Re: Sleuthing [Re: [expert] Looking for the Spoofer (was Reading Email headers)]

2002-04-22 Thread daRcmaTTeR

yeah! no complaints here. Some of the most interesting information I've
read in a while on the expert list.

Mark

 Just a vote to keeping the discussion on-line -- I'd like to try to
 follow it.

 Randy Kramer

 Pierre Fortin wrote:
  This is an interesting thread that can be educational for anyone
that
  wishes to follow...  it is a bit off-topic and we can take it
offline if
  it bothers anyone...








 Want to buy your Pack or Services from MandrakeSoft?
 Go to http://www.mandrakestore.com





Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: [expert] Looking for the Spoofer (was Reading Email headers)

2002-04-21 Thread J. Craig Woods

On Sat, 2002-04-20 at 22:05, Pierre Fortin wrote:
 On Sat, 20 Apr 2002 21:00:29 -0500 Jason Guidry [EMAIL PROTECTED]
 wrote:
 
  
  It looks like someone has decided that I don't have enough headaches and
  
  has started sending me viri.  Normally this would not bother me, but the
  
  problem is that the from line shows my email address on my website 
  [EMAIL PROTECTED]!
 
 Spoofing by spammer(?) at 66.24.19.151 (syr-66-24-19-151.twcny.rr.com).
  

I have received several of these types of infected email (W32/Klez.e@MM)
coming to a win2000 box on my network. Pierre is correct in his
assumption about spoofing being done. It appears that the virus code
does the spoofing. This code generates an email, with the virus file
attached, and this email is then sent. This email, the one generated by
the offending machine, is created as though I am the originator, which I
am clearly not. This is where the spoofing comes to be a part of the
process.

Now, here is the question for Pierre or any others that might have some
thoughts on this. In my investigation of this matter, I have made the
following observations:

The only logical way that the offending machine would know to use my
address (spoofing) as the originator is that this person/machine is
using some variation of Outlook, such as Outlook Express or Outlook
(W32/Klez.e@MM only works with version of MS Outlook), and this means
that my address is in that person/machine's address book, i.e. someone
that knows me or at least has my address in their address book, is
responsible for sending this virus email that has my address at the
originator. It could be that this person/machine is *not* aware that
this is occurring but this is nonetheless how it all got started.

Would like to see some thoughts on this logic (sanity check)... 

aka Dr John,
The Night Tripper
-- 
J. Craig Woods
UNIX/NT Network/System Administration

-Art is the illusion of spontaneity-




Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: [expert] Looking for the Spoofer (was Reading Email headers)

2002-04-21 Thread Jason Guidry

J. Craig Woods wrote:
 On Sat, 2002-04-20 at 22:05, Pierre Fortin wrote:
 
On Sat, 20 Apr 2002 21:00:29 -0500 Jason Guidry [EMAIL PROTECTED]
wrote:


It looks like someone has decided that I don't have enough headaches and

has started sending me viri.  Normally this would not bother me, but the

problem is that the from line shows my email address on my website 
[EMAIL PROTECTED]!

Spoofing by spammer(?) at 66.24.19.151 (syr-66-24-19-151.twcny.rr.com).
 
 

Ok, now I think I understand the situation.  I assumed someone was 
somehow using the email acct off my website *ignernt-grin*

my heart-rate has now slowed ~10bpm.  more below...

 
 I have received several of these types of infected email (W32/Klez.e@MM)
 coming to a win2000 box on my network. Pierre is correct in his
 assumption about spoofing being done. It appears that the virus code
 does the spoofing. This code generates an email, with the virus file
 attached, and this email is then sent. This email, the one generated by
 the offending machine, is created as though I am the originator, which I
 am clearly not. This is where the spoofing comes to be a part of the
 process.
 

do the headers of the mail you are getting match any of the mail you are 
getting?  I'm suspicious of a BBS i posted to about sheetmusic available 
  on my website.  I think I'm gonna contact the guy in charge and 
compare IPs.  I realise that the person sending the email may not be 
aware, but I don't know who would have my address from Syracuse.

-- 
Jason Guidry
http://www.gmaestro.org












Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: [expert] Looking for the Spoofer (was Reading Email headers)

2002-04-21 Thread J. Craig Woods

On Sun, 2002-04-21 at 17:49, Jason Guidry wrote:
 
 do the headers of the mail you are getting match any of the mail you are 
 getting?  I'm suspicious of a BBS i posted to about sheetmusic available 
   on my website.  I think I'm gonna contact the guy in charge and 
 compare IPs.  I realise that the person sending the email may not be 
 aware, but I don't know who would have my address from Syracuse.
 

Not sure about the BBS being the source of your problems, Jason, but I
kinda doubt it. The headers on the infected mail I received didn't match
anything else I might be receiving at the time of delivery. After
looking at a few of these infected emails, about the only consistency I
could find was that the origin was the same ip address, each time with a
different name, such as [EMAIL PROTECTED] or
[EMAIL PROTECTED]. The other constant was that the address it was
sending to (destination address) was usually a bogus address, sometime
not even the domain name was real.

The bottom line is, I think this is what Pierre is saying. you can
identify the originating ip address in the email headers but, in the
final analysis, this ip address may be spoofed, meaning that the ip
address may or may not be the offending machine.

Nope, you do not have to worry: this mail is not being sent by your
machine unless you might be using windoze with some version of MS
outlook..

As a matter of fact, I have never heard of or seen a email type virus,
such as W32/Klez.e@MM, on linux. Another reason to bring the uninitiated
into the fold, right LX? 

Dr John
-- 
J. Craig Woods
UNIX/NT Network/System Administration

-Art is the illusion of spontaneity-




Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Sleuthing [Re: [expert] Looking for the Spoofer (was Reading Email headers)]

2002-04-21 Thread Pierre Fortin

This is an interesting thread that can be educational for anyone that
wishes to follow...  it is a bit off-topic and we can take it offline if
it bothers anyone...

Jason  DrJ,

Can you guys send me, privately, the headers of these messages...?  I'm a
bit of a sleuth and am curious about this one...

Sidebar:  a while back, I started seeing a hacker using my web site to
hide his/her activities.  Today, the packets continue (even if
unproductive due to my HoneyPort); but the emerging pattern is that
someone may be trying to boost click-through counts to affect
advertising charges...  If anyone is seeing packets from 211.154.65.144,
I'd be interested in getting some info from you...

Pierre


On 21 Apr 2002 20:22:24 -0500 J. Craig Woods [EMAIL PROTECTED]
wrote:

 On Sun, 2002-04-21 at 17:49, Jason Guidry wrote:
  
  do the headers of the mail you are getting match any of the mail you
  are getting?  I'm suspicious of a BBS i posted to about sheetmusic
  available 
on my website.  I think I'm gonna contact the guy in charge and 
  compare IPs.  I realise that the person sending the email may not be 
  aware, but I don't know who would have my address from Syracuse.
  
 
 Not sure about the BBS being the source of your problems, Jason, but I
 kinda doubt it. The headers on the infected mail I received didn't match
 anything else I might be receiving at the time of delivery. After
 looking at a few of these infected emails, about the only consistency I
 could find was that the origin was the same ip address, each time with a
 different name, such as [EMAIL PROTECTED] or
 [EMAIL PROTECTED]. The other constant was that the address it was
 sending to (destination address) was usually a bogus address, sometime
 not even the domain name was real.
 
 The bottom line is, I think this is what Pierre is saying. you can
 identify the originating ip address in the email headers but, in the
 final analysis, this ip address may be spoofed, meaning that the ip
 address may or may not be the offending machine.
 
 Nope, you do not have to worry: this mail is not being sent by your
 machine unless you might be using windoze with some version of MS
 outlook..
 
 As a matter of fact, I have never heard of or seen a email type virus,
 such as W32/Klez.e@MM, on linux. Another reason to bring the uninitiated
 into the fold, right LX? 
 
 Dr John
 -- 
 J. Craig Woods
 UNIX/NT Network/System Administration
 
 -Art is the illusion of spontaneity-
 
 
 



Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: Sleuthing [Re: [expert] Looking for the Spoofer (was Reading Email headers)]

2002-04-21 Thread Randy Kramer

Just a vote to keeping the discussion on-line -- I'd like to try to
follow it.

Randy Kramer

Pierre Fortin wrote:
 This is an interesting thread that can be educational for anyone that
 wishes to follow...  it is a bit off-topic and we can take it offline if
 it bothers anyone...



Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: Sleuthing [Re: [expert] Looking for the Spoofer (was Reading Email headers)]

2002-04-21 Thread Carroll Grigsby

Yeah, keep it going. It might help me understand why I keep sending great 
amounts of spam to myself.
-- cmg


On Sunday 21 April 2002 10:14 pm, Randy Kramer wrote:
 Just a vote to keeping the discussion on-line -- I'd like to try to
 follow it.

 Randy Kramer

 Pierre Fortin wrote:
  This is an interesting thread that can be educational for anyone that
  wishes to follow...  it is a bit off-topic and we can take it offline if
  it bothers anyone...



Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: Sleuthing [Re: [expert] Looking for the Spoofer (was Reading Email headers)]

2002-04-21 Thread J. Craig Woods

Pierre Fortin wrote:
 This is an interesting thread that can be educational for anyone that
 wishes to follow...  it is a bit off-topic and we can take it offline if
 it bothers anyone...
 

Well it looks like some votes are in for learning, and that is always a 
good thing. And, after all, this is the place for learning about 
mandrake and security.

As we have seen, these script kiddies can be very clever. I am attaching 
some headers from email that was returned to me as though I had sent 
them. I did not send them. I am not the originator, and each time it was 
sent back to me, it had the W32/Klez.e@mm virus file attached to it. As 
I posted earlier, this actually came into a win2000 server on my 
network. I am running firewall rules and snort (http://www.snort.org) 
and other security protection programs, such as tripwire (hey can you be 
*too* paranoid?). This particular win2000 server picks up mail from a 
pop3 server, and this pop3 server is ran by verizon.net. Verizon is my 
ISP. That is why you will see a verizon mail server as a relay in the 
attached email header file. I run my own smtp (postfix) server but you 
will not see any of this info in the headers. Remember this, Pierre, the 
winn2000 machine picks up mail directly from the verizon.net pop3 server 
so it bypasses all my network security but only for the picking up of 
email does it do this. For every other function, this win2000 server 
sits behind the firewall and uses NAT to get out to the internet.

It was really no big thing to see the attached virus file and delete it 
but what was unusual was the way these messages ended up being sent back 
to me as though I was the originator. You might get a kick out of some 
of the subject lines too. Could anyone really believe this crap, and 
consequently open a binary file but, then again, people still use 
windoze and run outlook on it. Go figure.

Pierre, in your sleuthing, you will see the ip address, 12.18.104.170 
emerge as the likely culprit. This is some user on the ATT Starnet 
System but I can not get a hostname on it via nslookup. Post back any 
new info you can glean from the headers. For example, have you seen any 
of these addresses before? We will see where all this goes


p.s. Each header is separated by
*HEADERS FROM EMAIL (X)***

Dr John

Craig Woods
UNIX SA



***HEADERS FROM EMAIL (1)*

This Message was undeliverable due to the following reason:

Each of the following recipients was rejected by a remote mail server.
The reasons given by the server are included to help you determine why
each recipient was rejected.

Recipient: [EMAIL PROTECTED]
Reason:Requested action not taken:user account inactive


Please reply to [EMAIL PROTECTED]
if you feel this message to be in error.
Reporting-MTA: dns; out011.verizon.net
Arrival-Date: Mon, 8 Apr 2002 09:51:13 -0500
Received-From-MTA: dns; Kuow (12.18.104.170)

Final-Recipient: RFC822; [EMAIL PROTECTED]
Action: failed
Status: 5.1.1
Remote-MTA: dns; mx11.hotmail.com (64.4.49.199)
Diagnostic-Code: smtp; 550 Requested action not taken:user account inactive
Received: from Kuow ([12.18.104.170]) by out011.verizon.net
  (InterMail vM.5.01.04.05 201-253-122-122-105-20011231) with SMTP
  id 20020408145112.ZMOJ2777.out011.verizon.net@Kuow
  for [EMAIL PROTECTED]; Mon, 8 Apr 2002 09:51:12 -0500
From: DERAIDBULLS [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Border
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary=Z5r1bsj1mb5613A1N52
Message-Id: 20020408145112.ZMOJ2777.out011.verizon.net@Kuow
Date: Mon, 8 Apr 2002 09:51:13 -0500

Content-Type: text/html;

HEADERS FROM EMAIL (2)**

This Message was undeliverable due to the following reason:

Each of the following recipients was rejected by a remote mail server.
The reasons given by the server are included to help you determine why
each recipient was rejected.

