gabriel rosenkoetter on Mon, 30 Sep 2002 11:13:07 -0400


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] spoofing


Oh, wait, I take it back. Your bounces DO have a return path, Art!

On Sun, Sep 29, 2002 at 08:46:47PM -0400, Arthur S. Alexion wrote:
>    ----- Transcript of session follows -----
> 554 MX list for smkr.ru points back to semikar.donpac.ru
> 554 <and@smkr.ru>... Local configuration error

Well, getting back in touch with those folks is going to be
complicated until they fix their DNS.

>    ----- Original message follows -----
> 
> Return-Path: <arthur@alexion.com>
> Received: from silmaril.donpac.ru (silmaril.donpac.ru
>  [195.161.172.248]) by semikar.donpac.ru (8.9.3/8.9.3/-) with ESMTP id
>  FAA82770
> 	for <and@smkr.ru>; Sat, 28 Sep 2002 05:33:03 +0400 (MSD)
> 	(envelope-from arthur@alexion.com)
> From: arthur@alexion.com
> Received: from donpac.ru (alb-66-24-199-116.nycap.rr.com
>  [66.24.199.116]) by silmaril.donpac.ru (8.11.3/8.11.3/cae2.2.0.4) with
>  SMTP id g8S01PS40413 for <and@smkr.ru>; Sat, 28 Sep 2002 04:01:29
>  +0400 (MSD)
> 	(envelope-from arthur@alexion.com)
> Date: Fri Sep 27 19:00:36 2002
> To: and@smkr.ru
> Subject: Äåëîâîå ïðåäëîæåíèå
> Mime-Version: 1.0
> Content-type: text/plain; charset="windows-1252"
> Message-ID: <1364@know.de>
> X-Logged: Logged by silmaril.donpac.ru as g8S01PS40413 at Sat Sep 28
>  04:01:29 2002

So silmaril.donpac.ru (the ligitimate hostname of that machine, as
near as I can tell) received the email at Sat, 28 Sep 2002 04:01:29
+0400 (MSD) (hope silmaril's clock is in sync!) from a host claiming
to have silmaril's domain (uselessly; it's more likely that the
author of this software doesn't understand what the argument to
the SMTP EHLO command is supposed to do) but that was actually
alb-66-24-199-116.nycap.rr.com  [66.24.199.116]. That's RoadRunner,
a US national ISP. You could report this to their abuse department.
They definitely have logs of who was connected and using that IP
address at that time (they need them for billing).

I'm willing to wager that, though sending the spam is quasi-legal,
it's against RR's service contract. What you'll find, though, is
that this is one of two things: a dialup account that has been
hacked (and the dialer came in from abroad--plausibly Russia, but
there's no good reason to assume that, really), or an RR cable
modem account where someone has an open relay. In either case,
letting the ISP know is a good-neighbor thing to do, and it'll
either get the user to chaing their password or close their relay,
but the spammer will just steal someone else's password or find
another open mail relay, so it's not going to have an immediate
effect on the volume of spam you get.

Chasing down just what Road Runner's acceptable use policy allows
and what it does not is significantly harder than it really should
be. This document: http://www.scbusinessrr.com/acceptuse.pdf might
matter, or it might now. I can find abuse reporting programs on a
variety of localized RR pages, but not on the main one (well, not in
sixty seconds of clicking, anyway, which is too damn long). If
you're persistant, especially if you start calling phone numbers and
get to real people, I bet you can make a dent here.

> +7-861-37-5-53-11, +7-902-485-05-47

Ooo... neat. Not that I'd suggest calling them, but this tracks
things directly to a business (or home?). Not that that helps much;
spam's probably perfectly legal there (as, btw, it is in the US;
opt-out, pshaw).

> Email:
> 
> contact@kingarthurmail.com

That might be more helpful.

Provided that this spammer is actually running some kind of business
and, thus, actually wants responses, they might well have provided a
moderately valid email address.

Now, this could just be a free, throw-away address (you know, the
kind *you* use in web forms to avoid scum like this ;^>), but I
don't think that's the case this time.

For starters, what are the chances that anyone'd get "contact" as
the username portion of an email address at a free email account,
especially if they were just going to throw the address away anyhow?

Second, neither http://www.kingarthurmail.com/ nor
http://kingarthurmail.com is, as one might expect a "set up your
free email here!" web site. So maybe we can get somewhere with this.

First off:

humbug:~% whois -h whois.enom.com kingarthurmail.com
Domain name: kingarthurmail.com

Registrant :
   N/A
   ANNA LORY   (wugivefog@popstar.com)
   434 336 1156
   FAX: 434 336 1156
   406 mount holly drive
   PORTS MOUTH, VA 23707
   US


Administrative :
   N/A
   ANNA LORY   (wugivefog@popstar.com)
   434 336 1156
   FAX: 434 336 1156
   406 mount holly drive
   PORTS MOUTH, VA 23707
   US


Billing :
   N/A
   ANNA LORY   (wugivefog@popstar.com)
   434 336 1156
   FAX: 434 336 1156
   406 mount holly drive
   PORTS MOUTH, VA 23707
   US


Technical :
   N/A
   ANNA LORY   (wugivefog@popstar.com)
   434 336 1156
   FAX: 434 336 1156
   406 mount holly drive
   PORTS MOUTH, VA 23707
   US
[...]
Created: 2002-09-09 00:47:02
Expires: 2003-09-09 00:47:46

Perhaps it's worth finding out more about Anna Lory? Of course, it's
quite plausible that *all* the information there is completely
faked, but if it is, a lot of unnecessary care was put into it
(domain name registries regularly accept 800-555-1212 as the contact
phone number).

Things get more interesting, though:

humbug:~% nslookup
Default Server:  x.z.com
Address:  p.q.r.s

> set q=ANY
> kingarthurmail.com
Server:  x.z.com
Address:  p.q.r.s

Non-authoritative answer:
kingarthurmail.com
        origin = dns1.name-services.com
        mail addr = info.name-services.com
        serial = 2002050701
        refresh = 3600 (1H)
        retry   = 120 (2M)
        expire  = 86400 (1D)
        minimum ttl = 3600 (1H)
kingarthurmail.com      nameserver = dns1.name-services.com
kingarthurmail.com      nameserver = dns2.name-services.com
kingarthurmail.com      nameserver = dns3.name-services.com
kingarthurmail.com      nameserver = dns4.name-services.com
kingarthurmail.com      nameserver = dns5.name-services.com
kingarthurmail.com      internet address = 216.168.60.84
kingarthurmail.com      preference = 10, mail exchanger = smtp.name-services.com

Authoritative answers can be found from:
[clip]
> www.kingarthurmail.com
Server:  x.z.com
Address:  p.q.r.s

Non-authoritative answer:
www.kingarthurmail.com  internet address = 66.150.5.22

Authoritative answers can be found from:
[clip]

I show most of that because it might be useful in other contacts.
The part we care about right now is the mail exchanger,
smtp.name-services.com. Here's where things start to get fun:

humbug:~% host smtp.name-services.com
smtp.name-services.com is a nickname for smtp.enom.com
smtp.enom.com has address 66.150.5.180

Oh, really. Who's enom.com? Remember the use of whois.enom.com
before? They're a domain registrar. Apparently they'll also provide
SMTP forwarding services. Perhaps they would be interested in an
email address related to their mail system being attached to spam?
Especially in light of http://www.enom.com/help/AbusePolicy.asp.
Seems pretty cut and dry to me.

Art, does this explain the research tools you need to chase spam
down? It's a bit of a hassle, and almost definitely not worth it for
every piece of spam out there, but for this little email-address
hijacking escapade you're dealing with, where the sender has gone to
such an extent to hide their identity, it might be worth while to
smack them back a bit.

-- 
gabriel rosenkoetter
gr@eclipsed.net

Attachment: pgpupWsH9n3La.pgp
Description: PGP signature


  • References: