1994-11-30 - Re: Auto-Verifying of Sigs

Header Data

From: cactus@bb.hks.net (L. Todd Masco)
To: cypherpunks@toad.com
Message Hash: 7224eb1f9fe9719551babb0d46add6e606e0295dd550ff0176124c8b09d9c6f0
Message ID: <3bivdk$q1t@bb.hks.net>
Reply To: <MAILQUEUE-101.941130155708.416@mhc.uiuc.edu>
UTC Datetime: 1994-11-30 22:42:47 UTC
Raw Date: Wed, 30 Nov 94 14:42:47 PST

Raw message

From: cactus@bb.hks.net (L. Todd Masco)
Date: Wed, 30 Nov 94 14:42:47 PST
To: cypherpunks@toad.com
Subject: Re: Auto-Verifying of Sigs
In-Reply-To: <MAILQUEUE-101.941130155708.416@mhc.uiuc.edu>
Message-ID: <3bivdk$q1t@bb.hks.net>
MIME-Version: 1.0
Content-Type: text/plain


In article <MAILQUEUE-101.941130155708.416@mhc.uiuc.edu>,
JEFF LICQUIA (CEI) <JLICQUIA@mhc.uiuc.edu> wrote:
>May I propose a "better" way (you be the judge here): Proxy the job.
...
>What say ye all?  I can tentatively volunteer my business account to do 
>the work (have to talk to my boss about it first, as that account has to 
>pay for volume and phone time).  I'll play with some code in the meantime 
>and see what I can come up with.

Now this is a good idea.   In order to successfully spoof a message, you
would have to block delivery of the spoofed message to the proxy checker
or block transmission of the proxy checker agent's warning.

If you're willing to write the code for it, I'm willing to provide the
machine on the Internet for it to run on.  It shouldn't take too much
effort, but I've already got a gazillion different pots in the fire as is
(not the least of which is getting some c'punk services up on hks.net).
-- 
Todd Masco     | "Roam home to a dome, Where Georgian and Gothic once stood
cactus@hks.net |  Now chemical bonds alone guard our blond(e)s,
cactus@bb.com  |  And even the plumbing looks good."  - B Fuller





Thread