Hashing Email Addresses For Web Considered Harmful 155
cce writes "The MicroID standard, despite getting thrashed soundly by Ben Laurie two years ago, has since been recommended by the DataPortability Project and published on the user profiles of millions of users at Digg and Last.fm. MicroID is basically a hash calculated using a user's profile page URL and registered email address, producing a token that makes the email address vulnerable to dictionary attacks.
To see how easy it was to crack these tokens, I conducted a small study, choosing 56,775 random Digg users, and cracking the email addresses of 14,294 of them (25%) using just their MicroID, username, and a list of popular email domains. Digg has more than 2 million users, and that means half a million of them — mostly people who had never heard of MicroID, and had probably not logged in for a long time — had their email addresses exposed to this trivial attack. I also applied this attack to Last.fm (19%) and ClaimID (34%).
Digg and Last.fm have since removed support for MicroID, but the lesson is clear: don't publish a hash of my email address online, guys!"
Solution: salt your emails (Score:5, Interesting)
Re:Solution: salt your emails (Score:5, Insightful)
Re: (Score:3, Interesting)
Maybe that FOAF could attack ESPN.com, too. I tried registering there for a fantasy football league at work and used myaddress+espn@gmail.com. The damned system took the + out, making the address invalid!
Postfix Solution (Score:4, Interesting)
Assuming you're using postfix and virtual, you can do something like this:
main.cf:
recipient_delimiter = +
virtual_alias_maps = hash:/etc/postfix/virtual, regexp:/etc/postfix/virtual-regexp
virtual-regexp: /(.*)\-(.*)@example.com/ ${1}+${2}@example.com
and then you can do:
bob-somesite.com@example.com
this works for every site I've tried but oracle.com, who apparently doesn't want you tracking their mail. :)
Re:Solution: salt your emails (Score:5, Informative)
It is the delimiter, originally created as such by the authors of the very first MTA [wikipedia.org]... There is no other character, that:
This is, unfortunately, the truth... Far too many programmer wannabees around... It is a good fight, however, and kudos to GMail for keeping support for it (unlike Yahoo! Mail).
I use this whenever I can, when giving my address to web-sites (including Slashdot)...
Re: (Score:2)
"Can not be part of a username" is system-specific (and policy-specific) behavior. I don't allow hyphens, periods, underscores, or numbers in my usernames, and as such they are all valid delimiters.
Depending on the number of users you have, how abusive they are, and how closely you monitor username selection it's entirely plausible to use a delimiter that *is* allowed in usernames, so long as you don't assign usernames that allow abuse.
Re: (Score:2)
Well depending on how abusive you are, Mordac [dilbert.com], you may declare the letter "e" (the most frequently occuring in English) to be the separator — and punish attempts to use it as "abuse" by refusing service [philly.com] or worse.
Sorry, I was talking about 99.99% of Unix installations out there. I did not account for yours... My post certainly was system-specific (no e-mail system tod
Re: (Score:2)
Perhaps what we need is an RFC hall-of-shame... when we find websites that don't support the +, add their domain name to the roster.
With enough promotion throughout geekdom, it could become such an embarrassing badge of dishonor that it evokes corrective action... similar to getting RBL'd for relaying spam (except that humans react to it, rather than MTA scripts.)
Wishful thinking?
Re: (Score:2)
Like rfc-ignorant.org [rfc-ignorant.org]?
Re: (Score:2)
Er... yes, like that. :) Too bad, I liked the sound of "RFC hall of shame" better.
Re: (Score:2)
There is no other character, that:
1. Can be part of an e-mail address.
2. Can not be part of a username.
Untrue. The percent character can be used instead. While it was originally used for gateway-adressing, there is no reason not to use it instead for this subadressing. Both conditions are true for the percent character as well. The esclamation mark is another character which comes into mind.
Re: (Score:2)
In fairness to Yahoo it should be mentioned that they do let you create what they call "disposable" e-mail addresses that work on the same principle: base_address-your_salt_here@yahoo.XYZ
That solution may not be as easy or complete as GoogleMail's, but since the other big free e-mail provider out there (Hotmail) doesn't offer it at all, I don't think Yahoo is that bad.
Now, if only they'd offer free IMAP *sigh*
Re: (Score:2)
But it didn't originate with Sendmail. The practice originated with qmail, and it's always been in qmail. Sendmail and Postfix added it in response to mail, and they obviously did it wrong.
There's no reason you shouldn't use - except for the problem that crops up when you have a user named bob and another user named bob-foo which is that bob can't make a .qmail-foo that works. Never mind the fact that the administrator might
Re: (Score:2)
I'm interested in hearing more about the group+user addresses. Do you have any documentation about that?
I don't think the weird shit system administrators really is evidence that user-extensible addresses (as opposed to administrator-extensible addresses) were common or even available before qmail, although I'd still be interested to know if you are sure that they were.
BTW: Even Fido was better than UUCP.
Re: (Score:3, Informative)
This is, unfortunately, the truth... Far too many programmer wannabees around...
It is also unfortunate that perfect e-mail parsing is extremely complex. The Perl regexp for e-mail address validation according to RFC 822 [ietf.org] is about 6.3 kilobytes [ex-parrot.com]. If you try to do it yourself you are pretty much guaranteed to get it wrong.
Those crappy programmers could still make things much better with liberal validation, allowing some invalid addresses to make validation simpler. Something simple like /[^@]+@[^@]+\.[^@]+/, will match all valid e-mail addresses (I think, and the /. filter won't let me
Re: (Score:2)
What we *NEED* is for the f-ing browser makers to encode a literal "+" from an input box to "%2B"
Just use dots, then (Score:2, Informative)
Apart from the fact "+" is a perfectly valid character in an email address, if you're using Gmail, you can insert random dots in your address, and your mail will still get delivered.
my.name@gmail.com
is equivalent to
my.na.me@gmail.com
my....name@gmail.com
m.y.n.a.m.e@gmail.com
etc
Re: (Score:2)
Make sure that it's not already in use by someone else. I have two GMail accounts, one for normal mail and one for mailing lists. The only difference between the two is that the second ends in ".ml" which would normally go to the main account, but since I registered the second one, it goes to that completely separate account.
Re: (Score:3, Informative)
This is completely different. What the grandparent said that "username.ml@gmail.com" would automatically go to "usernameml@gmail.com". Gmail just ignores dots in e-mail addresses.
Re: (Score:2)
Attempts to educate webmasters to the information in the relevant RFC's is usually met with silence or worse
What's worse than silence? They hunt down and kill your first-born? :-)
Re: (Score:2)
gmail also ignores periods.
this.is.an.example@gmail.com is the same as th.is.isan.example@gmail.com or thisisanexample@gmail.com.
You can still salt without needing a +
Re:Solution: salt your emails (Score:4, Insightful)
Except that once the salted email is found, everything between the @ and the + will just be discarded.
Re: (Score:2)
superparanoid? regexp (Score:3, Interesting)
tm
Re: (Score:2)
Nah, if you're running qmail, just put a .qmail-something in your homedir containing the address to forward it to:
Say you have:
someguy@example.com
~/.qmail-fart:
someguy@example.com
Makes this address forward to someguy@example.com:
someguy-fart@example.com
Re: (Score:2)
The same example and process apply for the Courier suite (a much better alternative to qmail ;)), though substitute ".courier" for ".qmail".
-b
Re: (Score:2)
that would be up to the site admin to do that, not the attacker. and i see no reason for sites like Digg or Last.fm to fuck with the e-mail address you input. if people find out that they are removing the +, then they will just lose security/privacy-conscious users.
Re:Solution: salt your emails (Score:5, Informative)
Except that lots and lots of web sites fail at RFC 822 and think + isn't a valid character in an e-mail address. Usually the same sort of maldesigned horrors that make you type your e-mail address twice even though, unlike your password, you can read it as you type to make sure it's correct, or have a single free-form blank for credit card numbers and enforce some idiosyncratic rule on separators (really, is $cc =~ s/-//g; that hard?), or enforce strong passwords and then cripple them with mandatory 'security' questions that allow anyone who knows you halfway well to reset your password.
Yeah, I use them too, and if web designers were a whole lot smarter they would be a better solution to things like this, but in practice lots of web sites just refuse to accept addresses like that. I should get around to making sendmail let me use an underscore instead of a + for that purpose.
Re: (Score:2)
How about sites that want "5-10 characters, only letters and numbers please"? Those are my personal favorites.
