Kami,

I'll give it a shot.

I am assuming the headers haven't been changed and that they are in
the actual order received. Of course that's not necessarily true
depending upon the software used along the way.

In this case it is almost certainly untrue.

Headers normally are in the most recent received order descending.
For instance the topmost header line on your message I received from
the list to my server is:

    Received: from declude.com [66.189.58.123] by smartbusiness.net
    with ESMTP

    My server is smartbusiness.net.

Now we'll have a go at reading the headers you submitted (I'm starting
at the bottom):

KR> Received: from [135.12.72.250] by ssymail.ssy.co.kr with SMTP;
KR> Nov, 03 2002 11:27:47 AM -0300

    This header reports the message originated from 135.12.72.250 -
    (which is allocated to Lucent Technologies per ARIN) and received
    by a server identifying itself as ssymail.ssy.co.kr.  Note that
    the time received is 11/3/2002 11:27 3 hours west of Greenwich.
    SMTP was the protocol used in the dialogue between the 2 servers.

KR> Received: from [198.250.227.71] by m10.grp.snv.yahoo.com with
KR> QMQP; Nov, 03 2002 11:59:28 AM +0400

    Now the next server says it is m10.grp.snv.yahoo.com and it says
    it received the message from 198.250.227.71 which is owned by the
    Army Office for Defense Medical.  So sysmail.ssy.co.kr is likely
    forged and 198.250.227.71 could be forged as well.  And supposedly
    this server is 4 hours west of Greenwich.  Also interesting is the
    fact that it says used QMQP: Quick Mail Queueing Protocol to
    receive the message.

KR> Received: from sparc.isl.net ([45.55.85.241]) by
KR> anther.webhostingtalk.com with NNFMP; Nov, 03 2002 1:21:28 PM
KR> -0100

    Now anther.wbhostingtalk.com says it talked NNFMP to sparc.isl.net
    which is supposedly at 45.55.85.241 (assigned to Interop Show
    Network) and 1 hour west of Greenwich.

KR> Received: from unknown (6.61.10.17) by rly-xr02.mx.aol.com with
KR> NNFMP; Nov, 03 2002 2:08:31 PM -0000

    Finally your server (or maybe I should say the destination server
    since you don't seem to know that you are using AOL) says it
    received the message via NNFMP from 6.61.10.17 (assigned to
    NS01.ARMY.MIL) and that it is right in the middle of Greenwich.

KR> The reason for the question is the domain "webhostingtalk.com" is
KR> appearing in a lot of SPAMs lately. The company appears to be a
KR> legitimate company. Does anyone know about these folks..?

    Well webhostingtalk.com has one MX record that points to
    207.218.223.171 which appears nowhere in these headers.

    But honestly to me these headers appear to be either totally
    forged or copied from several other messages and cobbled together.
    I don't think there is any information in these headers that is
    reliable.  Either information is missing or this is just garbage.

KR> & how can AOL allow spam to be sent out like this?  Isn't the first
KR> record from AOL?

    Unless you've changed the headers yourself, or unless you're
    reporting something that's not the headers, or unless a program
    has changed the headers, that should be your server.

    Since it isn't then either these aren't the headers or they've
    been seriously forged.

Best thing to do is study the headers on known good messages. It is
not complicated to read them but does take some practice.

I see you're using Outlook.  I'm afraid this doesn't really make your
work any easier.

Happy hunting.


Terry Fritts

---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.

Reply via email to