Recipient: [EMAIL PROTECTED]
Reason:[EMAIL PROTECTED]... User not known


Please reply to [EMAIL PROTECTED]
if you feel this message to be in error.
Reporting-MTA: dns; out007.verizon.net
Arrival-Date: Mon, 8 Apr 2002 09:46:31 -0500
Received-From-MTA: dns; Jezrax (12.18.104.170)

Final-Recipient: RFC822; [EMAIL PROTECTED]
Action: failed
Status: 5.1.1
Remote-MTA: dns; mxpool01.netaddress.usa.net (165.212.8.32)
Diagnostic-Code: smtp; 550 [EMAIL PROTECTED]... User not known
Received: from Jezrax ([12.18.104.170]) by out007.verizon.net
  (InterMail vM.5.01.04.05 201-253-122-122-105-20011231) with SMTP
  id 20020408144627.ZAKK18698.out007.verizon.net@Jezrax
  for [EMAIL PROTECTED]; Mon, 8 Apr 2002 09:46:27 -0500
From: JSEINSHEIMER [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: A special  funny website
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary=AtP583295a7f4A5R4A9NW28616Y92324613R
Message-Id: 

Re: [expert] Looking for the Spoofer (was Reading Email headers)

2002-04-21 Thread Woody Green

Here is an explanation of the Klez virus.  Note that based on the
explanation below, an open relay is not required.  The virus can simply
using it's own SMTP engine contact the recipient's email server and drop
the email which is perfectly 'legal' (meaning within SMTP rules as
defined by the RFCs and common safe SMTP setup practices, not legal as
in the law).  If someone contacts your email server to send email to
you, it's not relaying.

http:[EMAIL PROTECTED]

Excerpt of virus' operation:
-
Email:
This worm searches the Windows address book, the ICQ database, and local
files for email addresses. The worm sends an email message to these
addresses with itself as an attachment. The worm contains its own SMTP
engine and attempts to guess at available SMTP servers.

The subject line, message bodies, and attachment file names are random.
The From address is randomly-chosen from email addresses that the worm
finds on the infected computer.
-

Enjoy,

 Woody

On Sun, 2002-04-21 at 19:22, J. Craig Woods wrote:
snip
 
 As a matter of fact, I have never heard of or seen a email type virus,
 such as W32/Klez.e@MM, on linux. Another reason to bring the uninitiated
 into the fold, right LX? 
 

-- 
 Woody

---
Gatewood GreenWeb Developer/Systems Admin
Email:[EMAIL PROTECTED]
http://www.linif.org/ Linux in Idaho Falls Linux User Group
---




Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: [expert] Looking for the Spoofer (was Reading Email headers)

2002-04-21 Thread J. Craig Woods

On Mon, 2002-04-22 at 00:33, Woody Green wrote:
 Here is an explanation of the Klez virus.  Note that based on the
 explanation below, an open relay is not required.  The virus can simply
 using it's own SMTP engine contact the recipient's email server and drop
 the email which is perfectly 'legal' (meaning within SMTP rules as
 defined by the RFCs and common safe SMTP setup practices, not legal as
 in the law).  If someone contacts your email server to send email to
 you, it's not relaying.

Hey Woody, I think you got in on the tread a bit late. While I
appreciate this info, it was already discussed and known (look at the
earlier posting I made on the virus) What is of more intrigue, and where
this tread is heading was the question asked in an earlier thread. Can
you render an assumption on that point?

Dr John
-- 
J. Craig Woods
UNIX/NT Network/System Administration

-Art is the illusion of spontaneity-




Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com