Mark Sapiro writes:
 > On 6/1/20 3:15 PM, Lucio Crusca wrote:

 > > Ok, let's assume it is a deliverable address. Running the following
 > > one-liner yields nothing:

My guess is that the real mailbox was replaced with a hash of that
mailbox.  SHA-2-512 or SHA-3-512 would fit with the 32-hex-digit
mailbox in the report.  That allows the recipient's host to redact the
mailbox from the report to you but still easily identify it.

Either way, this looks like a valid subscription reminder.  Do you
have reminders enabled?

If so, this looks like a user who decided to report the reminder as
spam rather than take a reasonable action (turn off reminders or
unsubscribe).

 > > I agree [that it was sent to the real address], but how?

The recipient domain has clearly altered the header, because it
reports a delivery to that address but you have no record of it.  (It
could be the recipient, but there are very few recipients with the
skills to do this, or would bother given that they're reporting on
their own behalf to their email provider!)

Mark Sapiro writes:

 > If I were you I would either just remove the recipients real
 > address from the list or maybe contact the recipient to see what
 > the message looked like at that end.

I don't think there's much point in contacting the recipient.

 > In any case, I can't see how there could be any issue with Mailman
 > here.

Agreed.

Regarding your other question, 

 > > Is there a security flaw in my mailman setup?

Maybe, but it looks to me like you just have a user who got annoyed at
the password reminder for a list they are subscribed to, and decided
to cause you trouble rather than take care of turning reminders off or
unsubscribing themself.  (This used to be *really* common with America
Online because their Report Spam button was big and easy to click, vs
unsubscribing or changing their user profile which users had to do
themselves.  Fortunately those folks don't seem to use Mailman lists
any more.)

Your MTA does have places security can be tightened.  One is to use
DKIM to sign the outgoing messages.  Without a signature, it's
impossible to prove whether the header and/or the message content were
spoofed or altered after leaving your server.

Also, it seems that you have a DMARC record for "my.real.hostname.it",
but it does not cover "my.real.domain.where.i.host.mailman", since
"my.real.hostname.it" passes SPF, but
"my.real.domain.where.i.host.mailman" fails DMARC.  This is a guess
since I don't know your domains, nor exactly how IOL does things, but
the "fail" in these two fields suggests it:

X-IOL-DMARC: fail_monitor con il dominio my.real.domain.where.i.host.mailman
X-IOL-SEC: _SPFOK_NODKIM_DMARCFAIL_ENVFROMHEADDIFF

Presumably lack of DMARC alignment (address in From needs to match the
SPF authenticated domain) contributes to the spam score.
------------------------------------------------------
Mailman-Users mailing list -- mailman-users@python.org
To unsubscribe send an email to mailman-users-le...@python.org
https://mail.python.org/mailman3/lists/mailman-users.python.org/
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: https://www.mail-archive.com/mailman-users@python.org/
    https://mail.python.org/archives/list/mailman-users@python.org/

Reply via email to