Re: [TLS] Implementation survey: Client Certificate URL extension

Nelson B Bolyard <nelson@bolyard.com> Sat, 05 April 2008 01:22 UTC

Return-Path: <tls-bounces@ietf.org>
X-Original-To: tls-archive@ietf.org
Delivered-To: ietfarch-tls-archive@core3.amsl.com
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B89BB3A69C9; Fri, 4 Apr 2008 18:22:50 -0700 (PDT)
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A0D273A69C9 for <tls@core3.amsl.com>; Fri, 4 Apr 2008 18:22:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.213
X-Spam-Level:
X-Spam-Status: No, score=0.213 tagged_above=-999 required=5 tests=[AWL=-0.938, BAYES_50=0.001, SARE_CHILDPRN1=1.15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gs+pMcMYCJiA for <tls@core3.amsl.com>; Fri, 4 Apr 2008 18:22:47 -0700 (PDT)
Received: from smtprelay.hostedemail.com (smtprelay0066.hostedemail.com [216.40.44.66]) by core3.amsl.com (Postfix) with ESMTP id 00B233A67FE for <tls@ietf.org>; Fri, 4 Apr 2008 18:22:46 -0700 (PDT)
Received: from emd2-omf04.hostedemail.com (ff-bigip1 [10.5.19.254]) by smtprelay01.hostedemail.com (Postfix) with ESMTP id C4A25F2D02 for <tls@ietf.org>; Sat, 5 Apr 2008 01:22:52 +0000 (UTC)
X-SpamScore: 30
X-Spamcatcher-Summary: 30, 2, 0, f0592bbd52fcd08e, 8f52778dc8a64581, nelson@bolyard.com, -, RULES_HIT:152:355:379:599:601:946:978:988:989:1187:1260:1261:1277:1311:1313:1314:1345:1359:1437:1515:1516:1518:1534:1537:1560:1593:1594:1676:1711:1714:1730:1747:1766:1792:2393:2559:2562:3027:3865:3867:3870:4206:4250:4321:4647:5007:6119:7652, 0, RBL:none, CacheIP:none, Bayesian:0.5, 0.5, 0.5, Netcheck:none, DomainCache:0, MSF:not bulk, SPF:, MSBL:none, DNSBL:none
X-Spamcatcher-Explanation: (100%) BODY: contains "porno" obfuscated;
Received: from [192.168.2.5] (c-67-164-81-7.hsd1.ca.comcast.net [67.164.81.7]) (Authenticated sender: nelson@bolyard.com) by emd2-omf04.hostedemail.com (Postfix) with ESMTP for <tls@ietf.org>; Sat, 5 Apr 2008 01:22:52 +0000 (UTC)
Message-ID: <47F6D4EA.307@bolyard.com>
Date: Fri, 04 Apr 2008 18:24:58 -0700
From: Nelson B Bolyard <nelson@bolyard.com>
Organization: Network Security Services
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.9b5pre) Gecko/2008031700 NOT Firefox/2.0 SeaMonkey/2.0a1pre
MIME-Version: 1.0
To: tls@ietf.org
References: <200804041253.m34Crdxq028117@fs4113.wdf.sap.corp>
In-Reply-To: <200804041253.m34Crdxq028117@fs4113.wdf.sap.corp>
Subject: Re: [TLS] Implementation survey: Client Certificate URL extension
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tls-bounces@ietf.org
Errors-To: tls-bounces@ietf.org

Martin Rex wrote, On 2008-04-04 05:53:

> Generating advertising "clicks" might be another abuse. 

Generating "clicks" on child porno sites might be enough to bring the FBI
to visit the victim site's sys admins, in the USA.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls