I've known Jim Mercer (reptiles.org) very well for a long time.
There's a bit of history there. I'd be fun to put them together
in a public debate. I think highly of both of them.
Everybody is somebody elses loon.
At 01:22 PM 11/3/99 -0800, you wrote:
>
>>From NANOG today......
>
>-----FW: <[EMAIL PROTECTED]>-----
>
>Date: Wed, 3 Nov 1999 11:19:41 -0500
>Sender: [EMAIL PROTECTED]
>From: Jim Mercer <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>Subject: possible scam?
>
>
>
>the following two messages were recieved by me (and more likely many others)
>
>the author, Joe Baptista, is a known loon in the Toronto area.
>
>i'm not sure if he has reformed or if this is some scam he is running.
>
>Message #1
>----- Forwarded message from [EMAIL PROTECTED] -----
>Date: Wed, 3 Nov 1999 05:23:10 -0500
>From: [EMAIL PROTECTED]
>To: [EMAIL PROTECTED]
>Subject: hello hostmaster for SOA [EMAIL PROTECTED]
>
>-
>
>Hello:
>
>--
>
>Hello:
>
> *******************************************************************
> * ATTENTION - Our SMTP (MailServers) are being subjected to a DOS *
> * (Denial of Service) Attack.
> * *
> * BECAUSE OF THIS ATTACK - you may receive two copies of this *
> * this email. *
> *******************************************************************
>
>I am a domain administrator with Planet Communications & Computing
>Facility. We are a private network research facility. I am contacting
>you with respect to the BIND 1999 Survey of Internet hosts and ICANN -
>the Internet Corporation for Assigned Names and Numbers.
>
>We conduct and maintain the BIND (Berkley Internet Name Daemon) survey
>databases. Over the years we have used the BIND surveys to assist the
>United States Government and the Department of Defense in closing security
>holes in the domain name system infrastructure.
>
>This year we have received financial assistance which has allowed us to
>conduct an extensive enumeration of internet domain name servers. You
>are receiving this message because servers where you are listed as the
>SOA (source of authority) have been included in the most recent BIND
>data.
>
>We would like to invite you to pickup a report from us which details all
>information available on your servers as reported in the public dns
>system. The report includes a number of tests results from queries made
>on your name servers and provides details on the status of any failed or
>passed tests. If you are running BIND versions which can be hacked, or
>are insecure, those detail are reported and supporting information
>provided to assist you in closing potential security holes.
>
>A separate message has been emailed to you with instructions on how to
>extract information on your servers from our databases. It's fairly
>simple, all you have to do is reply to the message and keep the subject
>line intact. We have emailed it with a subject header labeled
>CONFIDENTIAL. In the event you may want to forward this message to
>others, you can do so without inadvertently allowing access to your
>database records.
>
>We hope that you find this information of assistance. Our intention is
>to fix the numerous problems encountered in the public domain name
>system. This year we enumerated in excess of 200,000 name servers.
>Of those 25,000 have misconfigured SOA records, 12,000 do not resolve,
>62,000 are no longer operational and 22,000 can be easily hacked.
>
> - ICANN -
>
>In conclusion I would like to ask that you take an active role in
>Internet Governance.
>
>The United States Government has assigned control of the Internet
>Domain System and Infrastructure to ICANN (The Internet Corporation
>for Assigned Names and Numbers) which represents big business
>interests, trademark lawyers and public telephone companys. ICANN
>intends to tax domain names and the ip infrastructure. To date a
>number of regulation have been imposed on internet registrars which
>take away existing rights and claims to second level domain names.
>
>As a result of these efforts, a number of organizations have started
>alternate root infrastructures and intend in competing with ICANN.
>
>This November 1-4 ICANN will be holding public meetings in Los Angeles.
>If you live in or near LA, please try to attend. If you don't, you can
>participate via remote. Please help us get the word out.
>
>Information on the meeting is available at:
>
> http://bind1999.pccf.net/resources/meetings/
>
>Information on the people involved in what has been termed the domain
>name system wars is available at:
>
> http://bind1999.pccf.net/resources/
>
>It is critcal to the internets future that it remain an open system. As a
>domain administrator you have control over the root cache file which now
>points to the United States Government (USG) root servers. If you don't
>like what ICANN and the USG is doing - you have the power to switch.
>
>A number of alternative root servers now exists to assist you in making
>that choice.
>
>Thank you for your time.
>
> Regards
> Joe Baptista, Director
> Public Research
>
>----- End forwarded message -----
>
>Message #2
>----- Forwarded message from [EMAIL PROTECTED] -----
>Date: Wed, 3 Nov 1999 05:23:11 -0500
>Message-Id: <[EMAIL PROTECTED]>
>From: [EMAIL PROTECTED]
>To: [EMAIL PROTECTED]
>Subject: CONFIDENTIAL @TICKET:Nn181H4N@[EMAIL PROTECTED] - ACCESS to BIND
>report
>
>-
>
>Hello:
>
> *******************************************************************
> * ATTENTION - Our SMTP (MailServers) are being subjected to a DOS *
> * (Denial of Service) Attack. Please see the following URL for *
> * more instructions http://bind1999.pccf.net/resources/ *
> * *
> * BECAUSE OF THIS ATTACK - you may receive two copies of this *
> * this email. *
> *******************************************************************
>
>This message is automatically generated by the BIND (Berkeley Internet
>Name Daemon) Survey maintained by Planet Communications & Computing
>Facility, Ottawa, Ontario.
>
>A message with a detailed explaination of the survey has been emailed to
>you under separate email cover.
>
> ATTENTION - WARNING - ATTENTION
>
>This message contains details and access instructions on recovering survey
>data collected by us from the public domain name system. A report of all
>name servers under your SOA RR (source of authority resource record) in
>which you have been listed as hostmaster.
>
>To recover the information - you can reply to this message making sure you
>keep the subject header intact, or you can email [EMAIL PROTECTED] with a
>subject line of:
>
> @TICKET:Nn181H4N@[EMAIL PROTECTED]
>
>
>Please include the entire ticket - including ending period.
>
>Please make sure you delete the body of the message, so you don't
>confuse our mailers.
>
>Please note, it may take up to 24 hours for the system to compile your
>report. We are currently experiencing a denial of service attack
>which has delayed delivery of email.
>
>If you mailer sends autoreplies, you may already have your report.
>
>
> Regards
> Joe Baptista, Director
> Public Research
>
>
>----- End forwarded message -----
>
>--------------End of forwarded message-------------------------
>
>--
>William X. Walsh - DSo Internet Services
>Email: [EMAIL PROTECTED] Fax:(209) 671-7934
>Editor of http://www.dnspolicy.com/
>
>
>
>
--
[EMAIL PROTECTED] [EMAIL PROTECTED]
"I see you've got yout fist out. Say your peace and get out. Guess
I get the gist of it, but... it's alright. Sorry that you feel that
way. The only thing there is to say is to say: ever silver lining
has a touch of grey" - JG.