{"id":31,"date":"2006-08-23T22:51:27","date_gmt":"2006-08-23T22:51:27","guid":{"rendered":"http:\/\/kera.name\/articles\/?p=31"},"modified":"2006-08-23T22:53:01","modified_gmt":"2006-08-23T22:53:01","slug":"spam-by-co-incidence","status":"publish","type":"post","link":"https:\/\/kera.name\/articles\/2006\/08\/spam-by-co-incidence\/","title":{"rendered":"Spam By Co-Incidence"},"content":{"rendered":"<p><img decoding=\"async\" align=\"right\" id=\"image23\" alt=\"PlusNet logo\" src=\"https:\/\/kera.name\/articles\/wp-content\/uploads\/2006\/08\/plusnet.gif\" \/>When I started getting spam on an ISP email account that I don&#039;t even use, I got suspicious. At first I wondered if PlusNet had leaked account names or something. But eventually I figured it out.<\/p>\n<p>See, PlusNet ADSL customers get fixed IPs and reverse DNS with a hostname like <em>accountname<\/em>.plus.com. For the purpose of this post imagine mine is <strong>kera.plus.com<\/strong> <em>(note: it actually isn&#039;t)<\/em>.<\/p>\n<p>Although I don&#039;t use the email account other than for the service announcements which I can&#039;t <em>not<\/em> get on the admin account, I have the default setup whereby everything sent to <a href=\"mailto:strong>@kera.plus.com<\/strong\">strong>@kera.plus.com<\/strong<\/a> goes to my mailbox anyway. But the most obvious address is <a href=\"mailto:strong>kera@kera.plus.com<\/strong\">strong>kera@kera.plus.com<\/strong<\/a> which is the &#039;default&#039; account owner email address.<\/p>\n<p>And I was getting spam on this address.<\/p>\n<p>I got scratching my head, because I&#039;ve never sent out a mail from it, and never written it anywhere online. I did briefly use <a href=\"mailto:strong>ds5-domain@kera.plus.com<\/strong\">strong>ds5-domain@kera.plus.com<\/strong<\/a> as the Whois contact email for one of my old domains, but I never got spam off that and it&#039;s a different address anyway.<\/p>\n<p>It seemed totally ridiculous.<\/p>\n<p>But the answer is quite simple.<\/p>\n<p>See, the reverse DNS means that when you connect to most IRC servers, they see you as your hostname and that&#039;s the address that everyone in the channel sees when you join, part, etc. Further, since my account name is a name I use online frequently (deliberately), it&#039;s hardly a co-incidence that my chosen ident username is the same word. Because that&#039;s my identity.<\/p>\n<p>So I end up joining channels with lines like this:<\/p>\n<p class=\"code\">* Joins: tomalak (kera@kera.plus.com)<\/p>\n<p>And quitting like this:<\/p>\n<p class=\"code\">* Quits: tomalak (kera@kera.plus.com) (Reason: bored)<\/p>\n<p>Half by co-incidence and half not by co-incidence, that IRC address (<a href=\"mailto:em>ident<\/em>@<em\">em>ident<\/em>@<em<\/a>host<\/em>) is identical to that unused email address (<a href=\"mailto:em>accountname<\/em>@<em\">em>accountname<\/em>@<em<\/a>accountname<\/em>.plus.com). And although I can not immediately find any Google results for that address, I figure it&#039;s getting onto the web in published archives of IRC channel logs. Ripe for the picking by spambots.<\/p>\n<p>And that, my friends, is how my unused email address is getting harvested: not even as an email address.<\/p>\n<p>Although this won&#039;t be a problem for most with stupid hostnames like <strong>69-11-54-253.ath.ma.comcast.net<\/strong>, that might be something to watch out for if you have a nice, short reverse DNS that might mirror an email account.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I started getting spam on an ISP email account that I don&#039;t even use, I got suspicious. At first I wondered if PlusNet had leaked account names or something. But eventually I figured it out.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[9],"_links":{"self":[{"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/posts\/31"}],"collection":[{"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":0,"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/posts\/31\/revisions"}],"wp:attachment":[{"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/media?parent=31"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/categories?post=31"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kera.name\/articles\/wp-json\/wp\/v2\/tags?post=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}