Re: FW: Virus alert

2003-09-02 Thread Dean Anderson


On Sun, 31 Aug 2003, Tim Chown wrote:

 On Sat, Aug 30, 2003 at 05:25:19PM -0400, Dean Anderson wrote:
 
  The Virus writer obviously went to some trouble to pick valid addresses.
  It stands to reason that they expect that someone is getting mail to these
  addresses.  It also stands to reason that the abuser expects those persons
  to get Virus notifications.

 I don't think so; isn't it more likely the writer wants the infection to
 spread, and the best chance for that is that the recipient sees a From:
 address that they recognise and trust, rather than [EMAIL PROTECTED],
 so they look at the content where they otherwise would be wary?

Your comments are true in general, but I don't think they take into
consideration the differences between this virus and the ones that go
through the address book. One can (more) easily get such valid, trusted,
familiar addresses from the address book. Many virues do just that,
probably with just the purpose you mentioned. However, this virus is
different. It is using 'valid' addresses that aren't found in address
books--addresses that wouldn't be familiar to anyone, but are still valid.
There must be a reason why they would go to such trouble...

--Dean




Re: FW: Virus alert

2003-09-02 Thread Valdis . Kletnieks
On Sat, 30 Aug 2003 00:00:45 EDT, shogunx said:
 On Sat, 30 Aug 2003, Dean Anderson wrote:
 
  Open source kernels aren't immune. They just aren't at focus this time.
 
 If a worm is executing visual basic code, then i think i am pretty darn
 immune.

Google for the Lion worm, and quit smirking.  Like he said, the gun isn't
pointed at you THIS time.


pgp0.pgp
Description: PGP signature


Re: FW: Virus alert

2003-09-02 Thread Einar Stefferud
So far I have not seen one case of someone I know informing me that I 
have sent a message to them with a virus included.  They have all been from strangers, 
which is one reason they get trapped by my filters.

As best I can tell, all the to and from addresses are randomly selected.

Cheers...\Stef

At 0:52 +0100 8/31/03, Tim Chown wrote:
On Sat, Aug 30, 2003 at 05:25:19PM -0400, Dean Anderson wrote:
  
  The Virus writer obviously went to some trouble to pick valid addresses.
  It stands to reason that they expect that someone is getting mail to these
  addresses.  It also stands to reason that the abuser expects those persons
  to get Virus notifications.

I don't think so; isn't it more likely the writer wants the infection to
spread, and the best chance for that is that the recipient sees a From:
address that they recognise and trust, rather than [EMAIL PROTECTED],
so they look at the content where they otherwise would be wary?

I don't see a problem with notifications where the virus is known not to
forge the sender.

Tim






Re: FW: Virus alert

2003-08-31 Thread Tim Chown
On Sat, Aug 30, 2003 at 05:25:19PM -0400, Dean Anderson wrote:
 
 The Virus writer obviously went to some trouble to pick valid addresses.
 It stands to reason that they expect that someone is getting mail to these
 addresses.  It also stands to reason that the abuser expects those persons
 to get Virus notifications.

I don't think so; isn't it more likely the writer wants the infection to
spread, and the best chance for that is that the recipient sees a From:
address that they recognise and trust, rather than [EMAIL PROTECTED],
so they look at the content where they otherwise would be wary?

I don't see a problem with notifications where the virus is known not to
forge the sender.

Tim



Re: FW: Virus alert

2003-08-31 Thread shogunx
On Sat, 30 Aug 2003, Dean Anderson wrote:

 Open source kernels aren't immune. They just aren't at focus this time.

If a worm is executing visual basic code, then i think i am pretty darn
immune.



 Have fun with the sandwich. ;-)


It was wonderful.

   --Dean

 On Fri, 29 Aug 2003, shogunx wrote:

  On Sat, 30 Aug 2003, Dean Anderson wrote:
 
  How beautiful to be immune behind an open-source kernel;)  The rest of the
  world worries.  I eat a sandwich.
 
  Scott




sleekfreak pirate broadcast
world tour 2002-3
live from the pirate hideout
http://sleekfreak.ath.cx:81/




Re: FW: Virus alert

2003-08-30 Thread Valdis . Kletnieks
On Fri, 29 Aug 2003 19:30:44 CDT, David Frascone [EMAIL PROTECTED]  said:

 'course, I probably get 25 e-mails a day telling me that I sent someone
 Sobig, which would be pretty impressive, since I run Suse :)

I should be so lucky.  I'm averaging almost that many AV-scanner alerts bouncing
to me an *hour*.  And inbound Sobig-F are above 1 per minute.

I still say we should have put this in the security considerations in RFC1341:

If you think you know how to secure active objects in e-mail, you are
probably very mistaken.  There be serious and nasty dragons here.

(with apologies to the authors of 'xterm').

On the other hand, maybe we didn't do THAT badly - I can only think of one
vendor that really didn't pay attention



pgp0.pgp
Description: PGP signature


Re: FW: Virus alert

2003-08-30 Thread shogunx
Can't we just hack the mailman configs to dump mails with X-sender value
of outlook or outlook express?  That would solve the problem, no;)

Scott



On Fri, 29 Aug 2003 [EMAIL PROTECTED] wrote:

 On Fri, 29 Aug 2003 19:30:44 CDT, David Frascone [EMAIL PROTECTED]  said:

  'course, I probably get 25 e-mails a day telling me that I sent someone
  Sobig, which would be pretty impressive, since I run Suse :)

 I should be so lucky.  I'm averaging almost that many AV-scanner alerts bouncing
 to me an *hour*.  And inbound Sobig-F are above 1 per minute.

 I still say we should have put this in the security considerations in RFC1341:

 If you think you know how to secure active objects in e-mail, you are
 probably very mistaken.  There be serious and nasty dragons here.

 (with apologies to the authors of 'xterm').

 On the other hand, maybe we didn't do THAT badly - I can only think of one
 vendor that really didn't pay attention



sleekfreak pirate broadcast
world tour 2002-3
live from the pirate hideout
http://sleekfreak.ath.cx:81/




Re: FW: Virus alert

2003-08-30 Thread Valdis . Kletnieks
On Thu, 28 Aug 2003 22:14:26 EDT, shogunx said:
 Can't we just hack the mailman configs to dump mails with X-sender value
 of outlook or outlook express?  That would solve the problem, no;)

Well, the only problem with that idea is that we explicitly do *NOT* have a
Your clue must be -THIS- tall to ride the IETF list policy... ;)



pgp0.pgp
Description: PGP signature


Re: FW: Virus alert

2003-08-30 Thread Keith Moore
 I still say we should have put this in the security considerations in RFC1341:

It's pretty difficult to miss the ones that are already there - which certainly
would have been sufficient to stop Sobig had they been heeded.



RE: FW: Virus alert

2003-08-30 Thread Christian Huitema
 Can't we just hack the mailman configs to dump mails with X-sender
value
 of outlook or outlook express?  That would solve the problem, no;)
 
 Well, the only problem with that idea is that we explicitly do *NOT*
have  a Your clue must be -THIS- tall to ride the IETF list
policy... ;)

The Sobig worm includes its own SMTP code, and places arbitrary values
in the header fields. The source address is forged, and so are various
other fields, including X-Mailer. The worm finds target source and
destination addresses by reading files on the user's disk, not by using
a specific Outlook or OE API. It propagates by social engineering,
when users open some executable attachments. User can do click on
attachments with many mailers, not just Outlook and OE. In fact, the
latest versions of Outlook automatically strip such attachments.

-- Christian Huitema





RE: FW: Virus alert

2003-08-30 Thread shogunx
On Fri, 29 Aug 2003, Christian Huitema wrote:

  Can't we just hack the mailman configs to dump mails with X-sender
 value
  of outlook or outlook express?  That would solve the problem, no;)
 
  Well, the only problem with that idea is that we explicitly do *NOT*
 have  a Your clue must be -THIS- tall to ride the IETF list
 policy... ;)

 The Sobig worm includes its own SMTP code, and places arbitrary values
 in the header fields.

You mean to say that there is a full MTA tucked away in there?


 The source address is forged, and so are various
 other fields, including X-Mailer.

Perhaps you misunderstood my intentions.  My intentions accociated with
this post had nothing to do with the worm.


 The worm finds target source and
 destination addresses by reading files on the user's disk, not by using
 a specific Outlook or OE API. It propagates by social engineering,
 when users open some executable attachments.

Since when is social engineering a desktop activity.  The last time I
checked, social engineering was along the lines of thank you for the shiny
new job, now i'm going to hide a rouge server on your network.

 User can do click on
 attachments with many mailers, not just Outlook and OE. In fact, the
 latest versions of Outlook automatically strip such attachments.


I'm glad I don't have to click on my mail.


 -- Christian Huitema




sleekfreak pirate broadcast
world tour 2002-3
live from the pirate hideout
http://sleekfreak.ath.cx:81/




RE: FW: Virus alert

2003-08-30 Thread Christian Huitema

  Can't we just hack the mailman configs to dump mails with X-sender
 value
  of outlook or outlook express?  That would solve the problem, no;)
 
  Well, the only problem with that idea is that we explicitly do
*NOT*
 have  a Your clue must be -THIS- tall to ride the IETF list
 policy... ;)

 The Sobig worm includes its own SMTP code, and places arbitrary
values
 in the header fields.

 You mean to say that there is a full MTA tucked away in there?

Yes. Maybe not a full MTA, but definitely enough to format messages and
execute SMTP. The common assumption is that Sobig was written by one or
several criminals, with the purpose of installing a network of mail
relays zombies, and then to sell the services of this network of
zombies to spammers. The same SMTP agent is probably also used to send
spam from the zombies. If you compare the headers of mail generated by
the worm and those of random spam, you will find that they are very
similar. 

There is another link between Sobig and spam. It appears that these
networks of zombies are used in denial of service attacks against
anti-spam services. 

By the way, the worm does not only include its own SMTP service. It
seems to also include its own DNS code, probably in order to get the MX
records of its targets. This DNS agent is parameterized to start any
look-up at the A-root, with the side effect of overloading this root
server.

-- Christian Huitema




Re: FW: Virus alert

2003-08-30 Thread Zefram
Christian Huitema wrote:
By the way, the worm does not only include its own SMTP service. It
seems to also include its own DNS code, probably in order to get the MX
records of its targets. This DNS agent is parameterized to start any
look-up at the A-root, with the side effect of overloading this root
server.

Does this mean we can stop the virus and associated spam just by switching
off the A root?

-zefram



RE: FW: Virus alert

2003-08-30 Thread Christian Huitema
 By the way, the worm does not only include its own SMTP service. It
 seems to also include its own DNS code, probably in order to get the
MX
 records of its targets. This DNS agent is parameterized to start any
 look-up at the A-root, with the side effect of overloading this root
 server.

 Does this mean we can stop the virus and associated spam just by
switching
 off the A root?

I would suggest that you engage in serious testing before trying
anything like that! 

-- Christian Huitema




RE: FW: Virus alert

2003-08-30 Thread Vernon Schryver
 From: Christian Huitema [EMAIL PROTECTED]

 ...
 Yes. Maybe not a full MTA, but definitely enough to format messages and
 execute SMTP. ...

What do you mean by execute SMTP?  Does it interpret and respond to
SMTP response codes to its SMTP commands or just open a TCP connection
and send a largely constant handful of lines of text before the first
header line?  The samples I've captured have pretty rudimentary SMTP
envelopes.

 ...
 By the way, the worm does not only include its own SMTP service. It
 seems to also include its own DNS code, probably in order to get the MX
 records of its targets. ...

That would be far more impresssive, although given the many resolver
libraries available, nothing to write home about.


Vernon Schryver[EMAIL PROTECTED]



Re: FW: Virus alert

2003-08-30 Thread Dean Anderson


On Fri, 29 Aug 2003, David Frascone wrote:

 With the current virii usually forging the from field with random
 addresses from its victim's address book, I turned off my virus
 scanner's warning to the senders . . I only send a polite note to the
 intended recipient.

