![]() |
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
#61
|
|||
|
|||
![]()
On Mon, 5 Jul 2004 00:19:01 -0700, "Peter Duniho"
wrote: You can use tracert to get a pretty good idea of how many servers also get to look at the data. It's almost never just your server and the recipient's server. Nearly all of the time, a spammer's server is not in the middle. But there's no way to guarantee that one's not, and it DOES happen that one is now and then. Perhaps the term router and server have been misapplied here? Traceroute shows you how many devices are routing your data packet between your PC and some destination. Some of those are firewalls, some of those are routers, some of those are combination firewall/routers. Unless specially configured, they do not look beyond the IP datagram header (IP it came from, IP it's going to) fields, and act in function like an envelope going through the mail. Even though your letter goes through a bunch of post office facilities and trucks, some of which might do some cursory examination to see if there's anything hazardous inside the envelope, they don't look at the contents of the envelope. Is the contention that spammers are gathering email addresses through the routine opening of email *content* that is somehow being re-routed through a link they own in the path between you and the person you're communicating with? Or are we taking about them somehow hijacking MX records to open, read, and then forward along routine email going from place to place? When sending an email you (assuming Windows and a POP derivative like Outlook or Eudora, not Unix with sendmail and PINE etc) open a connection from your PC to your outbound mail server. That server looks at the email destination address(es) and then creates an envelope, addressed to the destination party's mail server (post office). Your outbound server then opens a connection directly to that destination's server. The path your envelope takes between your server and that server depends on who your ISP buys connections to and whatever routing rules they have applied for outbound traffic. The envelope is not normally opened between those two points by any "hop" shown by traceroute. By the time you get up to things like qwest.net, level3.net, bbnplanet.net, etc you're talking OC192 fiber-optic connections (about 10gb/s if memory serves) and to attempt packet sniffing on that kind of connection (which carries *all* traffic, not just email - newsgroups, web, games, etc) just to find out someone's to: or bcc: list would be so CPU intensive that you wouldn't be able to effectively use the bandwidth you're paying rediculous amounts of money to the phone company for. |
#62
|
|||
|
|||
![]()
" Peter Clark wrote in message
... Perhaps the term router and server have been misapplied here? This not being a technical newsgroup (and I guess, this thread really doesn't belong, so I'll stop after this), I am using the term "server" simply to describe a physical node within the Internet that helps pass along traffic. "Router" would be a more specific term, of course. I consider a "router" a type of "server". [...] Is the contention that spammers are gathering email addresses through the routine opening of email *content* that is somehow being re-routed through a link they own in the path between you and the person you're communicating with? Or are we taking about them somehow hijacking MX records to open, read, and then forward along routine email going from place to place? The former. And I never said it was commonplace. My original reply was simply to refute the claim that using the bcc field in any way hides email addresses from any interested party that would otherwise be able to see the rest of the email message. As far as it not being feasible to inspect Internet traffic as it passes through your routers, that's just silly. It would require only a completely insignificant amount of extra overhead to detect traffic containing email, and then to extract email addresses from that traffic. In any case, if you're a spammer who has somehow arranged to be involved in routing Internet traffic, why would you care if there was a little extra overhead? That would be the whole reason for putting yourself in that position in the first place. Do not underestimate the motivation of spammers to find new, valid email addresses, or the motivation of people who sell email addresses to spammers to do the same. I think it's pretty funny that the big debate here has been the question of whether it's possible to pull email addresses from email as it's routed across the Internet (which, IMHO, is obviously possible...ANY traffic can be monitored by a party with enough interest and motivation), while NO ONE ELSE has bothered to comment on whether using the bcc field actually hides email addresses from those who would pull email addresses from email as it's routed across the Internet. Classic. Pete |
#63
|
|||
|
|||
![]() "Jay Honeck" wrote in message news:XzVFc.23297$XM6.1268@attbi_s53... ! (And, BTW: It's ALWAYS feasible to complain about lousy service... ;-) -- As a former AOL user, I think complaining to them is about as effective as complaining to eBay, or your elected representative, or the IRS. None of them give a cr@p about what you think, especially the last two. And as far as eBay goes, they are so well insulated you can't even find a phone number to talk to a "live" person. To AOL's credit- when I had a complaint, I was able to talk to someone, and they listened. Weren't interested in doing anything though. BTW this was also a SPAM related matter. Encouraging EVERYONE to stop using AOL is the only solution. Unfortunately, I know a LOT of AOL users who are so computer illiterate that they won't change 'cause they believe the whole darn Internet starts and stops w/ AOL. Gary 'need an AOL install CD?' Kasten |
#64
|
|||
|
|||
![]() VideoGuy wrote: Unfortunately, I know a LOT of AOL users who are so computer illiterate that they won't change 'cause they believe the whole darn Internet starts and stops w/ AOL. Yep. My mother is one of those. What makes it even worse is that she got into computers professionally back in the paper tape days, so she thinks she knows everything about them. If you need a FORTRAN program for an IBM 1401, she'd be the one to talk to, but as a PC user, she's not so hot. George Patterson In Idaho, tossing a rattlesnake into a crowded room is felony assault. In Tennessee, it's evangelism. |
#65
|
|||
|
|||
![]()
Unfortunately, I know a LOT of AOL users who are so computer
illiterate that they won't change 'cause they believe the whole darn Internet starts and stops w/ AOL. Yep. My mother is one of those This certainly doesn't mean it is a charactaristic of all (or even the majority) of AOL users. And it isn't the fault of AOL, either. www.Rosspilot.com |
#66
|
|||
|
|||
![]() Rosspilot wrote: This certainly doesn't mean it is a charactaristic of all (or even the majority) of AOL users. And it isn't the fault of AOL, either. No, but what makes it a problem for me is that she switched over to sending her mail in HTML format ('cause she likes the fonts). When my browser receives HTML, it translates it into text, and everything's fine. Except for HTML messages from AOL. I don't know what AOL does to their HTML, but I cannot reply to one and edit the reply. The original text received is added as an appendage to my reply. Back when she used text for mail, all the apostrophes and quotation marks came across as garbage. That went on for years. The frustrating thing for me is the fact that she used to be a logical person - you can't build a reputation as a good programmer if you don't have an excellent logical thought process. But she has an almost religious devotion to AOL and can't believe that the problems we see are unique to AOL. George Patterson In Idaho, tossing a rattlesnake into a crowded room is felony assault. In Tennessee, it's evangelism. |
#67
|
|||
|
|||
![]() No, but what makes it a problem for me is that she switched over to sending her in HTML format ('cause she likes the fonts). When my browser receives HTML, it translates it into text, and everything's fine. Except for HTML messages from AOL. I don't know what AOL does to their HTML, but I cannot reply to one and edit the reply. The original text received is added as an appendage to my reply. This is a function of your Email software, not of AOL. It is your software that appends (or does not append) the orignial text message. There are standards for handling various levels of HTML (including whether or not a text version is included - this is the "multpart - MIME" issue), but your Email software has full control of how it decides to handle replies. Jose -- (for Email, make the obvious changes in my address) |
#68
|
|||
|
|||
![]() Teacherjh wrote: This is a function of your Email software, not of AOL. It is your software that appends (or does not append) the orignial text message. There are standards for handling various levels of HTML (including whether or not a text version is included - this is the "multpart - MIME" issue), but your Email software has full control of how it decides to handle replies. Not in the case of messages sent from AOL. I receive messages from other people in HTML format, and my mail package (Netscape) handles it just fine, but if I get one from an AOL user, it won't. George Patterson In Idaho, tossing a rattlesnake into a crowded room is felony assault. In Tennessee, it's evangelism. |
#69
|
|||
|
|||
![]()
On Mon, 5 Jul 2004 16:31:33 -0700, "Peter Duniho"
wrote: I'll pop off after this one too unless someone else is really interested in the discourse. As far as it not being feasible to inspect Internet traffic as it passes through your routers, that's just silly. It would require only a completely insignificant amount of extra overhead to detect traffic containing email, and then to extract email addresses from that traffic. In any case, if you're a spammer who has somehow arranged to be involved in routing Internet traffic, why would you care if there was a little extra overhead? That would be the whole reason for putting yourself in that position in the first place. You don't happen to have some Cisco IOS packetfilter code which would do this handy do you? I can't seem to craft a filter which examines and logs packet payload. Do not underestimate the motivation of spammers to find new, valid email addresses, or the motivation of people who sell email addresses to spammers to do the same. I don't underestimate the motivation. I believe that most of the viri and other addressbook copying and attacking exploits are done for the purposes of gathering addresses, as well as phising/fishing, looking at usenet, forum boards, etc etc etc. I also believe that purchasing highly expensive OC192+ links and becoming a/convincing the existing tier 1 and 2 providers that you are now another tier 1 or 2 ISP which they should pass their traffic through, just for the purpose of examining the relatively small subset of that payload which is an email containing addresses (which are likely more invalid than valid because they're forged addresses sourced from other spammers) is a long, hard, and expensive way to go about getting addresses with other, easier alternatives available to them. I think it's pretty funny that the big debate here has been the question of whether it's possible to pull email addresses from email as it's routed across the Internet (which, IMHO, is obviously possible...ANY traffic can be monitored by a party with enough interest and motivation), while NO ONE ELSE has bothered to comment on whether using the bcc field actually hides email addresses from those who would pull email addresses from email as it's routed across the Internet. If they can't snif the payload it doesn't matter whether the address is in the to: or bcc: fields. If they can snif the payload, they're likely using a grep-like thing parsing for /net/org/etc and it doesn't matter if you're using to: or bcc:. If you can provide me with a filter I can put in my v12 Cisco IOS router which will read email payload as it goes through the box, without making it's CPU go to 100% and crashing my core , I'll concede that a router can be used to pull addresses from email in transit through backbone links, but I tend to doubt they would have the financial resources to set up a major backbone ISP with high-capacity transit links, just to front an email-address gathering operation. |
#70
|
|||
|
|||
![]() Not in the case of messages sent from AOL. I receive messages from other people in HTML format, and my mail package (Netscape) handles it just fine, but if I get one from an AOL user, it won't. That is a bug in your software. Your software controls whether or not an Email is appended on a reply. If it trips on AOL's (or anybody's) Email, it is a bug in your software. Your software is completely in control of how it handles your response (whether it appends the original Email or not). Jose -- (for Email, make the obvious changes in my address) |
Thread Tools | |
Display Modes | |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
American nazi pond scum, version two | bushite kills bushite | Naval Aviation | 0 | December 21st 04 10:46 PM |
Hey! What fun!! Let's let them kill ourselves!!! | [email protected] | Naval Aviation | 2 | December 17th 04 09:45 PM |
Jews Hate Palestinians | Paminifarm | Naval Aviation | 40 | June 11th 04 04:01 PM |
I hate Chickenshits too! | Badwater Bill | Home Built | 6 | May 6th 04 05:43 AM |
i HATE bush - i HATE bush - i HATE bush - i HATE bush - i HATE bush - i HATE bush - i HATE bush - | Cub Driver | Military Aviation | 0 | October 29th 03 11:21 AM |