Re: (Score:2)
The worst one I've seen so far is Nelnet:
6-10 characters,
No special characters,
Cannot contain two separated numbers (abc123 is ok, ab12cd34ef is rejected),
Can't be your username, or contain "nelnet" or "password"
Re: (Score:2)
Re:Solution: salt your emails (Score:5, Informative)
Giving out e-mails with "+something" is worthless for spam. The malicious spammers will just strip the "+something" from address, as both can be delivered, but the short form will be less likely filtered, and you won't know which service it was sold/stolen from.
I actually make a separate alias for each site eg. name-something@example.com. If you shorten my alias to the part before the hyphen, it won't deliver. Yes, spammers have tried.
If you're using "+something" just know that you might as well not append that onto your e-mail address, for all the good that it does, as you're giving out your primary address anyway. Cat, bag, already open.
Re:Solution: salt your emails (Score:5, Interesting)
Yeah, this can happen, but I dunno that this is as big a problem as you think. Spammers just plain aren't all that bright, and they don't care very much if they miss the tiny proportion of addresses that geeks try to protect like this when there are so many totally unprotected addresses so easy to obtain. It seems like a lot of the time, when they try to harvest addresses, the harvester doesn't realize + is a valid character in an address and only gets the part after the plus sign. I bounce a lot of spam sent to addresses like slashdot@persephoneslair.org and usenet@persephoneslair.org.
Re: (Score:3, Interesting)
And the few times a harvester is correctly written? What then? That's the address that gets spread around. Obscurity doesn't work on the Internet. Just don't post it at all.
But you seem fine with it because you're also posting your personal domain name here, which links to your name and your photo, along with a street address and phone number (which I hope are only P.O. box and a voicemail-only phone service). You're a hell of a lot more comfortable with it than I am. (At least I hope you knew that all that
Re:Solution: salt your emails (Score:4, Interesting)
So why bother?
Someone who was serious could get into public records and get my address anyhow (owning a house generates lots of public records). Someone who isn't serious presumably doesn't pose a threat. I think the worst thing that's actually likely to happen is 4chan-style harassment, and (1) it's not particularly likely, as I don't hang around those types enough for them to care about me, and (2) if it did happen, countermeasures are certainly available. And, again, (3) if anyone were serious enough about it, they could find all the relevant information through other channels anyhow.
Being nymous online is a Good Thing -- it means people I know IRL can recognize me (I've run into ex-coworkers and old friends I didn't think I'd see again) and it gives me a chance to build a reputation that follows me into Real Life (so potential employers find plenty to recommend me when googling my name). Further, it acts counter to the tendency for anonymous communication to degrade into... well, you're on slashdot; you know exactly what I'm talking about. :)
Re: (Score:2)
(2) if it did happen, countermeasures are certainly available
No, they're not. Not in the way that you think.
1) Police are very limited in understanding and action with harassment crimes.
2) Retaliating will likely get *you* into trouble, rather than the initial tard.
3) Even if you do get a civil judgement, these people likely have nothing to lose. Therefore, you lose.
4) Sending them to jail just makes them more pissed off. Then re-visit #3.
In public forums like this, there are a lot of crazies on both sides of any argument. It's best to limit your exposure, unless you
Re: (Score:2)
Your guesses regarding what I think are inaccurate: my idea of a fun weekend is updating the rules for my asterisk server used to filter phone spam.
To be sure, I don't particularly want to deal with cleaning up my credit report after some asshat decided to steal my identity in return for asking him to clean up his language in a public IRC channel... but hey, them's the risks with being out on the Internet these days, and (as before) I don't interact with those
Re: (Score:2)
Well, see, that's what you're comfortable with. ;) I prefer to be happy, which, as part of my definition, excludes all the crap you have to go through to protect yourself. Sure, what I do isn't perfect, but it's yet another several steps and guesses for someone to get to the point where I need to do what you're talking about. Why make it easy?
Re: (Score:2, Interesting)
Hey -- we didn't arrange our schedules that way on purpose; it just happened as a happy accident. Likewise, I mess with Asterisk first and foremost because I think it's fun, and only secondarily because I dislike phone spam. (We did decide to do the large-dog thing as a security measure, but that was for late-night walks outside, not protection of the household proper -- and any weaponry we may have usable for home defense would have been purchased primary for recreational hunting; that said, I don't disclo
Re: (Score:2)
I don't know about you, but if I have an e-mail address listed on my resume that can be linked back to a fair amount of my internet doings.