Don't do that. That is quite likely what the Virus writer wants you to do:
Stop notifying people about infections.  The worst that happens is that
people get notifications, and update their anti-virus, which finds
nothing.  The best that happens is that the headers included in such a
notification reveal the IP address of an infected zombie.

Also, in the current cases, I don't think the addresses aren't taken from
address books.  I'm getting responses to addresses that haven't been used
for email and addresses that haven't been used in years. Certainly, these
aren't in anyone's address book.  In one case, the address is on a little
used web site (but even spammers rarely spam it, and in another, its in a
reasonably public area, but not used)

The Virus writer obviously went to some trouble to pick valid addresses.
It stands to reason that they expect that someone is getting mail to these
addresses.  It also stands to reason that the abuser expects those persons
to get Virus notifications.

Most probably, virus notifications tend to frustrate the purposes of
the Virus operator, since the infected will not stay infected. It seems
possible that the virus operators are trying to manipulate people to stop
sending or responding to virus notifications.

In past cases, the forged from address was the target of the abuse: the
abuser hoped to have people block mail with the common from address, thus
getting some measure of revenge on that person.  Most people have
filtering on From: addresses for this reason.

The best thing to do in response to such an attack is to do things that
frustrate purposes the abuser, catch the abuser, or nothing at all.
Never succumb to what might be a desired manipulation--That only
encourages more abuse.


--Dean





Re: FW: Virus alert

2003-08-30 Thread shogunx
On Sat, 30 Aug 2003, Dean Anderson wrote:

How beautiful to be immune behind an open-source kernel;)  The rest of the
world worries.  I eat a sandwich.

Scott




 On Fri, 29 Aug 2003, David Frascone wrote:

  With the current virii usually forging the from field with random
  addresses from its victim's address book, I turned off my virus
  scanner's warning to the senders . . I only send a polite note to the
  intended recipient.

 Don't do that. That is quite likely what the Virus writer wants you to do:
 Stop notifying people about infections.  The worst that happens is that
 people get notifications, and update their anti-virus, which finds
 nothing.  The best that happens is that the headers included in such a
 notification reveal the IP address of an infected zombie.

 Also, in the current cases, I don't think the addresses aren't taken from
 address books.  I'm getting responses to addresses that haven't been used
 for email and addresses that haven't been used in years. Certainly, these
 aren't in anyone's address book.  In one case, the address is on a little
 used web site (but even spammers rarely spam it, and in another, its in a
 reasonably public area, but not used)

 The Virus writer obviously went to some trouble to pick valid addresses.
 It stands to reason that they expect that someone is getting mail to these
 addresses.  It also stands to reason that the abuser expects those persons
 to get Virus notifications.

 Most probably, virus notifications tend to frustrate the purposes of
 the Virus operator, since the infected will not stay infected. It seems
 possible that the virus operators are trying to manipulate people to stop
 sending or responding to virus notifications.

 In past cases, the forged from address was the target of the abuse: the
 abuser hoped to have people block mail with the common from address, thus
 getting some measure of revenge on that person.  Most people have
 filtering on From: addresses for this reason.

 The best thing to do in response to such an attack is to do things that
 frustrate purposes the abuser, catch the abuser, or nothing at all.
 Never succumb to what might be a desired manipulation--That only
 encourages more abuse.


   --Dean





sleekfreak pirate broadcast
world tour 2002-3
live from the pirate hideout
http://sleekfreak.ath.cx:81/




Re: FW: Virus alert

2003-08-30 Thread Dean Anderson
Open source kernels aren't immune. They just aren't at focus this time.

Have fun with the sandwich. ;-)

--Dean

On Fri, 29 Aug 2003, shogunx wrote:

 On Sat, 30 Aug 2003, Dean Anderson wrote:

 How beautiful to be immune behind an open-source kernel;)  The rest of the
 world worries.  I eat a sandwich.

 Scott