16:58:53 BST

This archive was generated by hypermail 2.3.0 : Fri Oct 10 2014 - 23:36:26 BST