[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-10-18 Thread Viktor Dukhovni via Postfix-users
On Wed, Oct 18, 2023 at 10:17:52PM +0200, Markus Ueberall wrote:

> On 18.10.23, 22:11 Markus Ueberall wrote via Postfix-users:
> > I just tried an explicit "_25._tcp" CNAME as suggested above (using the
> > shared RRset) /alongside/ the existing "*._tcp" CNAME which I did not
> > want to remove/replace for one domain ("D1") while keeping my
> > aforementioned setup for a second domain ("D2"). Then I waited for a
> > couple of hours to be sure that all outdated cache entries are gone (TTL
> > for all entries is 3600 seconds), and sent another test e-mail each to
> > both domains (one immediately after the other). Lo and behold: The one
> > addressed to D2 got delivered, the one addressed to D1 still causes the
> > logs to be filled with the same dreaded STARTTLS,QUIT pattern at the
> > time of writing.
> > 
> > This means that it's either not only the required lookup of a wildcard
> > CNAME that causes problems or the simple fact that there is a wildcard
> > CNAME although it should be ignored in this case.
> 
> Sorry, scratch the second part of the last sentence after "or the simple
> fact"; "D2" also still has said wildcard CNAME.

So what's the bottom line.  Are Microsoft's outbound MTAs, in fact,
having problems delivering mail to domains with additional non-matching
TLSA records?  Or is the problem some other aspect of your
configuration?

Possible factors:

- Use of TLSA CNAMEs (wildcard or otherwise)?
- Size of TLSA RRsets?
- Mixture of "3 1 1" and "3 1 2" records?
- Deploying both ECDSA and RSA?
- Publishing both "2 1 X" and "3 1 X" records?

Have you opened a ticket with Microsoft?  Though it would take some
effort on your part, it would be rather beneficial to the broader
ecosystem, and to your ability to later make configuration changes
with confidence, to find the root cause of the issues you're reporting.

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-10-18 Thread Markus Ueberall via Postfix-users

On 18.10.23, 22:11 Markus Ueberall wrote via Postfix-users:
I just tried an explicit "_25._tcp" CNAME as suggested above (using 
the shared RRset) /alongside/ the existing "*._tcp" CNAME which I did 
not want to remove/replace for one domain ("D1") while keeping my 
aforementioned setup for a second domain ("D2"). Then I waited for a 
couple of hours to be sure that all outdated cache entries are gone 
(TTL for all entries is 3600 seconds), and sent another test e-mail 
each to both domains (one immediately after the other). Lo and behold: 
The one addressed to D2 got delivered, the one addressed to D1 still 
causes the logs to be filled with the same dreaded STARTTLS,QUIT 
pattern at the time of writing.


This means that it's either not only the required lookup of a wildcard 
CNAME that causes problems or the simple fact that there is a wildcard 
CNAME although it should be ignored in this case.


Sorry, scratch the second part of the last sentence after "or the simple 
fact"; "D2" also still has said wildcard CNAME.


KR, Markus
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-10-18 Thread Markus Ueberall via Postfix-users

On 17.10.23, 18:42 Viktor Dukhovni wrote via Postfix-users:

On Tue, Oct 17, 2023 at 05:47:11PM +0200, Markus Ueberall via Postfix-users 
wrote:


For the record: I stumbled across this a couple of days ago when I received
a message on LinkedIn telling me that a number of e-mails sent via
Microsoft's outbound systems had bounced. Given that occasional tests using
MECSA (https://mecsa.jrc.ec.europa.eu/) and DNSSEC and DANE Validation (part
of the Microsoft Remote Connectivity Analyzer,
https://testconnectivity.microsoft.com/tests/O365DaneValidation/input)
looked /good/ (all TLSA entries for ECDSA/RSA certificates used by a certain
domain and its subdomains were always listed under subname "_tcp", with a
couple of CNAME entries "*._tcp", "[*.]_tcp.subdomain", ... pointing to said
subname), it took a while to realize that the above "STARTTLS,QUIT"
behaviour is due to the fact that said outbound systems do not like to come
across non-matching TLSA entries (for other certificates used by the
webserver) anymore.

Are you *SURE* about that?  That would be a substantial departure from
the DANE specifications.  Extraneous *non-matching* DANE TLSA records
MUST be simply ignored.  Any single *matching* TLSA records is
sufficient.


The simple solution was to introduce a new specific subname "_25._tcp"
(which takes precedence over the generic "*._tcp" CNAME) and duplicate/move
the TLSA entries directly related to the certificate used by postfix for the
(sub)domain(s) in question there. In hindsight, this means: Whenever the
MRCA test results (see above) show something marked in red, you should check
whether it's possible to modify your configuration.

If the new TLSA RRset at _25._tcp. prefix is a proper subset of the
original (wildcard or explicit CNAME) shared RRset, and delivery works
for the subset and not the whole set, then there's a genuine problem with
the sender's implementation.

