Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Data Storage Security Your Rights Online

Hashing Email Addresses For Web Considered Harmful 155

cce writes "The MicroID standard, despite getting thrashed soundly by Ben Laurie two years ago, has since been recommended by the DataPortability Project and published on the user profiles of millions of users at Digg and Last.fm. MicroID is basically a hash calculated using a user's profile page URL and registered email address, producing a token that makes the email address vulnerable to dictionary attacks. To see how easy it was to crack these tokens, I conducted a small study, choosing 56,775 random Digg users, and cracking the email addresses of 14,294 of them (25%) using just their MicroID, username, and a list of popular email domains. Digg has more than 2 million users, and that means half a million of them — mostly people who had never heard of MicroID, and had probably not logged in for a long time — had their email addresses exposed to this trivial attack. I also applied this attack to Last.fm (19%) and ClaimID (34%). Digg and Last.fm have since removed support for MicroID, but the lesson is clear: don't publish a hash of my email address online, guys!"
This discussion has been archived. No new comments can be posted.

Hashing Email Addresses For Web Considered Harmful

Comments Filter:
  • by pwnies ( 1034518 ) * <j@jjcm.org> on Thursday August 28, 2008 @07:01PM (#24786845) Homepage Journal
    I suppose this is yet another reason why it's nice that a few email services (most notably gmail) allow you to append a string to your email address using the + symbol (e.g. youremail+string@gmail.com will go to the inbox of youremail@gmail.com). In effect it allows you to "salt" your email, which adds a layer of complexity when trying to match these hashes with valid email (not to mention it allows you to check which site compromised your email if you use different 'salts' for each site you use your address on). If more email services start to allow this (doubtful), more sites start realizing that a + in your email is still a valid email (more doubtful), and more users start using it effectively (even more doubtful still), then I don't think the MicroID will be a huge problem.
    • by nblender ( 741424 ) on Thursday August 28, 2008 @07:12PM (#24786965)
      + is a bad delimiter. Many web-forms don't accept email addresses with '+' in the username portion. Attempts to educate webmasters to the information in the relevant RFC's is usually met with silence or worse... I did manage to get a FOAF to fix dell.com though.
      • by Rinisari ( 521266 ) on Thursday August 28, 2008 @07:16PM (#24787003) Homepage Journal

        Maybe that FOAF could attack ESPN.com, too. I tried registering there for a fantasy football league at work and used myaddress+espn@gmail.com. The damned system took the + out, making the address invalid!

      • Postfix Solution (Score:4, Interesting)

        by bill_mcgonigle ( 4333 ) * on Thursday August 28, 2008 @08:57PM (#24788187) Homepage Journal

        Assuming you're using postfix and virtual, you can do something like this:

        main.cf:

        recipient_delimiter = +
        virtual_alias_maps = hash:/etc/postfix/virtual, regexp:/etc/postfix/virtual-regexp

        virtual-regexp: /(.*)\-(.*)@example.com/ ${1}+${2}@example.com

        and then you can do:

            bob-somesite.com@example.com

        this works for every site I've tried but oracle.com, who apparently doesn't want you tracking their mail. :)

      • by mi ( 197448 ) <slashdot-2017q4@virtual-estates.net> on Thursday August 28, 2008 @09:34PM (#24788573) Homepage Journal

        + is a bad delimiter.

        It is the delimiter, originally created as such by the authors of the very first MTA [wikipedia.org]... There is no other character, that:

        1. Can be part of an e-mail address.
        2. Can not be part of a username.

        Many web-forms don't accept email addresses with '+' in the username portion. Attempts to educate webmasters to the information in the relevant RFC's is usually met with silence or worse...

        This is, unfortunately, the truth... Far too many programmer wannabees around... It is a good fight, however, and kudos to GMail for keeping support for it (unlike Yahoo! Mail).

        I use this whenever I can, when giving my address to web-sites (including Slashdot)...

        • by profplump ( 309017 ) <zach-slashjunk@kotlarek.com> on Thursday August 28, 2008 @11:54PM (#24789823)

          "Can not be part of a username" is system-specific (and policy-specific) behavior. I don't allow hyphens, periods, underscores, or numbers in my usernames, and as such they are all valid delimiters.

          Depending on the number of users you have, how abusive they are, and how closely you monitor username selection it's entirely plausible to use a delimiter that *is* allowed in usernames, so long as you don't assign usernames that allow abuse.

          • depending on the number of users you have, how abusive they are [...]

            Well depending on how abusive you are, Mordac [dilbert.com], you may declare the letter "e" (the most frequently occuring in English) to be the separator — and punish attempts to use it as "abuse" by refusing service [philly.com] or worse.

            entirely plausible to use a delimiter that *is* allowed in usernames

            Sorry, I was talking about 99.99% of Unix installations out there. I did not account for yours... My post certainly was system-specific (no e-mail system today can afford to be incompatible with Unix), but trying to be "policy-specific" — accounting for all policies out there — is simply impractical for a generic method.

        • by synaptik ( 125 ) on Friday August 29, 2008 @04:05AM (#24791269) Homepage

          Perhaps what we need is an RFC hall-of-shame... when we find websites that don't support the +, add their domain name to the roster.

          With enough promotion throughout geekdom, it could become such an embarrassing badge of dishonor that it evokes corrective action... similar to getting RBL'd for relaying spam (except that humans react to it, rather than MTA scripts.)

          Wishful thinking?

        • by kju ( 327 ) on Friday August 29, 2008 @05:39AM (#24791821)

          There is no other character, that:
          1. Can be part of an e-mail address.
          2. Can not be part of a username.

          Untrue. The percent character can be used instead. While it was originally used for gateway-adressing, there is no reason not to use it instead for this subadressing. Both conditions are true for the percent character as well. The esclamation mark is another character which comes into mind.

        • by Sapphon ( 214287 ) on Friday August 29, 2008 @07:20AM (#24792343) Journal

          In fairness to Yahoo it should be mentioned that they do let you create what they call "disposable" e-mail addresses that work on the same principle: base_address-your_salt_here@yahoo.XYZ

          That solution may not be as easy or complete as GoogleMail's, but since the other big free e-mail provider out there (Hotmail) doesn't offer it at all, I don't think Yahoo is that bad.

          Now, if only they'd offer free IMAP *sigh*

        • by mrsbrisby ( 60242 ) on Friday August 29, 2008 @07:25AM (#24792377) Homepage

          It is the delimiter, originally created as such by the authors of the very first MTA

          But it didn't originate with Sendmail. The practice originated with qmail, and it's always been in qmail. Sendmail and Postfix added it in response to mail, and they obviously did it wrong.

          There's no reason you shouldn't use - except for the problem that crops up when you have a user named bob and another user named bob-foo which is that bob can't make a .qmail-foo that works. Never mind the fact that the administrator might have made a bob-foo for this exact reason

          And by the way: The + can most certainly be part of a username- I don't know where you got the idea that it couldn't be. The only (printable 7bit) character that cannot be part of a username (on unix, in it's most common configuration) is the : and it is entered into an email address as \:

        • by skeeto ( 1138903 ) on Friday August 29, 2008 @09:46AM (#24793705)

          This is, unfortunately, the truth... Far too many programmer wannabees around...

          It is also unfortunate that perfect e-mail parsing is extremely complex. The Perl regexp for e-mail address validation according to RFC 822 [ietf.org] is about 6.3 kilobytes [ex-parrot.com]. If you try to do it yourself you are pretty much guaranteed to get it wrong.

          Those crappy programmers could still make things much better with liberal validation, allowing some invalid addresses to make validation simpler. Something simple like /[^@]+@[^@]+\.[^@]+/, will match all valid e-mail addresses (I think, and the /. filter won't let me write anything more complex than that anyway) plus a bunch of invalid ones.

        • by aztracker1 ( 702135 ) on Friday August 29, 2008 @12:41PM (#24796733) Homepage
          The problem is two fold.. browsers encoding a space " " to + instead of "%20", and servers that convert a + to a space again... solution would be to replace(trim(email_input), " ", "+") on the server-side form... That doesn't help the user for broken forms though.

          What we *NEED* is for the f-ing browser makers to encode a literal "+" from an input box to "%2B" ... since they're encoding spaces to the "+" sign.
      • Just use dots, then (Score:2, Informative)

        by Cow Jones ( 615566 ) on Thursday August 28, 2008 @11:56PM (#24789835)

        Apart from the fact "+" is a perfectly valid character in an email address, if you're using Gmail, you can insert random dots in your address, and your mail will still get delivered.

        my.name@gmail.com

        is equivalent to

        my.na.me@gmail.com
        my....name@gmail.com
        m.y.n.a.m.e@gmail.com
        etc

      • by jez9999 ( 618189 ) on Friday August 29, 2008 @08:31AM (#24792869) Homepage Journal

        Attempts to educate webmasters to the information in the relevant RFC's is usually met with silence or worse

        What's worse than silence? They hunt down and kill your first-born? :-)

      • by Chyeld ( 713439 ) <{chyeld} {at} {gmail.com}> on Friday August 29, 2008 @11:41AM (#24795627)

        gmail also ignores periods.

        this.is.an.example@gmail.com is the same as th.is.isan.example@gmail.com or thisisanexample@gmail.com.

        You can still salt without needing a +

    • by Anonymous Coward on Thursday August 28, 2008 @07:15PM (#24787001)

      Except that once the salted email is found, everything between the @ and the + will just be discarded.

    • Except that lots and lots of web sites fail at RFC 822 and think + isn't a valid character in an e-mail address. Usually the same sort of maldesigned horrors that make you type your e-mail address twice even though, unlike your password, you can read it as you type to make sure it's correct, or have a single free-form blank for credit card numbers and enforce some idiosyncratic rule on separators (really, is $cc =~ s/-//g; that hard?), or enforce strong passwords and then cripple them with mandatory 'security' questions that allow anyone who knows you halfway well to reset your password.

      Yeah, I use them too, and if web designers were a whole lot smarter they would be a better solution to things like this, but in practice lots of web sites just refuse to accept addresses like that. I should get around to making sendmail let me use an underscore instead of a + for that purpose.

    • by statemachine ( 840641 ) on Thursday August 28, 2008 @07:55PM (#24787421)

      Giving out e-mails with "+something" is worthless for spam. The malicious spammers will just strip the "+something" from address, as both can be delivered, but the short form will be less likely filtered, and you won't know which service it was sold/stolen from.

      I actually make a separate alias for each site eg. name-something@example.com. If you shorten my alias to the part before the hyphen, it won't deliver. Yes, spammers have tried.

      If you're using "+something" just know that you might as well not append that onto your e-mail address, for all the good that it does, as you're giving out your primary address anyway. Cat, bag, already open.

      • Yeah, this can happen, but I dunno that this is as big a problem as you think. Spammers just plain aren't all that bright, and they don't care very much if they miss the tiny proportion of addresses that geeks try to protect like this when there are so many totally unprotected addresses so easy to obtain. It seems like a lot of the time, when they try to harvest addresses, the harvester doesn't realize + is a valid character in an address and only gets the part after the plus sign. I bounce a lot of spam sent to addresses like slashdot@persephoneslair.org and usenet@persephoneslair.org.

        • by statemachine ( 840641 ) on Thursday August 28, 2008 @08:29PM (#24787843)

          And the few times a harvester is correctly written? What then? That's the address that gets spread around. Obscurity doesn't work on the Internet. Just don't post it at all.

          But you seem fine with it because you're also posting your personal domain name here, which links to your name and your photo, along with a street address and phone number (which I hope are only P.O. box and a voicemail-only phone service). You're a hell of a lot more comfortable with it than I am. (At least I hope you knew that all that info was very publicly available.)

          • by cduffy ( 652 ) <charles+slashdot@dyfis.net> on Thursday August 28, 2008 @08:52PM (#24788123)

            Obscurity doesn't work on the Internet.

            So why bother?

            Someone who was serious could get into public records and get my address anyhow (owning a house generates lots of public records). Someone who isn't serious presumably doesn't pose a threat. I think the worst thing that's actually likely to happen is 4chan-style harassment, and (1) it's not particularly likely, as I don't hang around those types enough for them to care about me, and (2) if it did happen, countermeasures are certainly available. And, again, (3) if anyone were serious enough about it, they could find all the relevant information through other channels anyhow.

            Being nymous online is a Good Thing -- it means people I know IRL can recognize me (I've run into ex-coworkers and old friends I didn't think I'd see again) and it gives me a chance to build a reputation that follows me into Real Life (so potential employers find plenty to recommend me when googling my name). Further, it acts counter to the tendency for anonymous communication to degrade into... well, you're on slashdot; you know exactly what I'm talking about. :)

            • by statemachine ( 840641 ) on Thursday August 28, 2008 @09:05PM (#24788269)

              (2) if it did happen, countermeasures are certainly available

              No, they're not. Not in the way that you think.

              1) Police are very limited in understanding and action with harassment crimes.
              2) Retaliating will likely get *you* into trouble, rather than the initial tard.
              3) Even if you do get a civil judgement, these people likely have nothing to lose. Therefore, you lose.
              4) Sending them to jail just makes them more pissed off. Then re-visit #3.

              In public forums like this, there are a lot of crazies on both sides of any argument. It's best to limit your exposure, unless you don't mind inviting trouble.

              • by cduffy ( 652 ) <charles+slashdot@dyfis.net> on Thursday August 28, 2008 @09:34PM (#24788571)

                No, they're not. Not in the way that you think.

                Your guesses regarding what I think are inaccurate: my idea of a fun weekend is updating the rules for my asterisk server used to filter phone spam.

                To be sure, I don't particularly want to deal with cleaning up my credit report after some asshat decided to steal my identity in return for asking him to clean up his language in a public IRC channel... but hey, them's the risks with being out on the Internet these days, and (as before) I don't interact with those people enough to be a particularly likely target. (Also, my wife is a legal geek; as such, we're better prepared for effective self-representation than most, making getting that worthless civil judgment an easier process than it would be otherwise).

                If we get physical vandalism... well, that depends on the time and circumstances. Malicious mischief after dark is a shooting offense here, though, making it riskier to attempt and thus less likely -- and we have dogs who tend to be defensive of their property and its owners, and adult family members with work schedules that rotate such that at least one person is home at almost all times (and able to respond if the dogs indicate trouble); as such I'm not exceptionally worried on that account.

                • by statemachine ( 840641 ) on Thursday August 28, 2008 @09:53PM (#24788759)

                  Well, see, that's what you're comfortable with. ;) I prefer to be happy, which, as part of my definition, excludes all the crap you have to go through to protect yourself. Sure, what I do isn't perfect, but it's yet another several steps and guesses for someone to get to the point where I need to do what you're talking about. Why make it easy?

                  • by cduffy ( 652 ) <charles+slashdot@dyfis.net> on Thursday August 28, 2008 @10:11PM (#24788919)

                    Hey -- we didn't arrange our schedules that way on purpose; it just happened as a happy accident. Likewise, I mess with Asterisk first and foremost because I think it's fun, and only secondarily because I dislike phone spam. (We did decide to do the large-dog thing as a security measure, but that was for late-night walks outside, not protection of the household proper -- and any weaponry we may have usable for home defense would have been purchased primary for recreational hunting; that said, I don't disclose the presence or lack of such online). I don't put myself through a whole bunch of hassle because I'm paranoid about security, and I'd probably still decide to be as easily identifiable online as I am had things not worked out that way, on account of the benefits I gave earlier (ability to translate online reputation-building into real-life interactions, which I really do think is a serious and compelling advantage)... that said, when it comes down to defending my decision, the set of happy accidents comes in handy.

                    I agree with you that paranoia is contrary to happiness -- that's part of why I'm comfortable with having my identity online; if I had to live in a mental state such that I believed people as a whole to be an irresponsible set (or such irresponsible people to be numerous enough to be worth thinking about), that mode of thought would, in and of itself, make me less happy.

            • by steelfood ( 895457 ) on Friday August 29, 2008 @11:24AM (#24795335)

              I don't know about you, but if I have an e-mail address listed on my resume that can be linked back to a fair amount of my internet doings.

              On the other hand, they cannot be linked to my /. account. Why? Because it wouldn't be a great idea if they could read all of my /. posts. Discriminatory hiring practices is illegal, but you need proof of that.

              That's my main reason for separating my profiles and keeping them separate. I'm sure law enforcement could, with the appropriate warrants, link everything back together again. But most people won't be able to, and that's good enough for me for now.

        • by daeg ( 828071 ) on Thursday August 28, 2008 @09:42PM (#24788661)

          Spammers aren't bright? So spam filtering is easy, right?

          One (partial) solution is to have large providers provide alternate domains that you can register throw-away addresses. For instance, under Google Account settings, you might have the option to generate an address from cephelo@gmail.com and assign d785jd47fj@southeast.gmail.com and allow you to record a note that you intend to use d785jd47fj@southeast.gmail.com as your Amazon.com user ID.

          As time progresses, Gmail can show you stats that, for example, 100% of e-mail on d785jd47fj@southeast.gmail.com is spam - "Do you want to delete this account?" and poof - the spam stops. Now that address automatically becomes a honey pot.

      • by Z00L00K ( 682162 ) on Friday August 29, 2008 @02:11AM (#24790753) Homepage Journal

        Just consider that email addresses are a public affair.

        Sometimes you want a new email address for each service you register to and by that be able to track mail harvesters if you feel like that.

        The easiest way is to have a junk email address that you already get spam on when you register at various sites and then let the junk filter take care of the worst.

        And expect spammers to use a lot of various techniques to circumvent obfuscation. It's all about pattern matching - and adding a lot of standard names like 'john' when flooding a site.

    • by aj50 ( 789101 ) on Thursday August 28, 2008 @08:03PM (#24787511)

      Except that some web forms (and some mail servers) won't accept an email address with a '+' in it.

      We use these types of addresses at work to organise replies to tickets and some people's mail set-ups really screw things up.

    • I used to do something similar on my personal mail server. What happened was that a few poorly-administered email lists had my raw address in that form in the public archives. So now my address ended up on spammer lists three multiple times, and I'd get the same spam on three "different" addresses at the same time.

    • by Builder ( 103701 ) on Friday August 29, 2008 @06:33AM (#24792085)

      Many sites including Microsoft's Xbox site and TomTom do not accept the + sign as part of an e-mail address. This makes it worthless.

      Combined with Google Apps for Domains having allowing only a very small number of aliases, and we're back to having to run our own MTAs and dealing with all that grief, spam and wasted bandwidth :(

  • by Butisol ( 994224 ) on Thursday August 28, 2008 @07:10PM (#24786945)
    I've read up on it, but I don't understand how it benefits the user, vulnerability aside.
    • by Fred Ferrigno ( 122319 ) on Thursday August 28, 2008 @07:44PM (#24787301)

      I read up on it and I'm still confused, but I think this is the idea:

      1. You set up an account at website Alpha.
      2. You have a publicly-viewable profile page at Alpha. On the page is your MicroID.
      3. You set up an account at website Beta.
      4. You tell Beta about your Alpha profile page.
      5. Beta verifies that your Alpha profile page is really yours by checking the MicroID.

      Beta can't really do anything with your Alpha page except link to it. I guess the point would be to prevent people who aren't you from linking to your Alpha page on their Beta pages. That way, other people can be sure that the same person owns both accounts.

      The attack mentioned in the article doesn't compromise the proper use of the MicroID, since Beta is assumed to have verified that you own your email address and you wouldn't link to a profile page claiming to be yours that wasn't. All it does is make it possible for spammers to harvest your email.

  • by TubeSteak ( 669689 ) on Thursday August 28, 2008 @07:16PM (#24787011) Journal

    To find out valid e-mails, couldn't a spammer just send out an e-mail blast to username@top5emaildomains.com and throw away all the bounces?

    You wouldn't need a hash of any sort to do that kind of trivial attack and it isn't like the serious spammers are lacking in bandwidth or resources.

    • by TheNarrator ( 200498 ) on Thursday August 28, 2008 @07:41PM (#24787281)

      I do my own mail forwarding for a small domain that I own. There are about 20 valid email addresses at that domain. For the last year at least I have had a botnet harassing my mail server trying every conceivable random email address at my domain. I tried blocking by ip and iptables got so huge (10000+ ips) that it just about crashed my machine. I finally implemented gray listing so my machine just tells the botnet to buzz off and doesn't store any data but it's still an on-going problem. This whole botnet thing is like some surreal science fiction movie.

      • by TheRaven64 ( 641858 ) on Friday August 29, 2008 @07:04AM (#24792251) Journal
        You might want to try OpenBSD's spamd in front of your machine. It can happily handle a few tens of thousands of connections on a moderate-spec machine. It is designed for very low CPU usage and replies to each greylisted connection insanely slowly. This means that it can take up to ten minute for a sending server to finish receiving the bounce notification. It ties up spambots quite effectively and stops them hammering your mail server.
  • by Digitus1337 ( 671442 ) <lk_digitus@@@hotmail...com> on Thursday August 28, 2008 @07:20PM (#24787051) Homepage
    Slashdot uses an e-mail scheme like that. Yeah, there it is, right there ^^^.
  • by RevDigger ( 4288 ) <haroldp@i n t e r n al.org> on Thursday August 28, 2008 @07:23PM (#24787075) Homepage

    This concern that you may have your email address *discovered* by spammers because you post it on a web page is so 5-years-ago. They already have your email address, and they probably didn't get it by scraping web pages.

    When you have sent a couple emails out with a given address, you can figure that at least one of them will to sit around in someone's Outlook mailstore for the next couple years. (Someone you know uses Windows!) When that person's computer gets infected with spam gang malware (as they all do), they have your address.

    Once of them has it, they probably all have it.

    • by John Hasler ( 414242 ) on Thursday August 28, 2008 @07:32PM (#24787161) Homepage

      > Once of them has it, they probably all have it.

      But they don't know that it is yours. They can spam you with it but they can't use it for anything else.

      • by oldspewey ( 1303305 ) on Thursday August 28, 2008 @09:04PM (#24788263)

        They can spam you with it but they can't use it for anything else

        Actually, in addition to spamming you, they can use your email address in the from and reply-to field for their next spam run.


        Ask me how I know.

      • It may evolve to the point that these characters will want to invest the effort in really carefully targeting their marks. I have heard it called, "spear phishing," but I have never actually seen it.

        If they really wanted to do that, I would think they'd start by harvesting info from the million zombie pcs they root. I *have* seen a worm that eavesdropped on FTP to steal login info, and tag sites with malware, but that is about all I have seen in the wild.

        Most of the spam/phish gang action I see, seems to be very big nets, cast very wide.

        Again, that may change over time.

      • by TheRaven64 ( 641858 ) on Friday August 29, 2008 @07:08AM (#24792267) Journal

        Depends. If the user keeps their address book up to date then they also know your full name, address, telephone number, possibly date of birth, and so on. There were quite a few Outlook worms that allowed the author to gain full access to the address book.

        And you don't have to send the person email. Meet them, bluetooth your vcard to their phone. They go home and sync it with their Windows box, and all of that information goes in their address book. Then they get a worm / trojan and that information goes to s{p,c}ammers. This is why you should never assume that anything that you might find in an address book is confidential information - banks who try to authenticate you by asking for your postal address or date of birth really need prosecuting for negligence.

    • by cce ( 24686 ) on Thursday August 28, 2008 @08:11PM (#24787597) Homepage

      I'd argue that the added value of a spammer getting an email address connected to your online "identity" -- your user profile, recently-played Last.fm songs, favorite Digg articles, etc -- makes getting your email from a MicroID a little more valuable than the ordinary harvested email address. Plus, they don't have to bother confirming the address to see if it's still active (Digg already did).

    • by eh2o ( 471262 ) on Thursday August 28, 2008 @08:19PM (#24787715)

      Yes!! Not only is it pointless to try to hide, the modern spam filter (e.g., gmail) is at least 99% effective. I put my email in plaintext and even in mailto: links all over the place and I have no serious problem with spam.

      Writing junk like foo [at] bar [dot] com simply wastes time time of your colleagues and friends, who now have to rewrite your address by hand, and confuses the non-techies.

      • by SeinJunkie ( 751833 ) <seinjunkie@gmail.com> on Thursday August 28, 2008 @09:42PM (#24788653) Homepage

        Writing junk like foo [at] bar [dot] com simply wastes time time of your colleagues and friends, who now have to rewrite your address by hand, and confuses the non-techies.

        How dare you!? The hours I spend every week crafting clever rewrites of my email address is precisely that which keeps the spammers on their toes. How else do you think Gmail capable of filtering any spam mails out? I'm keeping their volume down. It's not just some stupid security superstition, either: it really works! And way better than whatever algorithm they're training over in Mountain View.

        From,
        seinjunkie@gmail.com [mailto]

    • I fully agree with the parent. The idea of keeping an email address that you actually use private is several orders of magnitude sillier than thinking your credit card number and social security number hasn't been stolen a dozen times already.

      But there is one place I won't "publish" my email address (jeffrey@goldmark.org), and that is in the From line of a Usenet posting. Reply-to is fine, and there absolutely no problem in the body of messages, but tests have shown that putting something in the From line of a Usenet posting will give you a very noticeable increase in spam.

    • They're also still scraping e-mail addresses off the web. And no, just because one spammer has your address does NOT mean that all spammers have it: spammer #1 is not going to give your address to spammer #2 without compensation, so unless spammer #2 buys a collection of addresses from spammer #1 (they were going for about $500 for a database on CD-ROM last time I checked), or spammer #2 discovers your e-mail address independently, then no, spammer #2 doesn't have your address.

    • by steevc ( 54110 ) on Friday August 29, 2008 @03:16AM (#24791081) Homepage Journal

      Spammers got my main email ages ago and seem to have hacked a few forums for one-off addresses I used there too. So I don't worry too much about giving out my email address. The spam is mostly filtered, so I don't have to see it.

      I'm not sure exactly where they got my address from. It could have been on a keyserver. Searching for my address finds lots of hits on those. Much easier than trying to extract it from a MicroID. Those were potentially useful for proving identity.

      That said, spammers, identity thieves and other low-lifes have conspired to make the internet less useful than it might have been since we cannot share as much information as we might want to. I'm still wary of sharing some details on social sites and in my FOAF file. Others seem less bothered about this or perhaps just don't realise the risks.

      The internet could have been a universal phone/address/email directory, but too many people would abuse that.

  • by wtfispcloadletter ( 1303253 ) on Thursday August 28, 2008 @07:39PM (#24787241)

    This is exactly the reason I don't use Gravatar. They even tell everyone they are morons right here:
    http://en.gravatar.com/site/implement/url [gravatar.com]

    I didn't know anything about them except that someone in a forum was describing how you could have the same avatar in compatible forums that you participate in. The second I read that your hashed email address was part of the URL I turned around and never looked back knowing full well that if someone wanted to, they could eventually get my email address.

    • by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Thursday August 28, 2008 @09:48PM (#24788727) Journal

      The second I read that your hashed email address was part of the URL I turned around and never looked back knowing full well that if someone wanted to, they could eventually get my email address.

      Erm, WTF?

      I don't like Gravatar either, as it's a centralized service, and one which frequently goes down.

      But you're afraid that, given a hash, someone can find your email address? Do you understand how hashing works?

  • by mellon ( 7048 ) on Thursday August 28, 2008 @07:45PM (#24787311) Homepage

    The bottom line is that unless you don't have any online presence, your email address is going to leak, and it's going to wind up on spammer's lists. If you want to avoid getting spam, some other solution is called for.

  • by hdon ( 1104251 ) on Thursday August 28, 2008 @07:48PM (#24787345)
    I wrote about this earlier this year. [socsurveys.org] My conclusion, more or less, was to carefully read the specification, which Iâ(TM)ll excerpt here:

    By itself, a MicroID has no inherent meaning, since it is simply a string created from two URIs. Any entity can generate a MicroID even if it has not verified the identity of the resources associated with one or both URIs. Furthermore, a MicroID is easily copied by an entity that did not generate it. Finally, a MicroID is not digitally signed by the entity that generated it and therefore cannot be cryptographically associated with the generating entity.

