Silk Road forums
Discussion => Security => Topic started by: KidCharlemagne on April 25, 2012, 09:48 pm
-
This is just the way I see it, but...
If some evil government agency really wanted to, they could direct ANYTHING coming into the tormail.net domain, to their own "catch-all" mail/web servers, and do some seriously fucked up snooping/phishing. ALL mail sent from the Internet/EXTERNALLY, to the now defunct tormail.net domain, would be theirs for the taking - AND, they could even spoof and/or re-direct the login webpage of tormail.net, and probably have lots of unsuspecting peoples real login info. DO NOT TRUST tormail.NET - ONLY USE tormail.ORG - unless someone seriously reliable says otherwise (and can back it up 100%).
The main thing is to keep an eye on are the MX (and A) record(s) for tormail.net. If they ever start pointing to a real server(s) again, and it doesn't belong to tormail, and is not routed through Tor, watch the fuck out..
Right now, everything looks OK - but there are always other ways to do things (dynamic routing, for one)..:\
--------------------------------------------
Alerts:~# dig MX tormail.net
; <<>> DiG 9.3.4 <<>> MX tormail.net
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;tormail.net. IN MX
;; AUTHORITY SECTION:
net. 895 IN SOA a.gtld-servers.net. nstld.verisign-grs.com.
1335389274 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 8.8.4.4#53(8.8.4.4)
;; WHEN: Wed Apr 25 16:28:36 2012
;; MSG SIZE rcvd: 102
Alerts:~#
---------------------------------------------
-
KC