Am 18.04.2024 schrieb Sebastian Arcus via mailop <mailop@mailop.org>:

> On 18/04/2024 13:44, Marco Moock via mailop wrote:
> > Am 18.04.2024 schrieb Sebastian Arcus via mailop
> > <mailop@mailop.org>: 
> >> The mention of HELO is what threw me off - and I kept on thinking
> >> that it's not possible, as port 25 is blocked. But I completely
> >> missed the point that even authenticated connections on 587 will
> >> use HELo - I think?  
> > 
> > They require auth, so they will use EHLO. :-)
> > Although no difference here.
> > 
> > The EHLO/HELO FQDN can't be used to abuse something. If it is the
> > FQDN with matching reverse/forward DNS, it is fine.
> > 
> > When submitting mail to 465/587, the machine will use its name (most
> > likely no a FQDN), but that is not a problem because MSAs must not
> > check that name - it would fail most of the time.  
> 
> In that case I think I am back to square one. If an infected device 
> connecting to 587/465 to various servers on the internet, from our 
> network, to try and guess passwords/break into accounts wouldn't have 
> used the FQDN of our public IP as HELO - then that's not what is
> going on.

It could use that, but that is equal for the attack.
You definitely need more information from them, unless identifying
and resolving the problem is impossible.
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to