You can configure the connector to only relay messages to your MTA if its (CA 
issued) cert's CN matches something specific. However, as you note, you also 
need to trust their Exchange Online IP range too. Now those IPs are not the 
same as their Azure allocations so the risk is the entire Exchange Online 
platform being compromised and your MTA specifically targeted, as opposed to a 
malicious user on a free Azure trial specifically targeting your MTA.

Incidentally, the feature you're looking for (basic authentication for smart 
hosts) exists in on-premise Exchange. I assumed it existed with the on-line 
edition too but it does not appear to, at least, any more.

Ken.

From: mailop <mailop-boun...@mailop.org> On Behalf Of Kevin A. McGrail via 
mailop
Sent: Friday 18 September 2020 15:50
To: mailop@mailop.org
Subject: Re: [mailop] [External] Re: How to do Outbound Relay from M365 
previously O365

On 9/18/2020 10:18 AM, Ken O'Driscoll via mailop wrote:
You need to set up mail flow connectors in Exchange Online. Authentication is 
certificate and/or IP based.

I think this explains it fairly well:
https://docs.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/set-up-connectors-to-route-mail


Thanks, but for outbound FROM m365 to the internet through a smarthost, this 
wouldn't suffice.  We couldn't accept Microsoft's Cert or all of Microsoft's 
IPs for relay without significant risk of inevitable abuse.

I don't think I'm missing something on this but completely open to the fact 
that I might be.

Regards,

KAM
_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to