lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: vincent at renardias.com (Vincent Renardias)
Subject: HTTP request with SMTP message

On Mon, 2003-11-24 at 17:25, Tiago Halm wrote:
> It's not the first time, but I gave up trying to figure it out.
> My IIS (port 80) received this HTTP request from x.x.x.x.
> 
> Any thoughts ?

Yes: somebody is trying to see if your webserver has proxy-mode enabled
and is trying to use this feature to relay spam.

Cordialement,

> ----------------------------------------------------------------------------
> ----------
> POST http://x.x.x.x:25/ HTTP/1.1
> Content-type: application/octet-stream
> Content-length: 540
> Host: x.x.x.x
> 
> HELO ps.com
> MAIL FROM:<vsuhfbovuhs@...al.rr.com>
> RCPT TO: <looc_si_maps@...oo.ie>
> DATA
> Message-ID:
> <080083058050049051046050050046055052046050052052058052058056048@...com>
[snip]

-- 
Vincent RENARDIAS
http://www.renardias.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