I have now had a couple of ppl ask if I was attending this year, and
while it is in Toronto which is nice, and I have been saying for the
last couple of years we need to get a few people down to one, sometimes
scheduling is a pain..
But while investigating the topics on tap, and trying to get some idea
of the anticipated attendance numbers this year, I had a little chuckle..
I had forgotten the login for Maawg, so had to do a password reset..
And the email arrived in my spam folder.. so of course I had to look at
it more closely.
Seems that they use 'mailgun' for delivery of those notices.
And looking at the message, at first glance I can see how similar it
looks to all of the 'phishing' types of emails that pretend to be
password resets.
Received: from so254-8.mailgun.net (HELO so254-8.mailgun.net) (198.61.254.8)
Okay, they use a shared service from MailGun.. (I assume this is a shared IP in
the pool, and the pool has been a sender of spam before)
Return-Path: <[email protected]>
host mailserver.m3aawg.org
mailserver.m3aawg.org mail is handled by 10 mxa.mailgun.org.
mailserver.m3aawg.org mail is handled by 10 mxb.mailgun.org.
host m3aawg.org
m3aawg.org has address 67.192.153.75
m3aawg.org mail is handled by 10 mx.m3aawg.org.cust.b.hostedemail.com
And while it is nice that they at least use a domain name related to m3aawg,
not really what a person would think of 'whitelisting' ..
And of course, in todays age.. no one should be 'bouncing' messages any more..
we should be rejecting during SMTP transactions where ever possible.
And really, if it 'did' "bounce" from say a client or internal mail delivery
mechanism, it wouldn't go to the EnvelopeFrom, it would go to the apparent from..
(and of course, I think the webmaster would want to know right away if bounces
are happening any ways, instead of looking for a bounce report)
host -t TXT mailserver.m3aawg.org
mailserver.m3aawg.org descriptive text "v=spf1 include:mailgun.org ~all"
Hmmm... that is pretty wide.. and not even a -all...
So, the thought was.. what stops someone else from sending a similar message
out of mailgun.
DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mailserver.m3aawg.org;
DomainKey-Signature: a=rsa-sha1; c=nofws; d=mailserver.m3aawg.org;
Received: from webm (Unknown [67.192.153.75])
(originated from a server that doesn't have an rDNS/PTR record?)
Aeronet Communications (C01901751) 67.192.153.64/27
(MAAWG, you might like to get a PTR record, especially if this is a dedicated
server.. )
X-PHP-Originating-Script: 33:SimpleMailInvoker.php (Like we don't see a lot of
that in compromises)
From: M3AAWG <[email protected]> (Would like to see quotes around the
friendly name)
Subject: Replacement login information for at M3AAWG
(Extra space and bare , in body are because missing first/last names, but
also a common trend in phishing attacks by script kiddies)
Okay, now .. how easy would it be to forge those password reset pages..
I leave this to your imagination, how a person could register a similar domain
name to m3aawg.org.
Sign up for a mailgun account, and send messages that are forged to be almost
identical..
m3aaawg.com/org
w3aawg.com/org
(Those are available)
I see a lot of sessions that look good at MAAWG, some beginner sessions even,
but it might be a interesting topic to use this as example of risks..
A targeted phishing attack against this group might look good on a hacker
resume..
But the point is, "everyone" should occasionally rethink current practices and
look at the risks.
Would you click on a link that went to:
https://www.m3aaawg.org/user/reset/.... (You get the drift)
And while I like the way that MAAWG uses a 'one time pass' instead of asking
for credentials, if you have never used it before, you would not be surprised
if it asked you more questions.
It may be also vulnerable to a man in the middle attack, if the DNS of the
recipient is somehow compromised.. but that is not unique to this case of
course..
Personally, I believe the EnvelopeFrom should ALWAYS reflect the senders domain
name, makes white/black listing more effective, and easy to test if it is
accurate/valid.
Hope there are discussions on that topic..
Anyways, still thinking of attending, so would like to hear about others going..
Topics I would be open to chatting with anyone about:
* ISP Recommendations, PTR naming conventions and blocking Port 25 (still, 15
years later same topic, IoT)
(So many foreign ISP's haven't yet made a move in this direction, allowing
for destructive levels of Bot activity)
* EnvelopeFrom Best Practices
* Next Evolution(s) of Email Security (Auth Recommendations)
--
"Catch the Magic of Linux..."
------------------------------------------------------------------------
Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
------------------------------------------------------------------------
A Wizard IT Company - For More Info http://www.wizard.ca
"LinuxMagic" a Registered TradeMark of Wizard Tower TechnoServices Ltd.
------------------------------------------------------------------------
604-682-0300 Beautiful British Columbia, Canada
This email and any electronic data contained are confidential and intended
solely for the use of the individual or entity to which they are addressed.
Please note that any views or opinions presented in this email are solely
those of the author and are not intended to represent those of the company.
_______________________________________________
mailop mailing list
[email protected]
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop