{"id":101,"date":"2010-11-17T16:14:44","date_gmt":"2010-11-17T14:14:44","guid":{"rendered":"\/\/www.mcgill.org.za\/stuff\/?p=101"},"modified":"2010-11-17T16:14:44","modified_gmt":"2010-11-17T14:14:44","slug":"smtp-innovations-for-virii","status":"publish","type":"post","link":"https:\/\/www.mcgill.org.za\/stuff\/archives\/101","title":{"rendered":"SMTP innovations for virii"},"content":{"rendered":"<p>It took a long time, but finally an email-borne virus has bypassed the MX records for a domain, where there is an anti-spam, anti-virus and anti-mail scanner, and delivered itself directly to the target server.  This was a very obvious thing to do, but for some reason, it hasn&#8217;t happened before &#8211; presumably because virus writers have been busy reaping the low-hanging fruit, or just maybe because they didn&#8217;t realise just how many domains deliver mail to a server with an easily guessable name.  <\/p>\n<p>This is what the virus smelled like:<\/p>\n<blockquote><p>Subject: [virus Win32\/Merond.O worm]<br \/>\nYou have received A Hallmark E-Card!<br \/>\nDate: Wed, 17 Nov 2010 09:27:45 +0200<\/p><\/blockquote>\n<p>In the mail log, it looked like this:<\/p>\n<blockquote><p>2010-11-17 09:28:01 [15397] 1PIcQq-00040L-2X &lt;= e-cards@hallmark.com H=(hallmark.com) [4.3.90.120]:61593 I=[19.3.40.91]:25 P=esmtp S=686941 T=&#8221;You have received A Hallmark E-Card!&#8221; from  for shaun@it.co.za<\/p><\/blockquote>\n<p>Avira has a nice rundown of the virus &#8211; <a href=\"http:\/\/www.avira.com\/en\/support-threats-description\/tid\/5101\/worm_merond.o.html\">http:\/\/www.avira.com\/en\/support-threats-description\/tid\/5101\/worm_merond.o.html<\/a> They don&#8217;t seem to have noticed this about the SMTP engine though.<br \/>\nHow do we work around this, and encourage our visiting viruses to send themselves via the well armoured front door, with its scanner, and avoid the back door which has no protections? <\/p>\n<ul>\n<li>We could add some rules to accept SMTP only from the scanner (pretty complex rules those would be).  That&#8217;s not going to happen<\/li>\n<li>We could firewall port 25, but there is enough mail that delivers directly to make this impractical.<\/li>\n<li>We could drop the <strong>A<\/strong>-record for the domain, which might be what the SMTP engine used, but the <strong>www.<\/strong> and <strong>mail.<\/strong> records would work just as well.<\/li>\n<li>We could move the mail server to a different address that is not as easy to guess<\/li>\n<li>We could put in a transparent proxy server of some sort to enforce the policy<\/li>\n<\/ul>\n<p>All of those ideas work well for one or two domains, but for a few thousand domains all of them are a <i>stack<\/i> of work, so none of them work.  So what we will probably do is wait for all the windows desktops in the world to catch viruses and die &#8230;&lt;sigh\/&gt;  Alternatively, it is just possible that the virus did an A- record lookup after failing the MX record lookup, and this posting serves only to let the cat out of the \/bin.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It took a long time, but finally an email-borne virus has bypassed the MX records for a domain, where there is an anti-spam, anti-virus and anti-mail scanner, and delivered itself directly to the target server. This was a very obvious &hellip; <a href=\"https:\/\/www.mcgill.org.za\/stuff\/archives\/101\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[16,190],"class_list":["post-101","post","type-post","status-publish","format-standard","hentry","category-stuff","tag-security","tag-stuff"],"_links":{"self":[{"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/posts\/101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/comments?post=101"}],"version-history":[{"count":13,"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/posts\/101\/revisions"}],"predecessor-version":[{"id":115,"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/posts\/101\/revisions\/115"}],"wp:attachment":[{"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/media?parent=101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/categories?post=101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcgill.org.za\/stuff\/wp-json\/wp\/v2\/tags?post=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}