Ok. See attach.
Why would someone in the ISP industry try to spread a virus? Ironically I suppose a ISP admin may have their own computer infected…
Once upon a time, Hex Star <firstname.lastname@example.org> said:
Why would someone in the ISP industry try to spread a virus? Ironically I
suppose a ISP admin may have their own computer infected...
Why would someone assume that the sender in a virus email is valid?
Also, I want to thank all those with auto-responders that respond to
list email for letting me know about this message to NANOG.
Look at all the anti-spam software that uses perl.... yet the cpan
mirror ops lists is throwing out a dozen or more PDF attachments each
It seems to me a lot of virus scanners picked up this behavior in the
days of the "I Love You" and Melissa viruses, when virii tended to
infect documents rather than be self-propagating worms. We haven't lived
in a world where its likely a legitimate sender is unwittingly sending
infected documents for awhile. It'd be nice if the AV/MTA vendors would
take this feature out, or AV the message before they accept the DATA
section and leave it to the sending mail server to bounce it.
If you could read the header, the question you would have asked is, "What is Chris Adams doing in Korea sending virus mail to nanog?"
It's a shame there's no test before people subscribe.
For the humor impaired, obviously, some PC in Korea is infected with the latest virus and has both Chris's and the nanog list's addresses handy. I wasn't kidding about the test thing though
Once upon a time, Jon Lewis <email@example.com> said:
If you could read the header, the question you would have asked is, "What
is Chris Adams doing in Korea sending virus mail to nanog?"
Especially as this particular Chris Adams is not well traveled and has
never been west of the Mississippi!
What? And lose the free opportunity to spam you and tell you how good it is
at finding viruses?
(Particularly annoying when their products usually don't do anything useful
on the platform that I actually send my mail from, but that's another rant)
Haha, good catch:
Received: from BSLEE.net ([[126.96.36.199](http://188.8.131.52/)]) by [ bach.merit.edu](http://bach.merit.edu/) (MOS 3.8.2-GA) with SMTP id AEE75050; **inetnum**: [184.108.40.206](http://220.127.116.11/) - [ 18.104.22.168](http://22.214.171.124/) netname: KORNET descr: KOREA TELECOM descr: Network Management Center country: KR admin-c: [ IM76-AP](http://wq.apnic.net/apnic-bin/whois.pl?searchtext=IM76-AP&form_type=advanced) tech-c: IM76-AP Thu, 2 Aug 2007 21:34:17 -0400 (EDT)
Are we sure it's Chris? I could have very easily sent this email as
from Jon Lewis... and mail.merit.edu would accept it an send it on
I think at this point, its fairly clear what happened (fake sender, reply
that went to list etc) so continued discussion is rather fruitless.
Lesson to be learned: You cannot protect from human factors.
-alex (mlc chair)
A few, it's because the developers really are that stupid.
Mostly, though, it's that they think that if they pretend to be that stupid then they
can advertise their product via spam that's sent from a wide variety of places
that can't all be easily blocked. (Most of the developers I've talked to say that they
know it's stupid, but that's the product requirements they have to work with).