Ahh ... But the beauty of it, is that you can reference the IP address
against DHCP logs or radius logs or a list of static IP addresses and
find the person really infected.  I think as virus writers get more
creative, the IP address will help more and more.  I guess it really
depends on how you're handling it from an administrative point.

Been there, done that.  I went through messages in the quarantine
directory and piced out IP addresses and stopped quite a few Klez
infections that way.  It has merit.

I would venture to say that one could write a script that parsed the
date/time/ip out and cross-referenced that against dhcp leases/radius
logs/?? to determine who the real sending user was and email them direct
that way.  Obviously you don't know when to do it and when not to so
it's a feature that's either on or off.  Maybe that could be an option
in QS.  A way to lookup the notify email externally and expose some data
either via arguments or environment variables.  Then, an external
program could do the lookup.  I could see how it would be beneficial.
Currently all my vpopmail and radius users are stored in postgresql.
SQL logging was having some problems so I'm logging to detail files
right now.  But once I switch over to SQL Logging, I could easily run a
script to see what user is currently logged into a particular IP address
or last logged into that address and use them as the one to reply to.  I
don't think DHCP supports SQL logging, but wouldn't be terribly
difficulty to write a similar script that went through the dhcpd.leases
file and pulled the "client-hostname" and did a lookup on that.  Of
course assuming that you force "valid" client hostnames and not just let
users pick.

I think on Monday and Tuesday, I stopped over 1000 W32/Klez mails!  The
IP address helps.  I didn't go after every user, but did lookup a few
who called plus one company user (an old machine that hadn't got the new
Norton Corporate on it yet).  

Needless to say, I turned off sender notification due to political
pressure from the bosses.  I say let it notify falsely.  If nothing
else, it makes the user aware that a new virus is floating around and
makes them think and hopefully update their antivirus software.
Unfortunately, it does generate support calls from grandma/grandpa and
users who just don't understand the message.

Just some thoughts.


Charles





-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of
Jason Haar
Sent: Thursday, May 02, 2002 2:12 PM
To: [EMAIL PROTECTED]
Subject: Re: [Qmail-scanner-general]Klez


On Thu, May 02, 2002 at 11:22:59AM -0700, Surly Zek wrote:
> adding the source
> ip for people to use when troubleshooting has been
> saving many people many headaches.

How?

I'm glad you have found your own solution, however it really only deals
with Klez. There is no one "right" way of dealing with this. At the end
of the day, the virus writer can do absolutely anything they want with
the Email they generate - any scanning system (like Q-S) can only act on
what it is presented with.

-- 
Cheers

Jason Haar

Information Security Manager
Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417

_______________________________________________________________

Have big pipes? SourceForge.net is looking for download mirrors. We
supply the hardware. You get the recognition. Email Us:
[EMAIL PROTECTED]
_______________________________________________
Qmail-scanner-general mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/qmail-scanner-general


_______________________________________________________________

Have big pipes? SourceForge.net is looking for download mirrors. We supply
the hardware. You get the recognition. Email Us: [EMAIL PROTECTED]
_______________________________________________
Qmail-scanner-general mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/qmail-scanner-general

Reply via email to