https://bugs.exim.org/show_bug.cgi?id=2188

            Bug ID: 2188
           Summary: Moving recipient check last to mitigate brute-force
                    address scan
           Product: Exim
           Version: N/A
          Hardware: x86
                OS: Linux
            Status: NEW
          Severity: security
          Priority: medium
         Component: ACLs
          Assignee: [email protected]
          Reporter: [email protected]
                CC: [email protected]

Created attachment 1047
  --> https://bugs.exim.org/attachment.cgi?id=1047&action=edit
patch to move recipient check down

This recently came up in Exim logs:

2017-11-05 09:24:14 H=(attacker) [10.20.30.40] F=<[email protected]>
rejected RCPT <[email protected]>: Unrouteable address
2017-11-05 09:24:14 H=(attacker) [10.20.30.40] F=<[email protected]>
rejected RCPT <[email protected]>: Unrouteable address
2017-11-05 09:24:14 H=(attacker) [10.20.30.40] F=<[email protected]>
rejected RCPT <[email protected]>: Unrouteable address
....
2017-11-05 09:24:14 H=(attacker) [10.20.30.40] F=<[email protected]>
rejected RCPT <[email protected]>: SPF check failed.

An attacker successfully found a valid local address using brute-force scan.

This was only possible because recipient verification happens early (in this
case before SPF check).

In order to mitigate this kind of attack, we moved recipient verification down
so that it happens after all other checks that could potentially cause a deny.

I think the Exim default config could be improved likewise, by moving sender
verification down after DNSBL checks.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-dev Exim 
details at http://www.exim.org/ ##

Reply via email to