On 2021-09-09 at 15:21:02 UTC-0400 (Thu, 9 Sep 2021 15:21:02 -0400)
J Doe <gene...@nativemethods.com>
is rumored to have said:
[...]

Hi,

In this case, is the botnet actually trying credentials ? It looks to me that it is establishing a TLS connection and then dropping it (or am I mistaken ?).

Note this log line from the original message:

SepĀ  6 09:17:42 localhost postfix/smtpd[14622]: disconnect from unknown[77.247.110.240] ehlo=2 starttls=1 auth=0/1 commands=3/4

That's an indicator of a failed "AUTH" command. I suppose that *would* happen if the bot somehow sent an AUTH command without providing any credentials but there's no indication logged by Postfix of exactly how or why an AUTH command fails; Postfix doesn't really know. Whatever SASL layer Postfix is using obviously must know, but it is likely not to log it.

If it is just establishing TLS and is not actually trying credentials, why would a botnet do that ?

Purely hypothetical, but the obvious answer IF that were happening would be dumb bot coders.

Postscreen works so well because bots do useless and idiosyncratic things. For almost 2 decades, one botnet has been doing things in SMTP that are perfect fingerprints. If the geniuses behind Cutwail can shoot themselves in the foot a billion times a day, surely one of the cred-stuffer bots surely could treat /dev/zero as their credentials list.


--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire

Reply via email to