Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: WORM_MIMAIL.A Anyone have any info on what this does yet?
From: Frank Knobbe (frankknobbe.us)
Date: Mon Aug 04 2003 - 12:24:52 CDT
On Mon, 2003-08-04 at 10:57, Alex 'CAVE' Cernat wrote:
> if the virus send emails throught local smtp connection, it's a dns
> but if the virus connects directly to the 'backup' smtp server, then,
> lamerish, the virus programmer probably believed that bigger value
> associated with mx meens 'prefered server', which is the exactly
> opposite as the rfc or any documentation available :-)
No, not necessarily. There may be setups where the mail bagger does not
include virus and spam scanners, thus offering a chance of "getting in"
undetected. This is especially true if primary mail servers trust
secondary mail baggers explicitly (i.e. allow them to relay regardless
of recipient domain).
Since a lot of setup use mail baggers at ISP's as secondary MX'es, which
most likely do not have virus and spam scanners installed, the chances
of slipping through the net of defenses are a bit better.
Furthermore, setups involving secondary mail servers are a bit more
complex (not technologically, but there is more to configure),
increasing the chances for misconfigurations (such as above mentioned
relay override, or virus scanner bypass). So the added complexity works
against security and in favor of those trying to circumvent it.
The ideal virus would want to try to inject itself through MX records
farther away from the target, preferably hosts with different domains
names (as would be the case with ISPs).
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (FreeBSD)
-----END PGP SIGNATURE-----