On the other hand, they cannot be linked to my /. account. Why? Because it wouldn't be a great idea if they could read all of my /. posts. Discriminatory hiring practices is illegal, but you need proof of that.
That's my main reason for separating my profiles and keeping them separate. I'm sure law enforcement could, with the appropriate warrants, link everything back tog
Re:Solution: salt your emails (Score:5, Insightful)
Spammers aren't bright? So spam filtering is easy, right?
One (partial) solution is to have large providers provide alternate domains that you can register throw-away addresses. For instance, under Google Account settings, you might have the option to generate an address from cephelo@gmail.com and assign d785jd47fj@southeast.gmail.com and allow you to record a note that you intend to use d785jd47fj@southeast.gmail.com as your Amazon.com user ID.
As time progresses, Gmail can show you stats that, for example, 100% of e-mail on d785jd47fj@southeast.gmail.com is spam - "Do you want to delete this account?" and poof - the spam stops. Now that address automatically becomes a honey pot.
Re:Solution: salt your emails (Score:4, Informative)
Let's see... Large email provider, throwaway addresses, access until you don't want it anymore...
You mean, kinda like Mailinator [slashdot.org]??
There are others, Mailinator is the easiest.
Re: (Score:2)
Re: (Score:2)
Just consider that email addresses are a public affair.
Sometimes you want a new email address for each service you register to and by that be able to track mail harvesters if you feel like that.
The easiest way is to have a junk email address that you already get spam on when you register at various sites and then let the junk filter take care of the worst.
And expect spammers to use a lot of various techniques to circumvent obfuscation. It's all about pattern matching - and adding a lot of standard names lik
Re: (Score:2)
Um, you could do the same thing with the '+' system.
Not without modifying your MTA.
Re: (Score:2)
Then just have people email you as +notspam, and give your email to websites without it. Of course, those websites' emails will be marked as spam, which takes away the point of giving it to them anyway.
I believe you're talking about merely filtering rather than rejection at the MTA. With my method, I don't have to modify my MTA, or add to a spam filter. Setting up another alias is not a hassle. If the alias gets spammed, I drop it, and if necessary, make a new one.
As for salting, I was indirectly saying that one wouldn't need to care about it if one used my method. But, this method only works if you control your domain's MTA like I do. If you're using Gmail, and using the "+" system, you're mistakenly tru
Re: (Score:3, Informative)
Except that some web forms (and some mail servers) won't accept an email address with a '+' in it.
We use these types of addresses at work to organise replies to tickets and some people's mail set-ups really screw things up.
Re: (Score:2)
I used to do something similar on my personal mail server. What happened was that a few poorly-administered email lists had my raw address in that form in the public archives. So now my address ended up on spammer lists three multiple times, and I'd get the same spam on three "different" addresses at the same time.
Re: (Score:2)
Many sites including Microsoft's Xbox site and TomTom do not accept the + sign as part of an e-mail address. This makes it worthless.
Combined with Google Apps for Domains having allowing only a very small number of aliases, and we're back to having to run our own MTAs and dealing with all that grief, spam and wasted bandwidth :(
What does MicroID actually do for the user? (Score:1)
Re:What does MicroID actually do for the user? (Score:5, Informative)
I read up on it and I'm still confused, but I think this is the idea:
1. You set up an account at website Alpha.
2. You have a publicly-viewable profile page at Alpha. On the page is your MicroID.
3. You set up an account at website Beta.
4. You tell Beta about your Alpha profile page.
5. Beta verifies that your Alpha profile page is really yours by checking the MicroID.
Beta can't really do anything with your Alpha page except link to it. I guess the point would be to prevent people who aren't you from linking to your Alpha page on their Beta pages. That way, other people can be sure that the same person owns both accounts.
The attack mentioned in the article doesn't compromise the proper use of the MicroID, since Beta is assumed to have verified that you own your email address and you wouldn't link to a profile page claiming to be yours that wasn't. All it does is make it possible for spammers to harvest your email.
Re: (Score:2)
The attack doesn't compromise what MicroID does, which is to confirm that an account on a site is associated with a given email address. It's just a way of working out an email address from the MicroID hash.
As long as it's not easy to guess your email from your name or you don't use a common provider then you are probably pretty safe.
Re: (Score:2)
Still confused as to how this is useful --
The "ID" is just a hash -- in order to verify a hash, you re-generate it. So anyone who can verify your ID can also forge it.
So then, how is this any better than "claiming" some element by just writing your name on it? It doesn't seem to do anything more substantial than just that.
Re: (Score:2)
So then, how is this any better than "claiming" some element by just writing your name on it?
It isn't, really. The utility comes from Alpha only allowing people to write their own "name" (MicroID) on their page and Beta only allowing people to point to pages with their "name" on it.
Re: (Score:2)
I'm not sure you read the post I was responding to. Butisol specifically asked "how it benefits the user, vulnerability aside." The only reason I mentioned the vulnerability at all was to note that it does not prevent you from reaping the benefit of MicroID.
Okay... (Score:2)
To find out valid e-mails, couldn't a spammer just send out an e-mail blast to username@top5emaildomains.com and throw away all the bounces?
You wouldn't need a hash of any sort to do that kind of trivial attack and it isn't like the serious spammers are lacking in bandwidth or resources.
Re: (Score:2)
I do my own mail forwarding for a small domain that I own. There are about 20 valid email addresses at that domain. For the last year at least I have had a botnet harassing my mail server trying every conceivable random email address at my domain. I tried blocking by ip and iptables got so huge (10000+ ips) that it just about crashed my machine. I finally implemented gray listing so my machine just tells the botnet to buzz off and doesn't store any data but it's still an on-going problem. This whole bo
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
This is a definite tactic. I see it all the time on a mail server that I administer. From the results, there are definitely spammers that monitor user's e-mail, address book, or other sources of e-mail addresses on their computer. (Basically, on a brand n
last I checked... (Score:1)
They already have your email address (Score:5, Insightful)
This concern that you may have your email address *discovered* by spammers because you post it on a web page is so 5-years-ago. They already have your email address, and they probably didn't get it by scraping web pages.
When you have sent a couple emails out with a given address, you can figure that at least one of them will to sit around in someone's Outlook mailstore for the next couple years. (Someone you know uses Windows!) When that person's computer gets infected with spam gang malware (as they all do), they have your address.
Once of them has it, they probably all have it.
Re: (Score:3, Insightful)
> Once of them has it, they probably all have it.
But they don't know that it is yours. They can spam you with it but they can't use it for anything else.
Re:They already have your email address (Score:4, Insightful)
They can spam you with it but they can't use it for anything else
Actually, in addition to spamming you, they can use your email address in the from and reply-to field for their next spam run.
Ask me how I know.
Re: (Score:2)
On a serious note, how many of those rejected emails are really from email servers with admins too stupid to not respond to spam, and how many are made to look like responses in the odd hope I really did forget I sent that email, and proceed to click on all the links
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It may evolve to the point that these characters will want to invest the effort in really carefully targeting their marks. I have heard it called, "spear phishing," but I have never actually seen it.
If they really wanted to do that, I would think they'd start by harvesting info from the million zombie pcs they root. I *have* seen a worm that eavesdropped on FTP to steal login info, and tag sites with malware, but that is about all I have seen in the wild.
Most of the spam/phish gang action I see, seems to
Re: (Score:2)
Depends. If the user keeps their address book up to date then they also know your full name, address, telephone number, possibly date of birth, and so on. There were quite a few Outlook worms that allowed the author to gain full access to the address book.
And you don't have to send the person email. Meet them, bluetooth your vcard to their phone. They go home and sync it with their Windows box, and all of that information goes in their address book. Then they get a worm / trojan and that information g
Re: (Score:2, Insightful)
I'd argue that the added value of a spammer getting an email address connected to your online "identity" -- your user profile, recently-played Last.fm songs, favorite Digg articles, etc -- makes getting your email from a MicroID a little more valuable than the ordinary harvested email address. Plus, they don't have to bother confirming the address to see if it's still active (Digg already did).
Re: (Score:2)
Yes!! Not only is it pointless to try to hide, the modern spam filter (e.g., gmail) is at least 99% effective. I put my email in plaintext and even in mailto: links all over the place and I have no serious problem with spam.
Writing junk like foo [at] bar [dot] com simply wastes time time of your colleagues and friends, who now have to rewrite your address by hand, and confuses the non-techies.
