Great Circle Associates List-Managers
(August 2002)
 

Indexed By Date: [Previous] [Next] Indexed By Thread: [Previous] [Next]

Subject: determining real Klez worm sender?
From: "Kevin Kinder" <kvk @ luckytown . org>
Date: Thu, 8 Aug 2002 10:34:09 -0500
To: <list-managers @ greatcircle . com>
Importance: Normal
In-reply-to: <20020807062006.C5395195F9B@mycroft.greatcircle.com>
Reply-to: <kinder @ luckytown . org>

I keep getting bombarded with the ever-annoying Klez worm (see
http://securityresponse.symantec.com/avcenter/venc/data/w32.klez.h@mm.ht
ml if you don't know what I'm talking about) from some of my mailing
list subscribers. With previous worms, I'd email the sender and ask them
to innoculate themselves, and black-hole them if they didn't. With Klez
spoofing the From: address, that idea goes out the window. Is there some
way to determine the real sender of Klez email by examining the email
headers? So far, all I can seem to determine is the originating site,
which in most cases is no help.

Similarly, once in a while I get a Klez post sent to majordomo@my site.
Rather than stopping after a few errors, majordomo keeps checking each
of several thousand binary lines, spitting out an error for each. Is
there some majordomo setting to get it to stop processing after X
errors? I thought there was, but I can't find it.

Thanks.

-----
         Kevin Kinder
         kinder@luckytown.org







Follow-Ups:
Indexed By Date Previous: Re: Earthlink password message came today
From: Charlie Summers <charlie@lofcom.com>
Next: Re: determining real Klez worm sender?
From: Charlie Summers <charlie@lofcom.com>
Indexed By Thread Previous: Re: Earthlink password message came today
From: Charlie Summers <charlie@lofcom.com>
Next: Re: determining real Klez worm sender?
From: Charlie Summers <charlie@lofcom.com>

Google
 
Search Internet Search www.greatcircle.com