Sup*_*kEl 3 email linux spam spf spoofing
今天早上我收到一封网络钓鱼电子邮件,它似乎来自我的一个地址。
查看标题,我发现了一些有趣的事情。
DomainKey-Status: no signature
X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on
mydomain.com
X-Spam-Level:
X-Spam-Status: No, score=-1.0 required=5.0 tests=BAYES_00,HTML_MESSAGE,
HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,MISSING_MID,SPF_PASS autolearn=no
version=3.2.5
Received: (qmail 10412 invoked by uid 110); 6 Aug 2012 09:59:17 -0400
Delivered-To: 18-bdstrainers@anotherOfMyDomains.net
DomainKey-Status: no signature
Received: (qmail 10390 invoked by uid 110); 6 Aug 2012 09:59:17 -0400
Delivered-To: 34-info@yetAnotherOfMyDomains.com
DomainKey-Status: no signature
Received: (qmail 10373 invoked from network); 6 Aug 2012 09:59:15 -0400
Received-SPF: pass (mydomain.com: domain of surewest.com designates 212.61.84.249 as permitted sender) client-ip=212.61.84.249; envelope-from=visualsx@surewest.com; helo=d84249.iae.nl;
Received: from d84249.iae.nl (212.61.84.249)
by yetAnotherOfMyDomains.com with SMTP; 6 Aug 2012 09:59:14 -0400
Date: Mon, 6 Aug 2012 14:27:38 +0100
From: <info@yetAnotherOfMyDomains.com>
To: <info@yetAnotherOfMyDomains.com>
Subject: Your Federal Tax Payment ID: 8716780 is failed
X-Mailer: foljo
MIME-Version: 1.0
Content-Type: text/html;
charset=Windows-1252
Content-Transfer-Encoding: 7bit
Run Code Online (Sandbox Code Playgroud)
好的,首先,212.61.84.249 是荷兰的一个 IP,如果您访问该 IP,您将获得一个 LaCie 登录页面。
接下来的域surewest.com是美国中部的digitalTV/ISP。
但让我感到特别的是这一行:
Received-SPF: pass (mydomain.com: domain of surewest.com designates 212.61.84.249 as permitted sender) client-ip=212.61.84.249; envelope-from=visualsx@surewest.com; helo=d84249.iae.nl
Run Code Online (Sandbox Code Playgroud)
我的SPF
记录在我的服务器上设置正确,所以;
他们到底是如何欺骗MY 域的有效信息的SPF
,surewest.com
而 MY 域不是最确定的?
我能做些什么来防止这种情况再次发生?
您的 SPF 记录将世界上的每个人都指定为允许的发件人:
"v=spf1 mx:... +all"
Run Code Online (Sandbox Code Playgroud)
的+all
是,重要的部分+
手段“允许”和all
真正的意思是“整个互联网”。他们不需要欺骗任何东西,根据您的 SPF 记录,他们的邮件是有效的。试试吧-all
。
归档时间: |
|
查看次数: |
1571 次 |
最近记录: |