*Gasp* Wrong! (Score:2)
Writing junk like foo [at] bar [dot] com simply wastes time time of your colleagues and friends, who now have to rewrite your address by hand, and confuses the non-techies.
How dare you!? The hours I spend every week crafting clever rewrites of my email address is precisely that which keeps the spammers on their toes. How else do you think Gmail capable of filtering any spam mails out? I'm keeping their volume down. It's not just some stupid security superstition, either: it really works! And way better than whatever algorithm they're training over in Mountain View.
From,
seinjunkie@gmail.com [mailto]
It's not a secret: jeffrey@goldmark.org (Score:3, Interesting)
I fully agree with the parent. The idea of keeping an email address that you actually use private is several orders of magnitude sillier than thinking your credit card number and social security number hasn't been stolen a dozen times already.
But there is one place I won't "publish" my email address (jeffrey@goldmark.org), and that is in the From line of a Usenet posting. Reply-to is fine, and there absolutely no problem in the body of messages, but tests have shown that putting something in the From l
Re: (Score:2)
Regards,
-Jeffery
Re: (Score:2)
Re: (Score:2)
They're also still scraping e-mail addresses off the web. And no, just because one spammer has your address does NOT mean that all spammers have it: spammer #1 is not going to give your address to spammer #2 without compensation, so unless spammer #2 buys a collection of addresses from spammer #1 (they were going for about $500 for a database on CD-ROM last time I checked), or spammer #2 discovers your e-mail address independently, then no, spammer #2 doesn't have your address.
Re: (Score:2)
Re: (Score:2)
Spammers got my main email ages ago and seem to have hacked a few forums for one-off addresses I used there too. So I don't worry too much about giving out my email address. The spam is mostly filtered, so I don't have to see it.
I'm not sure exactly where they got my address from. It could have been on a keyserver. Searching for my address finds lots of hits on those. Much easier than trying to extract it from a MicroID. Those were potentially useful for proving identity.
That said, spammers, identity thieve
Re: (Score:2)
Ok, Outlook Express. They both use a large glob files to store everything.
Re: (Score:3, Interesting)
The spammer (or actually, botnet owner who wrote a spam program) has already figured that out by putting a shim inbetween you and your network card. They just sniff your traffic for anything that looks interesting. In fact, I wouldn't be suprised at all that the botnet software will "turn on" when you use hit up gmail.com and can screen scrape the page while you check your email. I would even bet that it can update its screen scraping rules from some kind of distributed network.
Somebody in this thread sa
Don't use Gravatar (Score:2)
This is exactly the reason I don't use Gravatar. They even tell everyone they are morons right here:
http://en.gravatar.com/site/implement/url [gravatar.com]
I didn't know anything about them except that someone in a forum was describing how you could have the same avatar in compatible forums that you participate in. The second I read that your hashed email address was part of the URL I turned around and never looked back knowing full well that if someone wanted to, they could eventually get my email address.
Re: (Score:2)
The second I read that your hashed email address was part of the URL I turned around and never looked back knowing full well that if someone wanted to, they could eventually get my email address.
Erm, WTF?
I don't like Gravatar either, as it's a centralized service, and one which frequently goes down.
But you're afraid that, given a hash, someone can find your email address? Do you understand how hashing works?
Re: (Score:2)
I guess I'll have to actually read it, but I'm still not getting the premise.
How is a hash of my email address in any way valuable personal data that I shouldn't expose? I mean, yeah, it tells someone my email address, provided they already know my email address. What's the point?
Re: (Score:2)
The point is that most people have a short username at their email address. Let's take a look at yours: ninja. If you had registered this at, say gmail, then someone could simply do a brute scan for *@gmail.com. To find ninja, they need to search all 5-character values. If they stick to just letters, this means 26^5 = 11,881,376 different combinations. I'm currently using my old 1.5GHz G4. A quick run of openssl speed md5 tells me that this would take around 25 seconds. scanning every 8-digit alphanu
Obscuring email addresses is fairly useless anyway (Score:2)
The bottom line is that unless you don't have any online presence, your email address is going to leak, and it's going to wind up on spammer's lists. If you want to avoid getting spam, some other solution is called for.
even the spec admits it is retarded (Score:2, Informative)
Flawed study? (Score:2, Insightful)
Re:Flawed study? (Score:4, Informative)
Offline attacks are better because they:
1. can't be monitored
2. can't be blocked
3. are not limited by bandwidth
4. can be sped up by throwing more hardware at them
This is basically why salting was added to the unix password file. And that failed.. so /etc/shadow was introduced. Revealing hashes is just unnecessary, so don't do it.
