MarchFun 發表於 2007-12-11 11:48:05

Yahoo本身也是Open Relay?

<P>這一陣子一直有來自 Yahoo 伺服器的垃圾信,這些垃圾信真的神通廣大,不如是如何滲透的,竟然可以使用 Yahoo 的郵件伺服器來寄信。我在想是否 Yahoo 內部有內鬼呢?如果不是的話,那 Yahoo 擺那麼的高姿態來對付外面的正規郵件伺服器,把別人嫌得好似各個都是垃圾主機,結果自己也差不了多少。</P>
<P>&nbsp;</P>
<P>這些被利用 Yahoo 郵件主機其&nbsp; IP 還真的都是 Yahoo 的:</P>
<P>&nbsp;</P>
<P>Mon 2007-12-10 10:49:23: Session 75; child 1; thread 5988<BR>Mon 2007-12-10 10:49:02: Accepting SMTP connection from [<FONT color=red>69.147.95.80</FONT>:25366]<BR>Mon 2007-12-10 10:49:02: --&gt; 220 mail.suma.tw ESMTP MDaemon 9.6.2; Mon, 10 Dec 2007 10:49:02 +0800<BR>Mon 2007-12-10 10:49:03: &lt;-- HELO <FONT color=red>smtp117.plus.mail.sp1.yahoo.com</FONT><BR>Mon 2007-12-10 10:49:03: --&gt; 250 mail.suma.tw Hello smtp117.plus.mail.sp1.yahoo.com, pleased to meet you<BR>Mon 2007-12-10 10:49:03: &lt;-- MAIL FROM:&lt;<A href="mailto:[email protected]">[email protected]</A>&gt;<BR>Mon 2007-12-10 10:49:03: Performing SPF lookup (yahoo.com.hk / 69.147.95.80)<BR>Mon 2007-12-10 10:49:03: *&nbsp; Result: none; no SPF record in DNS<BR>Mon 2007-12-10 10:49:03: ---- End SPF results<BR>Mon 2007-12-10 10:49:03: --&gt; 250 &lt;<A href="mailto:[email protected]">[email protected]</A>&gt;, Sender ok<BR>Mon 2007-12-10 10:49:03: &lt;-- RCPT TO:&lt;<A href="mailto:[email protected]">[email protected]</A>&gt;<BR>Mon 2007-12-10 10:49:03: Performing DNS-BL lookup (69.147.95.80 - connecting IP)<BR>Mon 2007-12-10 10:49:11: *&nbsp; relays.mail-abuse.org - passed<BR>Mon 2007-12-10 10:49:11: *&nbsp; zen.spamhaus.org - passed<BR>Mon 2007-12-10 10:49:11: ---- End DNS-BL results<BR>Mon 2007-12-10 10:49:11: --&gt; 250 &lt;<A href="mailto:[email protected]"><FONT color=#1d4489>[email protected]</FONT></A>&gt;, Recipient ok<BR>Mon 2007-12-10 10:49:11: &lt;-- DATA<BR>Mon 2007-12-10 10:49:11: Creating temp file (SMTP): d:\mdaemon\temp\07\md50000000001.tmp<BR>Mon 2007-12-10 10:49:11: --&gt; 354 Enter mail, end with &lt;CRLF&gt;.&lt;CRLF&gt;<BR>Mon 2007-12-10 10:49:11: Message size: 1980 bytes<BR>Mon 2007-12-10 10:49:11: Performing DKIM lookup<BR>Mon 2007-12-10 10:49:11: *&nbsp; File: d:\mdaemon\temp\07\md50000000001.tmp<BR>Mon 2007-12-10 10:49:11: *&nbsp; Message-ID: n/a<BR>Mon 2007-12-10 10:49:11: *&nbsp; Result: neutral<BR>Mon 2007-12-10 10:49:11: ---- End DKIM results<BR>Mon 2007-12-10 10:49:11: Performing DomainKeys lookup (Sender: <A href="mailto:[email protected]">[email protected]</A>)<BR>Mon 2007-12-10 10:49:11: *&nbsp; File: d:\mdaemon\temp\07\md50000000001.tmp<BR>Mon 2007-12-10 10:49:11: *&nbsp; Message-ID: n/a<BR>Mon 2007-12-10 10:49:11: *&nbsp;&nbsp;&nbsp; Querying: s1024._domainkey.yahoo.com.hk ...<BR>Mon 2007-12-10 10:49:11: *&nbsp;&nbsp;&nbsp; Key record: k=rsa; t=y;&nbsp; n=A 1024 bit key; p=&lt;not logged&gt;<BR>Mon 2007-12-10 10:49:11: *&nbsp;&nbsp;&nbsp; Verification result: bad - (testing)<BR>Mon 2007-12-10 10:49:11: *&nbsp; Querying for policy: yahoo.com.hk<BR>Mon 2007-12-10 10:49:11: *&nbsp;&nbsp;&nbsp; Querying: _domainkey.yahoo.com.hk ...<BR>Mon 2007-12-10 10:49:11: *&nbsp;&nbsp;&nbsp; DNS: *&nbsp; Name server has no records of the requested type for that domain<BR>Mon 2007-12-10 10:49:11: *&nbsp; Result: pass<BR>Mon 2007-12-10 10:49:11: ---- End DomainKeys results<BR>Mon 2007-12-10 10:49:11: Performing Sender ID lookup (yahoo.com.hk / 69.147.95.80)<BR>Mon 2007-12-10 10:49:21: *&nbsp; DNS: 10 second wait for DNS response exceeded <BR>Mon 2007-12-10 10:49:22: *&nbsp; Result: none; no SPF record in DNS<BR>Mon 2007-12-10 10:49:22: ---- End Sender ID results<BR>Mon 2007-12-10 10:49:22: Passing message through AntiVirus (Size: 1980)...<BR>Mon 2007-12-10 10:49:22: *&nbsp; Message is clean (no viruses found)<BR>Mon 2007-12-10 10:49:22: ---- End AntiVirus results<BR>Mon 2007-12-10 10:49:22: Passing message through Outbreak Protection...<BR>Mon 2007-12-10 10:49:22: *&nbsp; Message-ID: <BR>Mon 2007-12-10 10:49:22: *&nbsp; Reference-ID: str=0001.0A090201.475CA858.007E,ss=1,fgs=0<BR>Mon 2007-12-10 10:49:22: *&nbsp; Virus result: 0 - Clean<BR>Mon 2007-12-10 10:49:22: *&nbsp; Spam result: 1 - Clean<BR>Mon 2007-12-10 10:49:22: *&nbsp; IWF result: 0 - Clean<BR>Mon 2007-12-10 10:49:22: ---- End Outbreak Protection results<BR>Mon 2007-12-10 10:49:22: Message creation successful: d:\mdaemon\inbound\05\md50000000880.msg<BR>Mon 2007-12-10 10:49:22: --&gt; 250 Ok, message saved &lt;Message-ID: &gt;<BR>Mon 2007-12-10 10:49:23: &lt;-- QUIT<BR>Mon 2007-12-10 10:49:23: --&gt; 221 See ya in cyberspace<BR>Mon 2007-12-10 10:49:23: SMTP session successful (Bytes in/out: 2126/370)</P>

MarchFun 發表於 2007-12-11 11:52:10

Mon 2007-12-10 12:26:17: Session 93; child 1; thread 692<BR>Mon 2007-12-10 12:26:15: Accepting SMTP connection from [<FONT color=red>69.147.95.83</FONT>:47100]<BR>Mon 2007-12-10 12:26:15: --&gt; 220 mail.suma.tw ESMTP MDaemon 9.6.2; Mon, 10 Dec 2007 12:26:15 +0800<BR>Mon 2007-12-10 12:26:15: &lt;-- HELO <FONT color=red>smtp120.plus.mail.sp1.yahoo.com</FONT><BR>Mon 2007-12-10 12:26:15: --&gt; 250 mail.suma.tw Hello smtp120.plus.mail.sp1.yahoo.com, pleased to meet you<BR>Mon 2007-12-10 12:26:15: &lt;-- MAIL FROM:&lt;<A href="mailto:[email protected]">[email protected]</A>&gt;<BR>Mon 2007-12-10 12:26:15: Performing SPF lookup (yahoo.com.hk / 69.147.95.83)<BR>Mon 2007-12-10 12:26:15: *&nbsp; Result: none; no SPF record in DNS<BR>Mon 2007-12-10 12:26:15: ---- End SPF results<BR>Mon 2007-12-10 12:26:15: --&gt; 250 &lt;<A href="mailto:[email protected]">[email protected]</A>&gt;, Sender ok<BR>Mon 2007-12-10 12:26:15: &lt;-- RCPT TO:&lt;<A href="mailto:[email protected]">[email protected]</A>&gt;<BR>Mon 2007-12-10 12:26:15: Performing DNS-BL lookup (69.147.95.83 - connecting IP)<BR>Mon 2007-12-10 12:26:15: *&nbsp; relays.mail-abuse.org - passed<BR>Mon 2007-12-10 12:26:15: *&nbsp; zen.spamhaus.org - passed<BR>Mon 2007-12-10 12:26:15: ---- End DNS-BL results<BR>Mon 2007-12-10 12:26:15: --&gt; 250 &lt;<A href="mailto:[email protected]"><FONT color=#1d4489>[email protected]</FONT></A>&gt;, Recipient ok<BR>Mon 2007-12-10 12:26:16: &lt;-- DATA<BR>Mon 2007-12-10 12:26:16: Creating temp file (SMTP): d:\mdaemon\temp\11\md50000000001.tmp<BR>Mon 2007-12-10 12:26:16: --&gt; 354 Enter mail, end with &lt;CRLF&gt;.&lt;CRLF&gt;<BR>Mon 2007-12-10 12:26:16: Message size: 1950 bytes<BR>Mon 2007-12-10 12:26:16: Performing DKIM lookup<BR>Mon 2007-12-10 12:26:16: *&nbsp; File: d:\mdaemon\temp\11\md50000000001.tmp<BR>Mon 2007-12-10 12:26:16: *&nbsp; Message-ID: n/a<BR>Mon 2007-12-10 12:26:16: *&nbsp; Result: neutral<BR>Mon 2007-12-10 12:26:16: ---- End DKIM results<BR>Mon 2007-12-10 12:26:16: Performing DomainKeys lookup (Sender: <A href="mailto:[email protected]">[email protected]</A>)<BR>Mon 2007-12-10 12:26:16: *&nbsp; File: d:\mdaemon\temp\11\md50000000001.tmp<BR>Mon 2007-12-10 12:26:16: *&nbsp; Message-ID: n/a<BR>Mon 2007-12-10 12:26:16: *&nbsp;&nbsp;&nbsp; Querying: s1024._domainkey.yahoo.com.hk ...