Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread hg user via mailop
Sorry, I was not clear.

A lot of phishing that passes the antispam checks comes from *hacked*
accounts from universities and government agencies. So SPF, DKIM, DMARC,
all these pass and give negative score.

Only RBL (ip, url or hash), bayes from past phishing or some handmade rules
can detect them, and their score may not sum up to the spam threshold (I
have to review and rescore these handmade rules).
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread Grant Taylor via mailop

On 3/25/23 3:10 PM, Heiko Schlittermann via mailop wrote:
We used MX sandwiching/NoListing on our own MXs and had issues sending 
messages to remote sites which did sender verification via a poorly 
implemented callback.


So, is it fair to say, that you had problems sending to site that used a 
questionable implementation of a questionable practice?


Please note the question mark above, I don't want to blame *any* 
vendor without proof. Time passed since then, maybe they improved 
their callback implementation.


ACK

1st MX: TCP RST (either by open firewall and no listener on port 25, 
OR done by the firewall directly (iptables … -j REJECT --reject-with 
tcp-rst)

2nd MX: listener on port 25
3rd MX: firewall, dropping incoming TCP SYN


The "sandwich" makes more sense when depicted like that.

I was just thinking in terms of a non-answering (at the SMTP level) MX 
/before/ any and all other MXs.


I assume that there is (are) one (or more) functional MX(s) at a lower 
priority / higher number.


Conversely, it seems like the "MX sandwich" is a specific configuration 
that happens to involve No Listing.



That's what I understand as a sandwich ;)


Fair enough.

The configuration I'm using is a bit different:

1st MX:  No Listing
2nd MX:  standard primary
3rd MX:  standard secondary
4th MX:  anti-spam solution looking for bad actors.

Proper sending sites try the 1st one, and fastly move on to the second. 
Poorly implemented senders either give up after the 1st one, or try 
to be clever and use the 3rd one (as this one is often less prepared 
for spam rejection as the primaries), and hopefully give up.


That's why I have the 4th MX.

Same here. Unfortunately Renate from mailgun didn't respond yet. 
I'd like to hear their intentions with this approach.


I don't know if it's the case or not, but I've heard that it might be in 
the same spirit as to why different IPs in the network send subsequent 
attempts instead of the same host ~> IP as the first time.  Namely 
multiple systems sharing a common spool of queued messages waiting to be 
re-tried.


But even that tends to have the same envelope from in the instances that 
I've spent time looking at.




--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread Heiko Schlittermann via mailop
hg user via mailop  (Sa 25 Mär 2023 18:39:06 CET):
> A. extortion messages like "I recorded you doing bad things, pay me". Tons
> deleted, but some in the inboxes.
> 
> B. phishing, some generic, some specific for our web mail interface. The
> latter, sometimes, carry our logo in the fake page...

A good share of such messages use the reciepint's domain as sender.
Proper protection here can help.

Another share uses generally trusted domains. If you're lucky, these
trusted domains publish DMARC records.

Ok, and the last share uses non-DMARC domains OR From: heaaders like

From: "your-b...@example.com" 

with stupid mailclients only showing the display part of the address.

> Almost 100% of B and most of A comes from hacked mailboxes, from university
> or government agencies, so standard MTAs that won't be blocked by NoListing
> nor greylisting.

Yes. We have the bsi.de (governmental agency for security and data
protection).

$ dig _dmarc.bsi.de txt
; <<>> DiG 9.16.37-Debian <<>> txt _dmarc.bsi.de
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16687
   

They have SPF, but no DKIM (NXDOMAIN for the _domainkey.bsi.de)

Or did I miss something?

Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
 SCHLITTERMANN.de  internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --- key ID: F69376CE -


signature.asc
Description: PGP signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread Heiko Schlittermann via mailop
Grant Taylor via mailop  (Sa 25 Mär 2023 17:07:23 CET):
> Are you indicating that you had problems sending to others who were using
> NoListing / MX sandwiching?  Or are you saying that your equipment had
> problems going through NoListing / MX sandwiching in your outbound
> infrastructure?

We used MX sandwiching/NoListing on our own MXs and had issues sending
messages to remote sites which did sender verification via a poorly
implemented callback.

> > Some appliances (barracuda?) on the remote end implemented sender
…
> Well ... the idea is that a proper / RFC compliant SMTP stack is used ...
> which rules out some vendors.  }:-)
> 
> I've never been a fan of Barracuda for a number of reasons.

Please note the question mark above, I don't want to blame *any* vendor
without proof. Time passed since then, maybe they improved their
callback implementation.

> Would you mind elaborating how you tested NoListing / MX sandwiching? Did
> you 1) timeout connections, 2) send a TCP reset, or 3) send an ICMP error?

1st MX: TCP RST (either by open firewall and no listener on port 25, OR
done by the firewall directly (iptables … -j REJECT
--reject-with tcp-rst)
2nd MX: listener on port 25
3rd MX: firewall, dropping incoming TCP SYN

That's what I understand as a sandwich ;)
Proper sending sites try the 1st one, and fastly move on to the second.
Poorly implemented senders either give up after the 1st one, or try to
be clever and use the 3rd one (as this one is often less prepared for
spam rejection as the primaries), and hopefully give up.

> > With our current greylisting implementation (using MAIL-FROM/RCPT-TO) as
> > key, we didn't have issues so far. Until mailgun started (?) using
> > variable senders for each delivery attempt.
> 
> I never understood different envelope senders for each attempt of a given
> message.  --  I can see different envelope senders per message, a la. VERP.
> But I would naively expect each message to have a fixed envelope sender and
> recipient from submission time until delivery time.

Same here. Unfortunately Renate from mailgun didn't respond yet.
I'd like to hear their intentions with this approach.

Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
 SCHLITTERMANN.de  internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --- key ID: F69376CE -


signature.asc
Description: PGP signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread Slavko via mailop
Dňa 25. marca 2023 17:11:48 UTC používateľ Andrew C Aitchison via mailop 
 napísal:
>
>On Sat, 25 Mar 2023, Grant Taylor via mailop wrote:
>> I never understood different envelope senders for each attempt of a given 
>> message.  --  I can see different envelope senders per message, a la. VERP. 
>> But I would naively expect each message to have a fixed envelope sender and 
>> recipient from submission time until delivery time.
>
>I guess that having something to trace individual attempts
>though the logs is useful if you are working at scale
>and the typical user is more likely to report the sender address than the 
>message id ?

I believe that here are better ways to track individual attempts
in logs (eg. concantenate sender/MID & time, or custom log entry),
than change sender every time. Thus it is either not this case
or really naive way (with  expose that envelope sender is not real).

I can only guess, what they try to do, but two things comes into
my mind:

+ pair bounces with exact delivery attempts
+ fool recipient's MTA filtering, eg. per sender (aka customer/campaign) 
reputation

IMO both are questionable...

regards


-- 
Slavko
https://www.slavino.sk/
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread hg user via mailop
Really interesting thread. But like most other threads it seems to me that
the result is always the same: *it depends*.

In the last months my main pains were:

A. extortion messages like "I recorded you doing bad things, pay me". Tons
deleted, but some in the inboxes.

B. phishing, some generic, some specific for our web mail interface. The
latter, sometimes, carry our logo in the fake page...

Almost 100% of B and most of A comes from hacked mailboxes, from university
or government agencies, so standard MTAs that won't be blocked by NoListing
nor greylisting.

Probably I can propose a 1 minute greylisting so that some RBLs can catch
up, but I think it is still not enough.


What is your experience?
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread Andrew C Aitchison via mailop


On Sat, 25 Mar 2023, Grant Taylor via mailop wrote:
I never understood different envelope senders for each attempt of a given 
message.  --  I can see different envelope senders per message, a la. VERP. 
But I would naively expect each message to have a fixed envelope sender and 
recipient from submission time until delivery time.


I guess that having something to trace individual attempts
though the logs is useful if you are working at scale
and the typical user is more likely to report the sender address 
than the message id ?


--
Andrew C. Aitchison  Kendal, UK
   and...@aitchison.me.uk
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread Grant Taylor via mailop

On 3/25/23 2:25 AM, Heiko Schlittermann via mailop wrote:

Ah, ok, that's what I know as MX sandwiching.


Interesting.  I'll have to research that phrasing to see if I can learn 
more about it.


Ok, that was your point. Sure. We tried this (NoListing, MX 
sandwiching) for a while and had problems when *sending* messages.


Are you indicating that you had problems sending to others who were 
using NoListing / MX sandwiching?  Or are you saying that your equipment 
had problems going through NoListing / MX sandwiching in your outbound 
infrastructure?


Some appliances (barracuda?) on the remote end implemented sender 
verification as callback, but where stupid enough to contact the 1st 
MX only (the one which did the TCP RST). As a result, they didn't 
accept our mails.


Well ... the idea is that a proper / RFC compliant SMTP stack is used 
... which rules out some vendors.  }:-)


I've never been a fan of Barracuda for a number of reasons.

Would you mind elaborating how you tested NoListing / MX sandwiching? 
Did you 1) timeout connections, 2) send a TCP reset, or 3) send an ICMP 
error?


I've got an IP bound w/o a daemon listening, so the TCP/IP stack 
responds as if the SMTP service isn't currently running.  --  I prefer 
that over a timeout as I think it's a fail hard ~> fail fast ~> move on 
to recover type sequence of events.


It's good to hear about others that have tried No Listing / MX sandwich 
and their experience therewith.


With our current greylisting implementation (using MAIL-FROM/RCPT-TO) 
as key, we didn't have issues so far. Until mailgun started (?) using 
variable senders for each delivery attempt.


I never understood different envelope senders for each attempt of a 
given message.  --  I can see different envelope senders per message, a 
la. VERP.  But I would naively expect each message to have a fixed 
envelope sender and recipient from submission time until delivery time.




--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [EXT] - Re: [EXT] - Dear sympatico.ca

2023-03-25 Thread Salvatore Jr Walter P via mailop
What? I never said they were, I said do what we did with our issue. Please 
reread my response again.




From: f...@dnsbed.com 
Sent: Saturday, March 25, 2023 6:02 AM
To: Salvatore Jr Walter P
Cc: mailop@mailop.org
Subject: [EXT] - Re: [mailop] [EXT] - Dear sympatico.ca

On 2023-03-25 13:54, Salvatore Jr Walter P via mailop wrote:
> You could always do what we do with AT&T. We have been blocked for
> months with no response and no reason given from AT&T. We are a
> government agency, so we simply told our vendors and other entity's we
> deal with that if they use AT&T or any ISP associated with them we will
> not be able to communicate with them or use their services. After no
> response from AT&T, we took the response it is no longer our issue and
> let their customers complain that their incoming email is being blocked
> and effecting their bottom line.


from what I know Bell Canada is not the same as ATT global.
they use different systems.
if I am wrong please adjust me.

Thanks
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [EXT] - Dear sympatico.ca

2023-03-25 Thread fh--- via mailop

On 2023-03-25 13:54, Salvatore Jr Walter P via mailop wrote:
You could always do what we do with AT&T. We have been blocked for 
months with no response and no reason given from AT&T. We are a 
government agency, so we simply told our vendors and other entity's we 
deal with that if they use AT&T or any ISP associated with them we will 
not be able to communicate with them or use their services. After no 
response from AT&T, we took the response it is no longer our issue and 
let their customers complain that their incoming email is being blocked 
and effecting their bottom line.



from what I know Bell Canada is not the same as ATT global.
they use different systems.
if I am wrong please adjust me.

Thanks
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread Heiko Schlittermann via mailop
Bill Cole via mailop  (Sa 25 Mär 2023 03:55:26 CET):
> > What does this change? From senders PoV it is a temporary error. The
> > sender will retry.
> 
> The point of greylisting and "NoListing" is to eliminate the spammers who do
> not retry. They are harmless (aside from delay) for mail being haqndlked by
> a proper MTA that implements a MX fallback and retry strategy.

Sure. The delay can be eliminated at least for sending sites that are
known to retry. (That's what our greylisting implementation does.)

Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
 SCHLITTERMANN.de  internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --- key ID: F69376CE -


signature.asc
Description: PGP signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] mailgun anybody? (variable sender address) time

2023-03-25 Thread Heiko Schlittermann via mailop
Grant Taylor via mailop  (Sa 25 Mär 2023 00:33:32 CET):
> On 3/24/23 4:01 PM, Heiko Schlittermann via mailop wrote:
> 
> NoListing works by causing the sending server to cascade through multiple
> MXs.

> First MX either doesn't respond /or/ sends a TCP reset.  Thereby causing the
> sending MTA to try the next MX.
> 
> The next MX responds like normal.

Ah, ok, that's what I know as MX sandwiching.

> The cascading from one MX to the other MX achieves a very similar result as
> grey listing.  But it does so in a way that is indifferent to the actual
> addresses used.

Ok, that was your point. Sure. We tried this (NoListing, MX sandwiching)
for a while and had problems when *sending* messages.

Some appliances (barracuda?) on the remote end implemented sender
verification as callback, but where stupid enough to contact the 1st MX
only (the one which did the TCP RST). As a result, they didn't accept
our mails.

> With no state to maintain it doesn't matter what the envelope from is,
> variable or static.

With our current greylisting implementation (using MAIL-FROM/RCPT-TO) as
key, we didn't have issues so far. Until mailgun started (?) using
variable senders for each delivery attempt.

Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
 SCHLITTERMANN.de  internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --- key ID: F69376CE -


signature.asc
Description: PGP signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop