Looks like you have a proxy, secured for the CONNECT method but not for
the POST method.

Someone is connecting to the proxy on your host and attempting to
connect to a mail server on port 25; they could then send out spam from
that location, and it would trace back to your host, not theirs. POST
method is a little bit different, but gets the same results: you get
blamed for spam, and blacklisted.

See http://www.kb.cert.org/vuls/id/150227

That's a mighty checkered IP you've got yourself...

see: http://openrbl.org/ip/63/211/23/62.htm

--
Scott Lesley




On Tue, 2003-06-03 at 12:03, Zep wrote:
> 
> 
> I've googled log entries like the ones below, looking for some
> mention of the exploit/what's being attempted (port 25, I'm 
> guessing it's spam relay?) and how to make sure I'm not helping
> someone be an interdork. any info is greatly appreciated.
> 
> 63.211.23.62 - 63.211.23.62 - - - [02/Jun/2003:22:43:35 -0400] "CONNECT 
> mx00.comcast.net:25 HTTP/1.0" 405 99
> 63.211.23.62 - 63.211.23.62 - - - [02/Jun/2003:22:43:37 -0400] "POST 
> http://63.211.23.62:25/ HTTP/1.1" 200 1188
> 63.211.23.38 - 63.211.23.38 - - - [03/Jun/2003:10:26:36 -0400] "CONNECT 
> mailin-04.mx.aol.com:25 HTTP/1.0" 405 99
> 63.211.23.38 - 63.211.23.38 - - - [03/Jun/2003:10:26:36 -0400] "POST 
> http://63.211.23.38:25/ HTTP/1.1" 200 1188
> 
>       I'd be much less concerned if it weren't for the 200 codes on the
> 'POST' commands.  Thanks.
> 
> -- 
>                                              - Zep
>                                       ([EMAIL PROTECTED])
> 
> Friends may come and go, but enemies accumulate.
> 
> ---------------------------------------------------------------------------
> ----------------------------------------------------------------------------
> 



---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to