Re: (Score:2)
You make a possibly faulty assumption here.
Just like spam runs can be spread across hundreds of thousands of machines, so can dictionary attacks. Which makes it a lot harder to block or throttle access to random IPs.
Why don't you want people to have your address? (Score:2)
Personally, I can't get clients unless they know how to get in touch with me.
And don't moan about spam. My E-mail address is widely published and maybe one or two messages a week gets through the filters.
Bad news for Gravatar (Score:2)
I guess Gravatar.com will now have to ecourage proxying of avatars via sites' web servers.
Why is this a big deal? (Score:5, Insightful)
You are worried because someone, if they really wanted to send you some mail, could go to the trouble of doing a CPU-intensive search against some hash shown on a website and find out that ultimate, embarassing secret: your *email address*??
What gives? Email addresses are designed to be public. If you don't want people you do not know to be able to contact you, then you are free to drop all mail from unrecognized addresses. If you want to set up some kind of secret knowledge that people must have in order to contact you, then ask them to put a particular word in the subject line when first sending you a message. Either of these does not rely on keeping the address secret, which just isn't likely to happen.
The only thing more broken than trying to keep an email address secret is trying to make a 'private' web page by keeping the URI secret. Again, the system is designed so that the address itself is not sensitive, but other information such as a password or PGP key can be.
Actually, what it reminds me of most is the crazy situation in the US where a basically public identifier, the social security number, is abused as some kind of secret token. Hence all the fuss made when it is possible to find out someone's SSN. The answer is not to add more and more baroque means to stop the SSN from leaking out: one breach, and it's no longer a secret.
I understand the desire to stop spam address harvesters, but really, there are hundreds of web sites which display email addresses with only light obfuscation, enough to stop a harvester bot but not a determined human being (or someone determined enough to use an OCR engine). The kind of hashing talked about here is way more difficult to undo than that. If you are even more paranoid, you need to revisit your assumptions of what is public and what is secret.
Re: (Score:2)
See the thing is, people have a funny way of deciding for themselves how they want to use technology (and, well, everything). And there really is nothing wrong with some people wanting a semi-private email.
microid doesn't seem to factor into it (Score:3, Insightful)
It seems like the attack is just taking user names and other publicly-known data trying to determine an email address from them. Spammers don't need microid to confirm that their guess is correct; they'll just send to all 50 or 100 top email domains, hoping to get a hit.
The whole point of MicroID is that if someone knows your email address, they can tell that you are the author of the page. If your email address is easy to guess, then your email address will be revealed, _whether_or_not_ there's a microid here, there, or anywhere.
If an email address is easy to guess, then the email address is easy to guess. Not clear what new ground we're covering here.
Re:A better solution? (Score:4, Insightful)
Use gmail. I'll get a thousand or so spams a month, but I've had maybe four make it to my inbox in the past three years.
It obviously doesn't eliminate the problem of spam, but in theory if it didn't make it to anyone's inbox, idiots would stop acting on it and suddenly spam wouldn't be profitable and would fizzle away.
Re: (Score:2)
I've had more than 4 in the last couple days in my GMail, but your advice is still sound. In the last month, GMail successfully filtered over 15,400 spam for that account. (That's actually down from the 30,000 it used to be.)
Re: (Score:2)
Re: (Score:2)
Actually, some sort of vigilante justice probably could do a lot of good here. Spam out messages for your free trial of whatever (plus 6.95s/h), and send people a rock and a nicely worded letter that tells them to kindly NOT fall for stupid crap anymore. Donate whatever's left over after postage and rock costs to the EFF.
Re: (Score:2)
Re: (Score:2)
Yes, I understand third-grade business. Obviously sending spam doesn't generate money out of thin air, or we'd all do it. Hell, I've advertised products that might as well have been thin air, and saw money from it (not via email, but that's beside the point). In any case, when those shady businesses that employ the spammers go under because spam stops being effective, the flow of spam will soon dry up.
It's a little mini food-chain. Break any of the links, and the whole thing falls apart. That could be