Re: [mailop] Hen and egg problem with Talos

2021-07-07 Thread Thomas Walter via mailop


On 07.07.21 23:12, Jay Hennigan via mailop wrote:
>> Encourage transparent 2FA, and options like country auth restrictions,
>> blocking AUTH from cloud providers/hosting companies known for being a
>> haven for those types of attacks, (should make a blog post on best
>> practices for authentication on email servers one day) but..
> 
> [snip]
> 
> Fail2ban can be very useful here.

It's running to protect against brute force attacks, but it doesn't help
against phished passwords.

We also check against the number of different client addresses, since
they often use multiple bot hosts - spread all over the world - after
the data was phished. But this time it was just one host.

Regards
Thomas Walter

-- 
Thomas Walter
Datenverarbeitungszentrale

FH Münster
University of Applied Sciences
Corrensstr. 25, Raum B 112
48149 Münster

Tel: +49 251 83-64908
Fax: +49 251 83-64910

E-Mail: b...@fh-muenster.de
https://www.fh-muenster.de/dvz/



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Hen and egg problem with Talos

2021-07-07 Thread Jay Hennigan via mailop

On 7/7/21 13:08, Michael Peddemors via mailop wrote:

[snip]

You should consider adding some AUTH protections of course, to mitigate 
compromised accounts, and better detection/rate limiters for when they do.


Encourage transparent 2FA, and options like country auth restrictions, 
blocking AUTH from cloud providers/hosting companies known for being a 
haven for those types of attacks, (should make a blog post on best 
practices for authentication on email servers one day) but..


[snip]

Fail2ban can be very useful here.

--
Jay Hennigan - j...@west.net
Network Engineering - CCIE #7880
503 897-8550 - WB6RDV
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Hen and egg problem with Talos

2021-07-07 Thread Thomas Walter via mailop
On 07.07.21 22:08, Michael Peddemors via mailop wrote:
> Start by including the IP(s) you are discussing ;)

mx-out-01.fh-muenster.de [185.149.214.63]
mx-out-02.fh-muenster.de [212.201.120.206]

> Compromised accounts are indeed the bane of the responsible
> administrator, and as you can see.. the rate limiting systems ARE
> essential, you are unlikely to suffer a reputation issue, if only a few
> escape (unless they have REALLY bad content, your mail server should not
> be processing).

Absolutely. That's why we had rate limits in place for different
markers: mailcounts each by sender address, authenticated user and
client in different time frames. So far this had worked fine.

So that other can learn from our mistake: Someone whitelisted the
internal Exchange systems from the clients, because they kept triggering
the limits, believing they'd get caught by the other markers which they
did not.

> Encourage transparent 2FA, and options like country auth restrictions,
> blocking AUTH from cloud providers/hosting companies known for being a
> haven for those types of attacks, (should make a blog post on best
> practices for authentication on email servers one day) but..

Please do :) - I have actually thought about limiting AUTH to local
networks, because we have VPN available for all clients - which would
add another level. But that requires some effort from the "customers"
and of course was not well received. It could also be circumvented after
a user's credentials were phished.

> As you correctly noted, yes.. cleaning up your reputation and getting
> off blacklists IS the punishment for not being pro-active on issues like
> that. It isn't the blacklist operators fault after all ;)

I fully agree. And I've added another self-flagellation by posting here ;)

> Most blacklists and reputation services are pretty understanding, if you
> clearly communicate, and your email server is for the most part
> professionally operated. And remember, be kind to them, they aren't your
> enemy, and they probably get more than their fair of yelling and
> screaming..

I'd never do anything like that. Especially since it's our fault and I
have been doing this long enough to appreciate their work - after all
they are my own line of defense too.

> Now, having said that.. it is ALWAYS best to follow the posted
> procedures for asking for removal, but if it does NOT fix things in say
> 48 hours (hard to wait when you have screaming customers I know) then
> their are good people on this list and others that can help you, as long
> as you show that you already following their SOP for removal.

I was able to switch over to other outgoing servers for now, so the
customers have extinguished their torches (most of them didn't even notice).

I am just confused on how to fix the reputation of those two boxes by
sending emails without being able to send emails.

Regards
Thomas Walter

-- 
Thomas Walter
Datenverarbeitungszentrale

FH Münster
University of Applied Sciences
Corrensstr. 25, Raum B 112
48149 Münster

Tel: +49 251 83-64908
Fax: +49 251 83-64910

E-Mail: b...@fh-muenster.de
https://www.fh-muenster.de/dvz/



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Hen and egg problem with Talos

2021-07-07 Thread Michael Peddemors via mailop

Start by including the IP(s) you are discussing ;)

Compromised accounts are indeed the bane of the responsible 
administrator, and as you can see.. the rate limiting systems ARE 
essential, you are unlikely to suffer a reputation issue, if only a few 
escape (unless they have REALLY bad content, your mail server should not 
be processing).


You should consider adding some AUTH protections of course, to mitigate 
compromised accounts, and better detection/rate limiters for when they do.


Encourage transparent 2FA, and options like country auth restrictions, 
blocking AUTH from cloud providers/hosting companies known for being a 
haven for those types of attacks, (should make a blog post on best 
practices for authentication on email servers one day) but..


As you correctly noted, yes.. cleaning up your reputation and getting 
off blacklists IS the punishment for not being pro-active on issues like 
that. It isn't the blacklist operators fault after all ;)


Most blacklists and reputation services are pretty understanding, if you 
clearly communicate, and your email server is for the most part 
professionally operated. And remember, be kind to them, they aren't your 
enemy, and they probably get more than their fair of yelling and 
screaming..


Now, having said that.. it is ALWAYS best to follow the posted 
procedures for asking for removal, but if it does NOT fix things in say 
48 hours (hard to wait when you have screaming customers I know) then 
their are good people on this list and others that can help you, as long 
as you show that you already following their SOP for removal.


(Nice to have the cast off, can type a real email again)




On 2021-07-07 12:18 p.m., Thomas Walter via mailop wrote:

Hey guys,

I have to take the walk of shame and report a spam outbreak on my
systems because of a phished user account and a loophole in the rate
limiting we do.

As soon as we got notifed, we stopped and cleaned the queues, blocked
the user, investigated the cause and fixed the rate limiting before
restarting.

Of course this put us on multiple blacklists and cleaning those up is
the proper punishment I guess.


Now two of our outgoing systems are still rated as poor on Talos.

If we use them to send emails, those will get rejected by a lot of
recipients (public sector).

But if we don't use them to send emails, their reputation at Talos will
not improve since support tells us "reputation improves as the ratio of
legitimate mails increases with respect to the number of complaints".


Do you guys have any hints on what is the proper way out of this circle?

Regards
Thomas Walter





--
"Catch the Magic of Linux..."

Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
A Wizard IT Company - For More Info http://www.wizard.ca
"LinuxMagic" a Registered TradeMark of Wizard Tower TechnoServices Ltd.

604-682-0300 Beautiful British Columbia, Canada

This email and any electronic data contained are confidential and intended
solely for the use of the individual or entity to which they are addressed.
Please note that any views or opinions presented in this email are solely
those of the author and are not intended to represent those of the company.
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop