On 18/04/2024 14:21, Marco Moock wrote:
Am 18.04.2024 schrieb Sebastian Arcus via mailop <mailop@mailop.org>:

On 18/04/2024 13:44, Marco Moock via mailop wrote:
Am 18.04.2024 schrieb Sebastian Arcus via mailop
<mailop@mailop.org>:
The mention of HELO is what threw me off - and I kept on thinking
that it's not possible, as port 25 is blocked. But I completely
missed the point that even authenticated connections on 587 will
use HELo - I think?

They require auth, so they will use EHLO. :-)
Although no difference here.

The EHLO/HELO FQDN can't be used to abuse something. If it is the
FQDN with matching reverse/forward DNS, it is fine.

When submitting mail to 465/587, the machine will use its name (most
likely no a FQDN), but that is not a problem because MSAs must not
check that name - it would fail most of the time.

In that case I think I am back to square one. If an infected device
connecting to 587/465 to various servers on the internet, from our
network, to try and guess passwords/break into accounts wouldn't have
used the FQDN of our public IP as HELO - then that's not what is
going on.

It could use that, but that is equal for the attack.
You definitely need more information from them, unless identifying
and resolving the problem is impossible.

In a sense I haven't managed to make further progress with this. Spamhaus have been very vague about the problem - which to some extent I understand as they don't want the bad guys to exploit their systems. But at the same time, their latest correspondence keeps on dropping hints about port 25 - which doesn't make any sense, as port 25 outbound has always been blocked on this network - so in that case the blacklisting should have never happened. I've just tested yesterday again - and not only I can't do outbound port 25 connections from inside the network, I am getting, as expected, automatic warnings from the server when the attempts happen - which I configured a long time ago. I will take a step back and look at all the research I did and the replies both from Spamhaus and on this mailing list and try to make sense of what is happening.
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to