On 15/09/2015 06:54, Franck Martin wrote: 

> On Mon, Sep 14, 2015 at 12:00 PM, Michael Peddemors <mich...@linuxmagic.com> 
> wrote:
> 
>> Monitoring from ISP's and Telco's has always shown a lot of leakage from the 
>> servers called..
>> 
>> mail-pu1apc01hn0200.outbound.protection.outlook.com [1]
>> 
>> And over the last week, those numbers substantially increased..
>> 
>> However, while caught by our filtering systems, you have to look at some 
>> simple obvious issues..
>> 
>> (Maybe someone can explain how this traffic is relayed, and why it is so 
>> hard to stop at the source?)
>> 
>> Return-Path: <>
>> 
>> ^^^^ (We wrote a 'fake bounce' rule specifically for protection.outlook.com 
>> [2] servers)
>> Much of the spam shows up with no Return-Path, I am sure that can be 
>> prevented, no?
>> 
>> Delivered-To: mich...@linuxmagic.com
>> Received: (qmail 29387 invoked from network); 14 Sep 2015 17:13:15 -0000
>> Received: from mail-pu1apc01hn0200.outbound.protection.outlook.com [1] (HELO 
>> APC01-PU1-obe.outbound.protection.outlook.com [3]) (104.47.126.200)
>> by be.cityemail.com [4] with SMTP
>> (e1fa336e-5b03-11e5-8599-5bc0ef165c91); Mon, 14 Sep 2015 10:13:15 -0700
>> Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=<>;
>> 
>> ^^^^^ Could this be a clue? No Sender IP? No MailFrom?
> 
> the HELO hostname does not have an SPF record: 
> https://dmarcian.com/spf-survey/APC01-PU1-obe.outbound.protection.outlook.com 
> [6] 
> 
> cf http://trac.tools.ietf.org/html/rfc7208#section-10.1.3 [7] 
> 
>> Received: from [106.223.20.123] (106.223.20.123) by
>> SG2PR0201MB0984.apcprd02.prod.outlook.com [5] (10.162.202.155) with Microsoft
>> SMTP Server (TLS) id 15.1.268.17; Mon, 14 Sep 2015 17:13:03 +0000
>> Content-Type: multipart/alternative; boundary="===============0365285247=="
>> MIME-Version: 1.0
>> Subject: I Have An Urgent Matter To Discuss With You
>> To: recipie...@wizard.ca
>> From: v...@wizard.ca, hol...@wizard.ca, k...@wizard.ca
>> 
>> ^^^^ None of the above exist of course.. actually sent to different addresses
>> 
>> Date: Mon, 14 Sep 2015 22:42:56 +0530
>> Reply-To: <verahollinkv...@gmail.com>
>> 
>> ^^^^^ Isn't this suspicious?
> 
> seems someone can get outlook.com [8] to do some backscatter or inject a fake 
> bounce and have it routed by outlook.com [8] ?

It is becoming rather annoying :) 

 

Links:
------
[1] http://mail-pu1apc01hn0200.outbound.protection.outlook.com
[2] http://protection.outlook.com
[3] http://APC01-PU1-obe.outbound.protection.outlook.com
[4] http://be.cityemail.com
[5] http://SG2PR0201MB0984.apcprd02.prod.outlook.com
[6]
https://dmarcian.com/spf-survey/APC01-PU1-obe.outbound.protection.outlook.com
[7] http://trac.tools.ietf.org/html/rfc7208#section-10.1.3
[8] http://outlook.com
_______________________________________________
mailop mailing list
mailop@mailop.org
http://chilli.nosignal.org/mailman/listinfo/mailop

Reply via email to