• Fw: Domain Spoofing (was: any of this...)

    From noreply@noreply@mixmin.net to alt.free.newsservers on Thu Jul 24 22:17:42 2025
    From Newsgroup: alt.free.newsservers

    On Thu, 24 Jul 2025 20:12:35 +0200 (CEST), Nomen Nescio <nobody@dizum.com> wrote:
    Message-ID: <d865d65b6cad977c32f162eb2ec56aaa@dizum.com>
    Path: news..!news.mixmin.net!news2.arglkargh.de!sewer!news.dizum.net!not-for-mail
    Injection-Info: sewer.dizum.com - 2001::1/128'

    headers look correct, @dizum.com, .dizum.net, .dizum.com . . . _looks_ correct,
    but considering the flood of anti-anonymous remailer propaganda (by tor-mailer promoters) in this and other busy usenet newsgroups especially within the past several years, could these hawkish operatives be using their "mini-mailers" to
    spoof real domain names, such as appearing in message id and path headers etc.?

    https://duckduckgo.com/?q=domain+spoofing . . . i've been subscribed to usenet newsgroups since 1997, yet i don't recall ever reading about "domain spoofing" in the context of usenet article headers ever before . . . i'll post a copy of
    this reply to news:news.software.nntp , and perhaps some other relevant groups (not that i would expect any replies, but lurkers abound, and word gets around)

    if domain spoofing is more common than i'd ever heard of, some usenet articles
    w/message ids might be educational for others reading as well, and furthermore could domain spoofing be used against authentic anonymous remailers, mail2news gateways, that use common top-level domain such as .com, .net, and if so, what
    about the increasingly common "onion" address *.onion, could tor get "spoofed"?


    --- Synchronet 3.21a-Linux NewsLink 1.2