Re: [mailop] How to detect fraud login in POP IMAP or SMTP?

2021-09-22 Thread Sidsel Jensen via mailop


> On 22 Sep 2021, at 21.44, Jarland Donnell via mailop  
> wrote:
> 
> This is true. While brute force attacks persist, we rarely see a connection 
> between that and compromised accounts these days. Most often the attacker 
> knew the password immediately. Now what would be cool, and has always been on 
> my list of "maybe one day" features, would be either using an API from 
> haveibeenpwned.com or merely keeping a copy of publicly released database 
> leaks, and then testing results internally. If an email in a database dump 
> matches one in your system, test the password leaked with it. If it works, 
> force password change.
> 

We use haveibeenpwned - but a bit differently than what you propose here. We 
have a local copy of haveibeenpwned running that compare the passwd hash with 
the hash in haveibeenpwned. Each hash  in haveibeenpwned is associated with a 
count based on how many breaches it’s been found in. If we find a match on the 
hash we check the count towards a set threshold, and if the count is higher 
than the threshold the user will get a big red box in his or her webmail saying 
- “We really think it would be a good idea if you changed your password. Please 
do it now. Your password is insecure”

Unfortunately we can only do this in our Webmail, we have no good way of 
sending this message to a user of a 3rd party mail client. If someone on this 
list has a good idea on how that can be accomplished with a good UX I am very 
eager to hear it :-)

Kind Regards,
  Sidsel, Postmistress @ one.com


> I think a lot more people will be doing things like this in the future, it's 
> hardly a fresh idea. But the amount of compromises it would prevent are 
> likely enough to justify the overhead of building it out.
> 
> On 2021-09-22 01:38, Lena--- via mailop wrote:
>>> From: Alessio Cecchi 
>>> we are an email hosting provider, and as you know many users use weak
>>> passwords, or have trojan on their PC that stolen their password that
>>> are used to sent spam or doing some kinds of fraud.
>>> We already have a "script" that checks, from log files, the country of
>>> the IP address and "do something" to detect if is an unusual login. But
>>> is not really sufficient.
>> I suspect that stealing passwords with trojans is more successful
>> than brute-forcing passwords via POP, IMAP or SMTP.
>> Therefore, detecting logins for brute-forcing is not enough.
>> You need to detect when stolen passwords are used to send spam
>> via your server. One approach is to check rate of attempts to send
>> to non-existent recipient email addresses, because spammers usually
>> send to dirty lists of email addresses full of message-ids,
>> truncated email addreses or prepended with garbage.
>> I wrote an implementation for Exim:
>> https://github.com/Exim/exim/wiki/BlockCracking
>> It also detects some brute-forcing, but the main is automatic blocking
>> of accounts used for spamming with trojan-stolen passwords.
>> ___
>> mailop mailing list
>> mailop@mailop.org
>> https://list.mailop.org/listinfo/mailop
> ___
> mailop mailing list
> mailop@mailop.org
> https://list.mailop.org/listinfo/mailop



signature.asc
Description: Message signed with OpenPGP
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] How to detect fraud login in POP IMAP or SMTP?

2021-09-22 Thread Jarland Donnell via mailop
This is true. While brute force attacks persist, we rarely see a 
connection between that and compromised accounts these days. Most often 
the attacker knew the password immediately. Now what would be cool, and 
has always been on my list of "maybe one day" features, would be either 
using an API from haveibeenpwned.com or merely keeping a copy of 
publicly released database leaks, and then testing results internally. 
If an email in a database dump matches one in your system, test the 
password leaked with it. If it works, force password change.


I think a lot more people will be doing things like this in the future, 
it's hardly a fresh idea. But the amount of compromises it would prevent 
are likely enough to justify the overhead of building it out.


On 2021-09-22 01:38, Lena--- via mailop wrote:

From: Alessio Cecchi 



we are an email hosting provider, and as you know many users use weak
passwords, or have trojan on their PC that stolen their password that
are used to sent spam or doing some kinds of fraud.

We already have a "script" that checks, from log files, the country of
the IP address and "do something" to detect if is an unusual login. 
But

is not really sufficient.


I suspect that stealing passwords with trojans is more successful
than brute-forcing passwords via POP, IMAP or SMTP.
Therefore, detecting logins for brute-forcing is not enough.
You need to detect when stolen passwords are used to send spam
via your server. One approach is to check rate of attempts to send
to non-existent recipient email addresses, because spammers usually
send to dirty lists of email addresses full of message-ids,
truncated email addreses or prepended with garbage.
I wrote an implementation for Exim:
https://github.com/Exim/exim/wiki/BlockCracking
It also detects some brute-forcing, but the main is automatic blocking
of accounts used for spamming with trojan-stolen passwords.

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Gmail putting messages to spam

2021-09-22 Thread Bjoern Franke via mailop

Hi,


$ dig +short TXT _dmarc.gmail.com
"v=DMARC1; p=none; sp=quarantine; rua=mailto:mailauth-repo...@google.com";

.. but then refusing to receive them ¯\_(ツ)_/¯


Google Groups for receiving DMARC reports and then refusing them because 
of spam or nobody external is allowed to post there is also a popular 
behaviour.


Regards
Bjoern
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Gmail putting messages to spam

2021-09-22 Thread Bernardo Reino via mailop

On Tue, 21 Sep 2021, Jaroslaw Rafa via mailop wrote:


Dnia 20.09.2021 o godz. 14:17:27 Jaroslaw Rafa via mailop pisze:

I want to return to an old issue, which repeatedly happens again and again,
that is, Google putting emails from me to recipient's spam folder. What's
absurd, this happens not only to Gmail addresses to which I am writing for
the first time, but also to recipients with whom I have previously
corresponded and who marked my messages as non-spam. It even happens when
I'm replying to a message I got from a Gmail user, which is totally absurd!
It can even happen in a middle of an email exchange - ie. I have once
exchanged a few messages with a Gmail user without problems, then suddenly
one of my subsequent messages in the conversation went to Spam.


Well, Gmail is a comedy :). I also manage an email account of some
organization that I am a member of, which is on Gmail. Just today I found
out that Gmail has dropped to Spam a few *replies from other Gmail users*
(our members) to messages that we sent out from that account to them!
Regular replies, to regular messages, *from Gmail user to Gmail user*.

If that is not a whole new level of absurd, then what is...?


You want absurd? :)

: host aspmx.l.google.com[173.194.76.26] said:
550-5.2.1 The user you are trying to contact is receiving mail at a rate
that 550-5.2.1 prevents additional messages from being delivered. For more
550-5.2.1 information, please visit 550 5.2.1
https://support.google.com/mail/?p=ReceivingRatePerm e10si1566563wrq.336 -
gsmtp (in reply to RCPT TO command)

This is Google saying "we want those DMARC reports",

$ dig +short TXT _dmarc.gmail.com
"v=DMARC1; p=none; sp=quarantine; rua=mailto:mailauth-repo...@google.com";

.. but then refusing to receive them ¯\_(ツ)_/¯___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] How to detect fraud login in POP IMAP or SMTP?

2021-09-22 Thread Jaroslaw Rafa via mailop
Dnia 21.09.2021 o godz. 22:25:26 Darrell Budic via mailop pisze:
> 
> If you follow NANOG and some other groups, you’re probably aware of the
> spate of VPN blocking recently from various Video providers like Netflix
> and Amazon Prime.  This seems to be (as an email provider and (separately,
> day job) a ISP) to be related to simple heuristic, if several people log
> in from one ip, it might be a VPN.

It might be also an ISP using carrier-grade NAT. Or a big corporation's
internal network (even spanning multiple countries) connecting to Internet
through corporate gateway...
-- 
Regards,
   Jaroslaw Rafa
   r...@rafa.eu.org
--
"In a million years, when kids go to school, they're gonna know: once there
was a Hushpuppy, and she lived with her daddy in the Bathtub."
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop