Some data.

I did "grep [EMAIL PROTECTED],.proto= syslog" on one of our
incoming mail hosts.  The file had 46,000 msgid= strings.



The Bagle virus does this.  We are catching these already with a test
on the HELO string-- it says "helo columbia.edu" when sending, and we
don't allow that unless we have smtp auth (some clients do it).

There a very consistent pattern to Bagle mail.  Insert your own
domain name there:

msgid=<[EMAIL PROTECTED]>
msgid=<[EMAIL PROTECTED]>
msgid=<[EMAIL PROTECTED]>
msgid=<[EMAIL PROTECTED]>
msgid=<[EMAIL PROTECTED]>

So... exclude Bagle and what else is there...



msgid=<[EMAIL PROTECTED]>

This comes from Yahoo Groups.  The sender was [EMAIL PROTECTED]
(actually not xx but two other letters!).  This looks legit.  I
see some others.  This seems to be how Yahoo Groups constructs
message ids.



msgid=<[EMAIL PROTECTED]>
msgid=<[EMAIL PROTECTED]>

Mydoom virus.



msgid=<05/26/2004|[EMAIL PROTECTED]|14627>

Good grief.  The recipient is [EMAIL PROTECTED]  Probably legit.
Sending host in morningstar.com.



msgid=<[EMAIL PROTECTED]>

From a Verizon mail server. Sender address is [EMAIL PROTECTED] and it
appears to be one of our users sending mail from an ISP.  Some clients
construct the Message-ID using the default domain name.  This is an
important example but I have to admit it is the only one I can find
in this syslog file, so it appears to be unusual.




Joseph Brennan Academic Technologies Group, Academic Information Systems (AcIS) Columbia University in the City of New York
















_______________________________________________ Visit http://www.mimedefang.org and http://www.canit.ca MIMEDefang mailing list [EMAIL PROTECTED] http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to