Hello, I just received a james virus message originated at fw.suse.com (209.3.226.225) I checked both mail log and firewall log, connection was from 209.3.226.225 Did anybody else receive that? Does it mean that fw.suse.com was compromised? Thanks, -Kastus
Kastus wrote:
Hello,
I just received a james virus message originated at fw.suse.com (209.3.226.225) I checked both mail log and firewall log, connection was from 209.3.226.225
Did anybody else receive that? Does it mean that fw.suse.com was compromised?
Thanks, -Kastus
Generally that just means someone just spoofed the from header on the email and not comprimised anything... It's a pretty simple process and spammers have a habit of doing it fairly regularly. -- Chris
On Sat, Nov 01, 2003 at 03:53:01AM -0500, Chris Donaldson wrote:
Kastus wrote:
Hello,
I just received a james virus message originated at fw.suse.com (209.3.226.225) I checked both mail log and firewall log, connection was from 209.3.226.225
Did anybody else receive that? Does it mean that fw.suse.com was compromised?
Generally that just means someone just spoofed the from header on the email and not comprimised anything... It's a pretty simple process and spammers have a habit of doing it fairly regularly.
Spoofing the header is one thing, but spoofing source IP address in TCP connection is a different thing. Please read my post again. In my case, the TCP connection to port 25 was coming from 209.3.226.225, which resolves to fw.suse.com. This fact raised my suspicions. It means either that DNS is compromised, or fw.suse.com host is compromised. Thanks, -Kastus
On Saturday 01 November 2003 00:06, Kastus wrote:
This fact raised my suspicions. It means either that DNS is compromised, or fw.suse.com host is compromised.
Or fw.suse.com is a firewall behind which there is an infected windows machine. What ho! A windows machine at SuSE!?!? Say it ain't so SuSE Folks!! -- _____________________________________ John Andersen
This fact raised my suspicions. It means either that DNS is compromised, or fw.suse.com host is compromised.
Or fw.suse.com is a firewall behind which there is an infected windows machine. What ho! A windows machine at SuSE!?!? Say it ain't so SuSE Folks!!
fw.suse.com is the Oakland subsidiary.
This is of course possible - there are not only cracks working at SUSE.
We'll have a look at it.
Thanks,
Roman.
--
- -
| Roman Drahtmüller
This is of course possible - there are not only cracks working at SUSE. We'll have a look at it.
"Sell what you use, use what you sell" Anyway, if you want to test interoperability between a server and heterogeneous workstations, well, you need to test some of the niche-players too.
-----Original Message-----
From: Kastus
On Sat, Nov 01, 2003 at 03:53:01AM -0500, Chris Donaldson wrote:
Kastus wrote:
Hello,
I just received a james virus message originated at fw.suse.com (209.3.226.225) I checked both mail log and firewall log, connection was from 209.3.226.225
Did anybody else receive that? Does it mean that fw.suse.com was compromised?
Generally that just means someone just spoofed the from header on the email and not comprimised anything... It's a pretty simple process and spammers have a habit of doing it fairly regularly.
Spoofing the header is one thing, but spoofing source IP address in TCP connection is a different thing. Please read my post again.
In my case, the TCP connection to port 25 was coming from 209.3.226.225, which resolves to fw.suse.com.
This fact raised my suspicions. It means either that DNS is compromised, or fw.suse.com host is compromised.
Thanks, -Kastus
I have to agree with Kastus. I also received one of these and it went ot my home address which is given out very little. One case of it being used was for the purchase of the 9.0 upgrade. Seems rather strange that the fw.suse.com site comes up in the email AND names of suse users or purchasers. Ken Schneider
Ken Schneider wrote:
-----Original Message----- From: Kastus
To: suse-security@suse.com Date: Sat, 1 Nov 2003 01:06:37 -0800 Subject: Re: [suse-security] fw.suse.com compromised? On Sat, Nov 01, 2003 at 03:53:01AM -0500, Chris Donaldson wrote:
Kastus wrote:
Hello,
I just received a james virus message originated at fw.suse.com (209.3.226.225) I checked both mail log and firewall log, connection was from
209.3.226.225
Did anybody else receive that? Does it mean that fw.suse.com was compromised?
Generally that just means someone just spoofed the from header on the email and not comprimised anything... It's a pretty simple process
and
spammers have a habit of doing it fairly regularly.
Spoofing the header is one thing, but spoofing source IP address in TCP connection is a different thing. Please read my post again.
In my case, the TCP connection to port 25 was coming from 209.3.226.225, which resolves to fw.suse.com.
This fact raised my suspicions. It means either that DNS is compromised, or fw.suse.com host is compromised.
Thanks, -Kastus
Ahhh sorry I misread... Or rather was overtired and didn't read. In either case that it definately bizarre.
-- Chris
I have to agree with Kastus. I also received one of these and it went ot my home address which is given out very little. One case of it being used was for the purchase of the 9.0 upgrade. Seems rather strange that the fw.suse.com site comes up in the email AND names of suse users or purchasers.
Ken Schneider
On Friday 31 October 2003 23:53, Chris Donaldson wrote:
Kastus wrote:
Hello,
I just received a james virus message originated at fw.suse.com (209.3.226.225) I checked both mail log and firewall log, connection was from 209.3.226.225
Did anybody else receive that? Does it mean that fw.suse.com was compromised?
Thanks, -Kastus
Generally that just means someone just spoofed the from header on the email and not comprimised anything... It's a pretty simple process and spammers have a habit of doing it fairly regularly.
-- Chris
Chris, you didn't read what Kastus said. He check the firewall log and the mail log. Thats significantly harder to fake than a mail header. -- _____________________________________ John Andersen
participants (6)
-
Arjen Runsink
-
Chris Donaldson
-
John Andersen
-
Kastus
-
Ken Schneider
-
Roman Drahtmueller