On 2022-01-29 09:15:02 +0000, Matthew Richardson via mailop wrote:
> As a thought (probably wrong) could this be caused by your O365 users
> forwarding INCOMING email to them FROM outlook.com and/or mail.alokind.com
> to external addresses?

Since all mail flows through Exchange 365, O365 would have to allow my users to 
preserve
the FROM address, which seems like a security flaw. The only reasonable time 
I've seen
this preservation is for forwarded calendar invites, which in my exim config 
have their
own special rewrite rules, and did not trigger.

Side note: forwarded calendar invites break DKIM due to this preservation.

> >  * Are there any safeguards in place from preventing one tenant from using 
> > another
> >    tenant's connectors?
> 
> It is not certain that this is what is occurring.  For example, your setup
> would not preclude other tenants pointing their outgoing email to your Exim
> (not that this would be sensible for them).

Precisely! I'm looking for restrictions on O365's end to prevent another tenant 
from
using my connector. I have yet to find any, but maybe I'm not looking hard 
enough.

> You may wish to have some authentication between O365 and Exim.  The MS
> document linked discusses how to do this with certificates.

The certificate setup listed at that page did not provide settings for outbound
connector client certificates. From what I've found and done, I've set up a 
server-side
certificate, which is used for legitimate connections (times UTC, fields 
obfuscated):

    Jan 29 14:04:54 webmail exim[2482103]: 1nDoLW-00APhv-Bk <= a...@e.sc 
H=mail-dm6nam12lp20206.outbound.protection.outlook.com 
(NAM12-DM6-obe.outbound.protection.outlook.com) [2a01:111:f400:fe59::206]:17704 
P=esmtps L. X=TLS1.2:ECDHE_SECP384R1__ECDSA_SHA256__AES_256_GCM:256 CV=no 
SNI=ipv6.e.sc K S=162589 M8S=0 RT=0.202s 
id=79e8610b9a6e43c29cf1833a821ed...@mn2pr08mb6272.namprd08.prod.outlook.com 
T="FW: BBB" from <a...@e.sc> for c...@ddd.ee

Comparing that to the fields in the original blocked connection:

    Jan 28 10:38:40 webmail exim[2145158]: 
H=mail-mw2nam10olkn2087.outbound.protection.outlook.com 
(NAM10-MW2-obe.outbound.protection.outlook.com) [40.92.42.87]:62109 
X=TLS1.2:ECDHE_SECP384R1__ECDSA_SHA256__AES_256_GCM:256 CV=no rejected MAIL 
<sylviaqyplina...@outlook.com>: prohibited sender domain

There are these things to note from exim's log format [0]:

  * TLS was negotiated in both cases: `X` field
  * no `SNI` was provided in the blocked case
  * no client certificate valiation was done from exim to O365: `CV` field

The `CV` field is the last thing I can control, but I don't believe that 
provides any
authentication of valid email domains, only a lesser authentication that it's 
O365
connecting to me, which is already guaranteed by the IP ACLs.

I appreciate the look,
-- 
Alex

[0] https://www.exim.org/exim-html-current/doc/html/spec_html/ch-log_files.html
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to