It's Just this Little Chromium Switch Here

Weblogging and commentary by Chip Rosenthal

Snpajtev This, Spammer

in

wobbly letters spelling "snpajtev"Do not adjust your set. The wobbly letters you see in the graphic are part of the new Microsoft Hotmail/Passport registration procedure. When you try to register for an account, you'll get a graphic image such as the one above, and you need to type what you see back into the form. That's easy for a human to do, very tough for a computer.

This means that spammers will no longer be able to run automated signups, to amass the hundreds (thousands?) of accounts necessary to do a DAV spam run. Thanks, Microsoft.

Now, about that header forgery problem ...

Microsoft Responds to Spam

in

Link: Toward a Spam-Free Future

Microsoft has launched if not an all-out war, then at least a significant publicity blitz against spam. Last week, Microsoft announced a number of lawsuits against spammers. Today, the Wall Street Journal published a letter from Bill Gates attacking spam.

The focus of these actions has been spam received by Microsoft customers. What about taking care of the spam that originates on Microsoft networks? Earlier this month I described a serious Hotmail problem that is being exploited by spammers to send unwanted email.

The noted article by Bill Gates has what may be some good news on this front.

[...] spammers set up many different email accounts to avoid detection, and, once detected, they move to other services. To put an end to this shell game, we are taking steps to prevent spammers from creating fraudulent email accounts in bulk.

The Hotmail vulnerability involves scripted sending of spam using the DAV protocol. That's only half the problem, because Hotmail limits accounts to 100 messages a day. A spammer can't do much damage with one account.

So, spammers need a significant number of Hotmail accounts to do their dirty deeds. Hotmail, unfortunately, lets them do that. Spammers have scripted the signup process as well, allowing them to gather hundreds (thousands?) of bogus accounts to originate spam. If Microsoft secures the Hotmail signup process so that it no longer can be automated, this vulnerability will be reduced significantly.

There is one other part to the Hotmail spam problem: they allow forged headers, including headers that are supposed to provide an audit trail. Microsoft should address this problem too. They should stop allowing spammers to forge headers such as the From: header. They should get rid of the silly, non-standard audit headers such as X-Originating-IP: and use a trustworthy Received: header to indicate the mail source.

I am holding out hope that Gates' message means Microsoft is going to give this problem the consideration it deserves.

Linux 1S 0WNZ3R3D

Link: scoirc.txt.

You may have heard that SCO (nee Caldera) and IBM are in a small legal kerfuffle over Linux. Unless you've been following closely, you probably find all the actions and accusations a tad bewildering.

Fortunately, some kind (unknown) person has put together a brief summary of the history. And to make it even easier to follow, it's presented in IRC-speak. LOL!

UT, Spammer Tussle in Court

Link: UT Singles Out Site that Seeks Single Longhorns.

White Buffalo spammed 57,000 email users at the University of Texas. UT responded by blocking them. White Buffalo sued, but lost.

I gave my three cheers for the good guys winning, but there are some aspects of this story that trouble me.

First, blocking a source that's generating spam can be justified to protect your users or facilities. According to the story, UT went beyond that and blocked email in the other direction: from their users outbound to the spammers. A block such as that cannot be supported on either grounds: protecting users or protecting resources. It sounds like the intent was punitive. Now, I enjoy spanking spammers as much as the next guy (maybe more so), but not at the expense of disrupting users' email.

Another thing that bothers me is the implication that UT allows some organizations to spam. The article cites Dell and MasterCard. What isn't clear, however, is whether the email from those companies is solicited. Or, maybe the email was just sent to people with whom they have an existing business relationship. In either case, that's not spam, and White Buffalo would be barking up the wrong tree.

Finally, I find it disturbing that White Buffalo believes that UT email addresses are public information and subject to spam. That information ought to be able to be kept private, and it should not be repurposed into marketing fodder.

These are some of the big red flags that went up when I read the article. I wish the reporter had spoken with somebody familiar with spam issues so that they may have been clarified. (via spamNEWS)

Cyveillance Dirty Tricks

in

Has your web site been visited by Cyveillance recently? It's quite possible, but you probably wouldn't know it. Cyveillance crawls the net spying on web sites. If you say something they don't like about one of their clients, they'll tattle on you.

Cyveillance uses a couple of dirty tricks when they crawl the web. First, they ignore the robot exclusion protocol. This standard allows you to specify portions of a web site that are off limits to robots and other automatic agents. Cyveillance fails to honor the exclusions you may have declared for your web site. They crawl places that 'bots are not supposed to go, in spite of your explicit instructions not to do so.

This can be a problem for web sites that present deep, dynamic content. For example, I have a spam robot trap on my web site. When a 'bot crawling for email addresses to spam hits that page, the trap is sprung. If the 'bot moves beyond that page, it ends up in a never-ending maze of bogus, generated email addresses. The trap keeps the 'bot tied up, and it fills its database with bogus data.

I don't want to trap well behaved 'bots, such as those used by Google to spider web pages. Therefore, I post an exclusion for this area. This protects the well-behaved 'bot from garbage data, and it protects my website from unnecessary load.

Cyveillance ignores these instructions. Their 'bot gets caught in the trap, crawling places I'm specifically trying to keep 'bots away from.

