[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

spam -- but no received: heders?



here's the whole set of headers from some spam i've got
recently--

	From lkcohlmcbgyw@canada.com Wed Nov 19 10:41:57 2003
	Return-path: <lkcohlmcbgyw@canada.com>
	Envelope-to: will@serensoft.com
	Received: from mail by boss.serensoft.com with spam-scanned (Exim 3.35 #1 (Debian))
		id 1AMVOt-00034C-00
		for <will@serensoft.com>; Wed, 19 Nov 2003 10:41:57 -0600
	Received: from localhost [127.0.0.1] by boss.serensoft.com
		with SpamAssassin (2.60 1.212-2003-09-23-exp);
		Wed, 19 Nov 2003 10:41:57 -0600
	From: "Odonnell Tommie" <lkcohlmcbgyw@canada.com>
	To: info@serensoft.com
	Subject: Re: %RND_UC_CHAR[2-8], rimsky knew where
	Date: Wed, 19 Nov 2003 03:39:43 -0100
	Message-Id: <FARCGWMJAFGVSAHNETQRJN@yahoo.ca>
	X-Spam-Flag: YES
	X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on 
		boss.serensoft.com
	X-Spam-Status: Yes, hits=18.7 required=5.0 tests=BAYES_99,BIZ_TLD,
		FORGED_AOL_HTML,FORGED_MUA_AOL_FROM,HTML_FONTCOLOR_UNKNOWN,
		HTML_FONT_INVISIBLE,HTML_IMAGE_ONLY_10,HTML_MESSAGE,HTML_TITLE_EMPTY,
		MIME_HTML_ONLY,MIME_HTML_ONLY_MULTI,MISSING_MIMEOLE,
		MISSING_OUTLOOK_NAME,X_MSMAIL_PRIORITY_HIGH,X_PRIORITY_HIGH 
		autolearn=no version=2.60
	X-Spam-Level: ******************
	MIME-Version: 1.0
	Content-Type: multipart/mixed; boundary="----------=_3FBB9D55.C18778B3"

clever subject, eh?

	Subject: Re: %RND_UC_CHAR[2-8], rimsky knew where

normally there's a lot of "received:" headers that can track
back to the original ip -- but this looks like it was sent from
localhost...  eesh!

	Received: from mail by boss.serensoft.com with spam-scanned (Exim 3.35 #1 (Debian))
		id 1AMVOt-00034C-00
		for <will@serensoft.com>; Wed, 19 Nov 2003 10:41:57 -0600
	Received: from localhost [127.0.0.1] by boss.serensoft.com
		with SpamAssassin (2.60 1.212-2003-09-23-exp);
		Wed, 19 Nov 2003 10:41:57 -0600

at least message-id implies it came thru yahoo.ca:

	Message-Id: <FARCGWMJAFGVSAHNETQRJN@yahoo.ca>

i don't think i've been hacked (my server is port-forwarded from
behind a clarkconnect.org firewall) -- but how can someone spoof
127.0.0.1 as an originating ip?

-- 
I use Debian/GNU Linux version 3.0;
Linux boss 2.4.18-bf2.4 #1 Son Apr 14 09:53:28 CEST 2002 i586 unknown
 
DEBIAN NEWBIE TIP #19 from Dave Sherohman <esper@sherohman.org>
and Will Trillich <will@serensoft.com>
:
How do you determine WHICH NETWORK SERVICES ARE OPEN (active)?
Try "netstat -a | grep LISTEN". To see numeric values (instead
of the common names for services using a particular port) then
try "netstat -na" instead. For more info, look at "man netstat".
   Also try "lsof -i" as root. "man lsof" for details.

Also see http://newbieDoc.sourceForge.net/ ...



Reply to: