On Fri, Oct 23, 2020 at 02:14:58AM -0400, Viktor Dukhovni wrote:
> On Thu, Oct 22, 2020 at 10:44:06PM -0700, Rich Wales wrote:

> > Oct 21 20:22:39 memoryalpha dovecot: imap-login: Aborted login (no auth
> > attempts in 0 secs): user=<>, rip=127.0.0.1, lip=127.0.0.1, secured,
> > session=<Tvvn+TmyNq9/AAAB>
> 
> But note also "dovecot" showing up here.  It looks like the spammer is
> using some feature of Dovecot to originate a connection to the Postfix
> SMTP server.

Of course that could just be smtpd enabling Dovecot auth, though you
should probably not enable SASL on port 25.  In which case "Dovecot"
may be a distraction.

> 
> > Oct 21 20:22:40 memoryalpha postfix/postscreen[4751]: NOQUEUE: reject:
> > RCPT from [193.169.253.190]:63634: 450 4.7.1 Service unavailable; client
> > [193.169.253.190] blocked using zen.spamhaus.org;
> > from=<spam...@tiscali.it>, to=<spam...@tiscali.it>, proto=ESMTP,
> > helo=<WIN-NT9DHV1HPCJ>
> 
> Note the matching "helo".  The two connections sure look related.

One interesting question is whether you somehow have TCP fast open
enabled by default.  If the purpose of the first connection is to obtain
a TFO cookie, and somehow the second connection is able to use this
cookie (weak validation?) to send an entire SMTP transaction along with
the SYN packet, but this time with 127.0.0.1 as the source address, then
the use of two connections for the attack starts to make sense.

Of course TFO is supposed to provide some cryptographic protection
against spoofing the source address.  So something odd is happening
if that's the actual story.

Do you have any non-default network kernel parameter settings that
might be related to TCP fastopen?

Perhaps a previously implanted backdoor makes this form of attack
possible.

-- 
    Viktor.

Reply via email to