On 25/10/2021 4:11 pm, Thomas Anderson wrote:
The IP it came from was outside my network.
I think it's just a spoofing email. I had not actually seen on, so
that raised my alarm, but I think it's ok. I need to go through and
make sure my SFP and DMARC are sound. I just checked my DKIM couple
days ago, so that's good.
Keep in mind that even with SPF, DKIM and DMARC in place there is still
the possibility of legitimate emails that your users have sent coming
back to you and being unable to authenticate them as such.
For example a user is a member of a mailing list that receiving a copy
of their post where the mailing list has altered the body or a header
which you've signed (the postfix mailing list takes pains not to damage
DKIM signatures but does use the longstanding convention of adding a
"Sender" header with the list address. If you were to sign an existing
"Sender" header or sign the non-existence of the "Sender" header then
the original DKIM signature would break even here. Other mailing lists
are much worse, breaking the body with a footer and/or tagging the
subject with the list name)
The converse is also true in some cases, that a message can appear as a
valid DKIM signed message from an authorized source while being
malicious. There are certain things to watch out for as covered in
https://noxxi.de/research/breaking-dkim-on-purpose-and-by-chance.html
which lets an unauthorized 3rd party take a previous email from a
particular sender and convince many DKIM validators that it's legitimate
on that basis while also adding their own payload which gets displayed
to the recipient.
Thanks for the replies.
On 10/25/21 4:59 AM, post...@ptld.com wrote:
My concern is that the email APPEARED to come from me! I was listed
as the sender.
Any email server can send any email claiming to come from anyone.
DKIM Signatures and SPF records working together with DMARC provides
a way to verify if a sending email server is authorized to send an
email on behalf of the address used. If your server is not using,
checking and validating DMARC then anyone can easily send you or send
someone else an email claiming to be from you. Doesn't mean they
compromised or got inside of your system or account. They just
slapped your name on the "outside of the envelope".
Was the connecting client server IP your servers IP? The IP of the
connecting client in the logs is who really sent the message, not the
arbitrary email address slapped in the Envelope-From, From header or
Sender header.