Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 02 May 1997 23:09:33 -0500
From:      "Jeffrey J. Mountin" <sysop@mixcom.com>
To:        scott@statsci.com
Cc:        questions@FreeBSD.ORG
Subject:   Re: COME SEE THE HOTTEST scam spam on the net!!! 
Message-ID:  <3.0.32.19970502230932.00bd1eec@mixcom.com>

next in thread | raw e-mail | index | archive | help
At 01:08 PM 5/2/97 -0700, Scott Blachowicz wrote:
>Actually, it would vary depending on who you can trust...

Yes, but....

>> Received: by mixcom.mixcom.com (8.6.12/2.2)
>> 	   id PAA14271; Sun, 27 Apr 1997 15:26:51 -0500
>> Received: from ns3.harborcom.net(206.158.4.7) by mixcom.mixcom.com via smap
>> (V1.3)
>> 	id sma014261; Sun Apr 27 20:26:41 1997
>>
>> (everything after this can be pure BS)
>
>But, if (in this case) you did a 'dig -x 206.158.4.7' to verify that it
>is, in fact, harborcom.net and you trust the administration of
>harborcom.net to be reliable, then you could, presumably, trust the next
>Received: header:

Nope!

>> Received: from hub.freebsd.org (hub.FreeBSD.ORG [204.216.27.18])
>>           by ns3.harborcom.net (8.8.5/8.8.4) with ESMTP
>> 	  id QAA10827; Sun, 27 Apr 1997 16:25:47 -0400 (EDT)
>
>...and so forth...
>
>Right?

Ok, in most cases you could, but the following is a better example that I
have seen and I added some lines, which is what it would look like before
sendmail does it's thing, but after the SMTP part of the converstion.

FROM noreply@click.to.be.removed + (these 2 I added)
RCPT invalid@mixcom.com          +
Return-Path: <noreply@click.to.be.removed>
Received: by mixcom.mixcom.com (8.6.12/2.2)
	   id VAA26594; Sat, 5 Apr 1997 21:40:03 -0600
From: <noreply@click.to.be.removed>
Received: from emin39.mx.aol.com(198.81.11.75) by mixcom.mixcom.com via
smap (V1.3)
	id sma026561; Sun Apr  6 03:39:37 1997

The received above this is added by the local server up to the RCPT, but
below this it is part of the "body" in the envelope and is the DATA part of
the SMTP conversation.

BODY  (added)
Received: from d.mx.aol.com (Cust34.Max8.Denver.CO.MS.UU.NET [153.35.206.162])
	  by emin39.mail.aol.com (8.8.5/8.8.5/AOL-2.0.0)
	  with SMTP id WAA22837;
	  Sat, 5 Apr 1997 22:36:21 -0500 (EST)
(This would most likely be real, but I could forge this easily enough)

(hmmm... the following must be someone with IPv6 ;)
Received: from mailhost.feefifofofe.com (alt1.feefife.com (297.3.2.33)) by
feefifofofe.com (8.8.5/8.6.5) with SMTP id GAA02878 for
<noreply@feefifofe.com>; Sat, 05 Apr 1997 20:19:49 -0600 (EST)
To: noreply@feefifofe.com
Message-ID: <546512849975.kss06426@feefifofofe.com>
Date: Sat, 05 Apr 97 20:19:49 EST
Subject: NEW SONIC STEALTH MAILER! 250,000 PER HOUR! LIMITED QUANITY!
Reply-To: noreply@click.to.be.removed
X-PMFLAGS: 128 0
X-UIDL: 854df41ger14tg156sdfg12hjkl45621
Comments: Authenticated sender is <hello@feefifofofe.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=unknown-8bit
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by emin39.mail.aol.com
id WAA22837
(This blank line starts the body of the message)
                    FIND OUT WHAT ALL THE TALK IS ABOUT...


            Introducing....  >>>>>>>>>>>  "STEALTH MASS MAILER"
--snip--


If you know how to send mail by telnetting to the port, then you know why
you can't trust the headers for junk mail.

Here is one I just did for myself and I used one forged "Received" line:


Received: by mixcom.mixcom.com (8.6.12/2.2)
	   id WAA17129; Fri, 2 May 1997 22:45:21 -0500
Message-Id: <199705030345.WAA17129@mixcom.mixcom.com>
From: <testy@mixcom.com>
Received: from ww4.mixcom.com(198.137.186.94) by mixcom.mixcom.com via smap
(V1.3)
	id sma016136; Fri May  2 22:37:28 1997

Above is what the local server added, below is what I spoofed.

Received: from mailhost.feefifofofe.com (alt1.feefife.com (297.3.2.33)) by
feefifofofe.com (8.8.5/8.6.5) with SMTP id GAA02878 for
<nobother@feefifofe.com>; Fri, 02 Apr 1997 18:00:00 -0500 (CDT)
To: nobother@feefifofe.com
Date: Fri, 02 Apr 97 17:55:00 CDT
Subject: This is junk
Reply-To: null@not.valid
X-UIDL: c8ce99fca05388eeabc668dab754bdfb

Yes, you too can send junk mail.....

Not!
--end--

I'd trust one of our servers, but there is no way in hell that it could
have received this message from that server, especially with port 25
blocked at the routers/NAS.

For junk mail is is best to pass back a message to the last "certain"
system if you want to mention that they are being exploited and there is
only one that you can be absolutely certain about.


-------------------------------------------
Jeff Mountin - System/Network Administrator
jeff@mixcom.net

MIX Communications
Serving the Internet since 1990



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.32.19970502230932.00bd1eec>