  • Flawed study? (Score:2, Insightful)

    by dmuir ( 964412 ) on Thursday August 28, 2008 @08:10PM (#24787583)
    What's the difference between attacking the MicroID to collect email addresses, and running a dictionary attack on email servers using people's usernames?
    • Re:Flawed study? (Score:4, Informative)

      by QuantumG ( 50515 ) * <qg@biodome.org> on Thursday August 28, 2008 @08:22PM (#24787745) Homepage Journal

      Offline attacks are better because they:

      1. can't be monitored
      2. can't be blocked
      3. are not limited by bandwidth
      4. can be sped up by throwing more hardware at them

      This is basically why salting was added to the unix password file. And that failed.. so /etc/shadow was introduced. Revealing hashes is just unnecessary, so don't do it.

  • by EWAdams ( 953502 ) on Thursday August 28, 2008 @08:41PM (#24787963) Homepage

    Personally, I can't get clients unless they know how to get in touch with me.

    And don't moan about spam. My E-mail address is widely published and maybe one or two messages a week gets through the filters.

  • by porneL ( 674499 ) on Thursday August 28, 2008 @09:46PM (#24788693) Homepage

    I guess Gravatar.com will now have to ecourage proxying of avatars via sites' web servers.

  • by Ed Avis ( 5917 ) <ed@membled.com> on Friday August 29, 2008 @02:12AM (#24790763) Homepage

    You are worried because someone, if they really wanted to send you some mail, could go to the trouble of doing a CPU-intensive search against some hash shown on a website and find out that ultimate, embarassing secret: your *email address*??

    What gives? Email addresses are designed to be public. If you don't want people you do not know to be able to contact you, then you are free to drop all mail from unrecognized addresses. If you want to set up some kind of secret knowledge that people must have in order to contact you, then ask them to put a particular word in the subject line when first sending you a message. Either of these does not rely on keeping the address secret, which just isn't likely to happen.

    The only thing more broken than trying to keep an email address secret is trying to make a 'private' web page by keeping the URI secret. Again, the system is designed so that the address itself is not sensitive, but other information such as a password or PGP key can be.

    Actually, what it reminds me of most is the crazy situation in the US where a basically public identifier, the social security number, is abused as some kind of secret token. Hence all the fuss made when it is possible to find out someone's SSN. The answer is not to add more and more baroque means to stop the SSN from leaking out: one breach, and it's no longer a secret.

    I understand the desire to stop spam address harvesters, but really, there are hundreds of web sites which display email addresses with only light obfuscation, enough to stop a harvester bot but not a determined human being (or someone determined enough to use an OCR engine). The kind of hashing talked about here is way more difficult to undo than that. If you are even more paranoid, you need to revisit your assumptions of what is public and what is secret.

    • by beakerMeep ( 716990 ) on Friday August 29, 2008 @06:21AM (#24792003)
      That may be fine for you but not everyone uses an email as a public contact point. In fact not everyone even lists their phone number.

      See the thing is, people have a funny way of deciding for themselves how they want to use technology (and, well, everything). And there really is nothing wrong with some people wanting a semi-private email.
  • by MisterBad ( 40316 ) on Saturday August 30, 2008 @12:24AM (#24806365) Homepage

    It seems like the attack is just taking user names and other publicly-known data trying to determine an email address from them. Spammers don't need microid to confirm that their guess is correct; they'll just send to all 50 or 100 top email domains, hoping to get a hit.

    The whole point of MicroID is that if someone knows your email address, they can tell that you are the author of the page. If your email address is easy to guess, then your email address will be revealed, _whether_or_not_ there's a microid here, there, or anywhere.

    If an email address is easy to guess, then the email address is easy to guess. Not clear what new ground we're covering here.

Force needed to accelerate 2.2lbs of cookies = 1 Fig-newton to 1 meter per second

Working...