Another problem with the way Cyveillance crawls is that they provide fradulent header information in the HTTP request. Rather than admitting they are a spy 'bot, they pretend they are a web surfer running Microsoft Internet Explorer. When they submit a request to a web site, they declare:

User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)

For comparison, when Google crawls a web site, they declare:

User-Agent: Googlebot/2.1 (+http://www.googlebot.com/bot.html)

You could try to keep Cyveillance out of your web site by blocking their network. The problem is that if enough people do this, they may try to hide their origin to get around the blocks. That would be a pretty sleazy thing to do, but no more sleazy than what they do already.

Blog without Comment

A blog without comments is wrong. I feel a twinge of discomfort when I come across such a blog. I think I'm beginning to understand why.

Blogging is an act of egocentricity: come read me because I have something interesting to say. Come back again because I'm regularly interesting.

Adding comments to a blog softens that. It's a willingness to listen, an invitation to conversation. Blogs without comments, on the other hand, twist the dagger: I'm interesting, I've said all there is to be said, and you couldn't possibly say anything worth hearing.

For instance, I'm probably going to drop the Reverse Cowgirl from my reading list. She's been a fun, guilty pleasure for some time. In recent months, she has leveraged her blog presence into one of minor celebrity. While visiting today, I noticed the comments had disappeared. I felt an axis-tilting change in the relationship. I didn't feel like a welcome guest anymore.

As another example, Halley publishes a blog I've never enjoyed. Best I can tell, Halley's claim to fame is she blogs a lot. A lot of people read that blog because ... ummm ... I don't know. I've just found it irritating. To test my theory I went and visited her blog, and sure enough: no comments.

David has a thing for skewering A-List bloggers. I understand and share some of his irritation, but not all of it. There are some A-List bloggers I enjoy reading, such as David Weinberger and Larry Lessig. These guys have comments on their blog. Maybe there is some correlation. The fact that they are willing to listen makes me feel welcome. Totally not irritating.

So far, I've only found one comment-less blog that I want to keep on my reading list. That is Ed Felten's blog. Although he doesn't accept comments, he does take trackbacks. That mitigates things a bit; it at least gives somebody a chance to respond. Still, I get a small whiff of that, "I don't care what you have to say" thing whenever I visit.

What I'm realizing is that--good, bad, or otherwise--I'm insulted by blogs without comments. It's the same feeling as going to a party, having somebody yack at you for five minutes, and then they turn tail and run before you can say anything. I think it's rude, and I don't enjoy hanging around those sorts of people.

Weirdest Bug in Human History

Get out your rubber chicken and mojo hand. I have just discovered the weirdest, most mysterious bug ever encountered.

I signed off on my broadband installation yesterday morning, but later in the day discovered it was messed up. Frequently, the network would freeze up, and, after a delay, the CABLE indicator on the modem would start flashing, indicating (what I believe to be) retraining after loss of signal.

If I left the system quiescent, everything would be fine. Streaming audio would continue to stream. The occasional email message would come through. It was when I did stuff that started creating connections, primarily web surfing, the problem would occur. The problem was highly intermittent, but would eventually be triggered with enough clicky-clicky on links.

Now, here is the scary part. If I point my web browser to E-Bay, the page will not load and the failure will be triggered. No other web site does this consistently, and E-Bay does so without fail.

And if that isn't strange enough, it gets even weirder. This happens only when I use the Mozilla browser. If I use some other browser, such as Opera or Lynx, the page comes up just fine.

I am at a total loss to explain how, under the known physical laws of this universe, such a failure mode could happen. Therefore, the obvious answer is that it isn't happening, and I am just hallucinating.

Desolate Landscape

Happy broadband to me!

It was over a year ago that I lost my broadband Internet connection. The cost of a business-class service became beyond my budget. Plus, my old ISP initiated a novel business strategy: let's act like a bunch of morons and chase off our customers. The parent company eventually crashed into bankruptcy, which I assume was the desired result of their "act like morons" business strategy.

Since then, I've been running across a 56K dialup modem attached to my router. It was serviceable, because I moved the servers out of the apartment and into a downtown data center. But, still, it sucks.

This morning, my cable Internet service was turned up. First thing I did was download a badly needed bunch of operating system upgrades. Next thing I did was point my browser to Shoutcast to tune into some of those delicious music streams I so badly missed. I was aghast to find I'd stepped into the middle of an empty ghost town.

It seems in the interim, the big Internet content providers succeeded in killing off the burgeoning Internet radio movement. Very few of the stations have survived. My favorite station had to abandon the open MP3 streaming format for a lower fidelity, proprietary system. I don't have a problem paying a subscription fee, but no way am I going to pay for a non-portable, proprietary format stream.

Why is it that whenever the big content providers get involved, it all goes to shit?

Hi, Jerkwad

in

I recently discussed a Hotmail vulnerability that is being exploited by spammers. I've been seeing spam from this source for about three months. Two days after the article was posted it dried up.

So, I'd like to say thanks for reading my blog, and thanks for opting me out of your spam, scumbag.

Hotmail DAV Spam: Worse than I Thought

in

I recently blogged an article pointing out a problem that is allowing spammers to relay junk email through Hotmail. Like so many Microsoft problems, it's caused by bad system design: deploying a feature without considering the security ramifications. I thought it was pretty bad when I first saw it. Unfortunately, the more I learn the worse it gets.