Check the logs on all your servers for evidence of this activity.  If you
can't find it then tell them so and then tell them to buzz off.

Barry Bahrami
Commercial Network Services
www.CommercialNetworkServices.com 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Chase Seibert
Sent: Thursday, April 21, 2005 8:11 AM
To: [email protected]
Subject: [IMail Forum] ISP accusing me of relaying





Hey,
 
I have gotten a couple false reports of spam originating from my system over
the last few months. These reports are comming from my ISP. I contend that
what they have sent me is not proof, because email headers can be forged. I
also present a logical argument for why this mail could not have originated
from out system, as well as speculation as to what might have happened. Does
this make sense to anyone else? My ISP is acting like they don't beleive me,
and saying they will cite this as evidence if they ever want to terminate my
access.
 

Here is the header then sent me:
Received: from vsmtp15.tin.it (192.168.70.119) by ims5b.cp.tin.it (7.0.027)
        id 4200083A00DEF78F for [EMAIL PROTECTED]; Thu, 21 Apr
2005 10:18:41 +0200
Received: from cpe-68-203-199-222.satx.res.rr.com (68.203.199.222) by
vsmtp15.tin.it (7.0.027)
        id 4227B8750499C924 for [EMAIL PROTECTED]; Thu, 21 Apr
2005 10:18:41 +0200
Received: from grouppowellone.com (mail1.bullhorn.com [209.202.131.100])  by
cpe-68-203-199-222.satx.res.rr.com with esmtp  id 9B89474B31 for
<[EMAIL PROTECTED]>; Thu, 21 Apr 2005 01:18:56 -0700
 
Here is my argument. We don't send mail from 209.202.131.100. That's our
incomming mail server. We have a seperate cluster for outgoing mail, that
communicates on a seperate IP to the external world (209.202.131.98). In
fact, our firewall does not ALLOW outgoing port 25 traffic from any IP
except 209.202.131.98. 
 
Here is what I think happened:
1. Some RoadRunner (rr.com) home PC has been trojaned by a virus. 2. Virus
either looks in the local Outlook address book or does a search online and
finds a random contact/DNS record with the domain grouppowellone.com. We
happen to host this domain. 4. Virus does an MX lookup on the domain it
wishes to forge mail from, and gets mail1.bullhorn.com, 209.202.131.100 as
the primary MX record. 5. Virus sends a spam message through the local
RoadRunner open SMTP relay server, but forges both the sender (which is a
common tactic) AND the first hop of the header (which I am seeing more and
more). This has the effect of making it look like the message came from a
legit email server.
 
The whole in their plan, with respect to us, is that email does not
originate from that IP address in our system. We route all outgoing mail
through another IP. 
 
Just to be sure, I tested out servers. They are not an open relay:
>telnet mail1.bullhorn.com 25
220 INBOUND4.BULLHORN.COM (IMail 8.05 139897-7) NT-ESMTP Server X1e
>ehlo
250-INBOUND4.BULLHORN.COM says hello
250-SIZE 0
250-8BITMIME
250-DSN
250-ETRN
250-AUTH LOGIN CRAM-MD5
250-AUTH=LOGIN
250 EXPN
>mail from: [email protected]
250 ok
>rcpt to: [EMAIL PROTECTED]
550 not local host virgilio.it, not a gateway
 
Am I in the right here? This is fairly low volume, we get about 1 report a
month. Also, we are on no blacklists except SPEWS, which we have been on for
more than a year due to some casino website sharing our IP block.



     -Chase

Chase Seibert |  Network and Systems Engineer |  Bullhorn Inc.  |
617.464.2440 x119  |  www.bullhorn.com


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to