<BR>Mon 2007-12-10 12:26:16: *&nbsp;&nbsp;&nbsp; Key record (cached): k=rsa; t=y;&nbsp; n=A 1024 bit key; p=&lt;not logged&gt;<BR>Mon 2007-12-10 12:26:16: *&nbsp;&nbsp;&nbsp; Verification result: bad - (testing)<BR>Mon 2007-12-10 12:26:16: *&nbsp; Querying for policy: yahoo.com.hk<BR>Mon 2007-12-10 12:26:16: *&nbsp;&nbsp;&nbsp; Querying: _domainkey.yahoo.com.hk ...<BR>Mon 2007-12-10 12:26:16: *&nbsp;&nbsp;&nbsp; DNS: *&nbsp; Name server has no records of the requested type for that domain<BR>Mon 2007-12-10 12:26:16: *&nbsp; Result: pass<BR>Mon 2007-12-10 12:26:16: ---- End DomainKeys results<BR>Mon 2007-12-10 12:26:16: Performing Sender ID lookup (yahoo.com.hk / 69.147.95.83)<BR>Mon 2007-12-10 12:26:16: *&nbsp; Result: none; no SPF record in DNS<BR>Mon 2007-12-10 12:26:16: ---- End Sender ID results<BR>Mon 2007-12-10 12:26:16: Passing message through AntiVirus (Size: 1950)...<BR>Mon 2007-12-10 12:26:16: *&nbsp; Message is clean (no viruses found)<BR>Mon 2007-12-10 12:26:16: ---- End AntiVirus results<BR>Mon 2007-12-10 12:26:17: Passing message through Outbreak Protection...<BR>Mon 2007-12-10 12:26:17: *&nbsp; Message-ID: <BR>Mon 2007-12-10 12:26:17: *&nbsp; Reference-ID: str=0001.0A090207.475CBF0F.0015,ss=1,fgs=0<BR>Mon 2007-12-10 12:26:17: *&nbsp; Virus result: 0 - Clean<BR>Mon 2007-12-10 12:26:17: *&nbsp; Spam result: 1 - Clean<BR>Mon 2007-12-10 12:26:17: *&nbsp; IWF result: 0 - Clean<BR>Mon 2007-12-10 12:26:17: ---- End Outbreak Protection results<BR>Mon 2007-12-10 12:26:17: Message creation successful: d:\mdaemon\inbound\08\md50000000856.msg<BR>Mon 2007-12-10 12:26:17: --&gt; 250 Ok, message saved &lt;Message-ID: &gt;<BR>Mon 2007-12-10 12:26:17: &lt;-- QUIT<BR>Mon 2007-12-10 12:26:17: --&gt; 221 See ya in cyberspace<BR>Mon 2007-12-10 12:26:17: SMTP session successful (Bytes in/out: 2085/359)

MarchFun 發表於 2007-12-18 20:54:54

最近這幾天發現的主機都來自
*.bullet.mail.re4.yahoo.com

隨風浮雲 發表於 2007-12-18 22:40:51

我看了公司的log也是如此,好像只有這個位址有問題。

jtain 發表於 2007-12-19 10:05:58

我所之的消息時 yahoo 被廣告商突破成功,他們還在研究為何會被突破?
不過,已經好幾天了,還沒處理好嗎?

MarchFun 發表於 2007-12-19 10:18:08

這個情形不是好幾天了,是好幾個月囉!

MarchFun 發表於 2008-2-27 11:14:55

最近 Yahoo 的不見了,變成是 Google 被人突破了...這些人真是厲害,為了發廣告信花這麼大功夫。
頁: [1]
檢視完整版本: Yahoo本身也是Open Relay?