On Thu, 10 May 2018 12:48:29 +0000
Paul Stead wrote:

> On 10/05/2018, 13:46, "David Jones" <djo...@ena.com> wrote:
> 
>     >Do you have a reason to think that that's possible?
>     >It doesn't seem very likely, but there are some default whitelist
>     >entries that should go if it is.  
> 
>  Anyone on O365 not using webmail or
> Outlook can spoof any other O365 customer using authenticated SMTP to
>     smtp.office365.com where they can control the envelope-from and
> From: header and the SPF check will pass.  The only thing stopping it
> is Microsoft's ability to detect unusual activity.

My experience with gmail is that they rewrite the envelope. I expected
O365 to do the same.

> 
> Not only is it possible - I've had actual examples of this happening
> on our platform, spoofed Envelope-From spam sent through O365 and the
> SPF passing...
> 

In that case the following domains should be moved from 
60_whitelist_auth.cf to 60_whitelist_dkim.cf:

usps.gov
hilton.com
accountprotection.microsoft.com
theupsstore.com
logmein.com
lastpass.com
amtrak.com
druryhotels.com
ticketmaster.com
adt.com
homedepot.com

And the following should be removed from 60_whitelist_spf.cf:


match.com
silicon.com





Reply via email to