Have you tried using an explicit CNAME instead of a wildcard CNAME, and
still using the shared RRset:

 _25._tcp.smtp.acme.example. IN CNAME _tcp.acme.example.
 _tcp.acme.example. IN TLSA 3 1 1 ...
 _tcp.acme.example. IN TLSA 3 1 1 ...
 ...


I just tried an explicit "_25._tcp" CNAME as suggested above (using the 
shared RRset) /alongside/ the existing "*._tcp" CNAME which I did not 
want to remove/replace for one domain ("D1") while keeping my 
aforementioned setup for a second domain ("D2"). Then I waited for a 
couple of hours to be sure that all outdated cache entries are gone (TTL 
for all entries is 3600 seconds), and sent another test e-mail each to 
both domains (one immediately after the other). Lo and behold: The one 
addressed to D2 got delivered, the one addressed to D1 still causes the 
logs to be filled with the same dreaded STARTTLS,QUIT pattern at the 
time of writing.


This means that it's either not only the required lookup of a wildcard 
CNAME that causes problems or the simple fact that there is a wildcard 
CNAME although it should be ignored in this case. Now, I could go on and 
introduce a second certificate listed below "_25._tcp" (in order to have 
a valid RSA, ECDSA combo) and/or remove all wildcard CNAME entries, but 
I already spent a couple of hours with the above and the current setup 
for D2 (which I will restore for D1) suits my/our current needs (see 
below). Either way, as you mentioned above, the behaviour (1) does *not* 
seem to be in line with the DANE specifications and (2) also differs 
from what is shown in the Microsoft Remote Connectivity Analyzer test 
results.


By the way, thanks a lot for the thorough analysis of the 
projektzentrisch.de (test) domain, but although I use that one *here*, 
it's not one of the two "Dn" in question (although it has the same basic 
setup as described in my previous posting above and utilizes the same 
DNS hosting service, the two company domains I actually used for the 
comparison/tests above have *way less* DNS entries, certificates).


KR, Markus

___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-10-17 Thread Viktor Dukhovni via Postfix-users
On Tue, Oct 17, 2023 at 12:42:39PM -0400, Viktor Dukhovni via Postfix-users 
wrote:

> > [...] it took a while to realize that the above "STARTTLS,QUIT"
> > behaviour is due to the fact that said outbound systems do not like to come
> > across non-matching TLSA entries (for other certificates used by the
> > webserver) anymore.
> 
> Are you *SURE* about that?  That would be a substantial departure from
> the DANE specifications.  Extraneous *non-matching* DANE TLSA records
> MUST be simply ignored.  Any single *matching* TLSA records is
> sufficient.

It is also worth noting that "non-matching" TLSA records are
fundamentally unavoidable for SMTP servers with both RSA and ECDSA
certificates that publish DANE-EE(3) records.  This includes
"postfix.org":

https://stats.dnssec-tools.org/explore/?postfix.org

https://testconnectivity.microsoft.com/result/72f862c1-fdab-46ab-4ba8-f32807a7c303

Any one TLS handshake will negotiate either RSA or ECDSA signature
algorithms, and will find only the corresponding TLSA records matching.
The TLSA record for non-selected algorithm's key will not match.

This can also apply when using "2 1 1" records for the intermediate CA,
if different intermediate issuers are used for RSA vs. ECDSA, as is the
case with Let's Encrypt (R3/R4 vs. E1/E2).

So I am very sceptical that Microsoft have issues delivering mail based
on mere presence of some non-matching TLSA records.  The bounces the OP
alluded to (with no specifics as to what reason was reported in the
bounce beyond "a message on LinkedIn telling me that a number of e-mails
sent via Microsoft's outbound systems had bounced") could even be
entirely unrelated to DANE (red herring).

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-10-17 Thread Viktor Dukhovni via Postfix-users
On Tue, Oct 17, 2023 at 05:47:11PM +0200, Markus Ueberall via Postfix-users 
wrote:

> On 17.08.23, 01:48 Viktor Dukhovni wrote via Postfix-users:
> > So far, the pattern of Microsoft's outbound systems disconnecting
> > immediately after a completed TLS handshake strongly correlates with a
> > broken TLSA setup.
> 
> For the record: I stumbled across this a couple of days ago when I received
> a message on LinkedIn telling me that a number of e-mails sent via
> Microsoft's outbound systems had bounced. Given that occasional tests using
> MECSA (https://mecsa.jrc.ec.europa.eu/) and DNSSEC and DANE Validation (part
> of the Microsoft Remote Connectivity Analyzer,
> https://testconnectivity.microsoft.com/tests/O365DaneValidation/input)
> looked /good/ (all TLSA entries for ECDSA/RSA certificates used by a certain
> domain and its subdomains were always listed under subname "_tcp", with a
> couple of CNAME entries "*._tcp", "[*.]_tcp.subdomain", ... pointing to said
> subname), it took a while to realize that the above "STARTTLS,QUIT"
> behaviour is due to the fact that said outbound systems do not like to come
> across non-matching TLSA entries (for other certificates used by the
> webserver) anymore.

Are you *SURE* about that?  That would be a substantial departure from
the DANE specifications.  Extraneous *non-matching* DANE TLSA records
MUST be simply ignored.  Any single *matching* TLSA records is
sufficient.

> The simple solution was to introduce a new specific subname "_25._tcp"
> (which takes precedence over the generic "*._tcp" CNAME) and duplicate/move
> the TLSA entries directly related to the certificate used by postfix for the
> (sub)domain(s) in question there. In hindsight, this means: Whenever the
> MRCA test results (see above) show something marked in red, you should check
> whether it's possible to modify your configuration.

If the new TLSA RRset at _25._tcp. prefix is a proper subset of the
original (wildcard or explicit CNAME) shared RRset, and delivery works
for the subset and not the whole set, then there's a genuine problem with
the sender's implementation.

Have you tried using an explicit CNAME instead of a wildcard CNAME, and
still using the shared RRset:

_25._tcp.smtp.acme.example. IN CNAME _tcp.acme.example.
_tcp.acme.example. IN TLSA 3 1 1 ...
_tcp.acme.example. IN TLSA 3 1 1 ...
...

Perhaps they just have issues with wildcard-synthesised CNAMEs?

$ dig +dnssec +nocmd +nocl +nottl +nocrypto -t tlsa 
_25._tcp.node1.projektzentrisch.de.
;; Truncated, retrying in TCP mode.
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19327
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 23, AUTHORITY: 2, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1400
;; QUESTION SECTION:
;_25._tcp.node1.projektzentrisch.de. IN TLSA

;; ANSWER SECTION:
_25._tcp.node1.projektzentrisch.de. CNAME _tcp.projektzentrisch.de.
_25._tcp.node1.projektzentrisch.de. RRSIG CNAME 13 4 3600 2023102600 
2023100500 25749 projektzentrisch.de. [omitted]
_tcp.projektzentrisch.de. TLSA  2 1 1 
276FE8A8C4EC7611565BF9FCE6DCACE9BE320C1B5BEA27596B220407 1ED04F10
_tcp.projektzentrisch.de. TLSA  2 1 1 
60B87575447DCBA2A36B7D11AC09FB24A9DB406FEE12D2CC90180517 616E8A18
_tcp.projektzentrisch.de. TLSA  2 1 1 
8D02536C887482BC34FF54E41D2BA659BF85B341A0A20AFADB5813DC FBCF286D
_tcp.projektzentrisch.de. TLSA  2 1 2 
0F644C9A1DCB8C04BE6B385A60DBE4FDF7E2B81E335C9AD8C7CD0ABE 
2FF9E7E5BBFBB68B38DD0216F17808F48BDF6AF8C6347659C1F41A98 58032C31F436D12C
_tcp.projektzentrisch.de. TLSA  2 1 2 
3561540FBF182BCE7749ACC131B421E691F083569C053E78F2027471 
4C5E801226FF6EDB60641DDF70E71BD3A90DFE25DDD6464BE78106B7 7DECE4F6A3BFF13D
_tcp.projektzentrisch.de. TLSA  2 1 2 
774FAD8C9A6AFC2BDB44FABA8390D213AE592FB0D56C5DFAB152284E 
334D7CD6ABD05799236E7AA6266EDF81907C60404C57EE54C10A3A82 FCC2A9146629B140
_tcp.projektzentrisch.de. TLSA  3 1 1 
1658A1AB90437DEA0BC2F855611DAD7A4AD11FE1BA3F2DFDF69E992B 8FF9513D
_tcp.projektzentrisch.de. TLSA  3 1 1 
34E64B8E329F0F5C94A1EC6B11EF65CF87902A99E4B29A4D4E117631 75083D26
_tcp.projektzentrisch.de. TLSA  3 1 1 
C887C34E3FB37DBEBB62E6840E2403473D4E81B8F97DDAD3791CC12F DE0DD4E5
_tcp.projektzentrisch.de. TLSA  3 1 1 
CB0109E6FD1E9AA463240E6325A96EA8CCAEB80602E65FE52D6B996C 7F1DC147
_tcp.projektzentrisch.de. TLSA  3 1 2 
2D441EFBDCF23127AFE6CA71EA246C01FA9BC1DA02DF1BB487711511 
305D96386B027CC353EB414757B6C5D072C7803CB9879B1C8ECCEEBA 472D43F7E4B68B64
_tcp.projektzentrisch.de. TLSA  3 1 2 
3B3779319C8A8A1454A81176836487B849B9B91141B1EEE6B80AC17C 
E8F7679311E1F45BF1D1F71E0A5EEFA533CF8D9B35006CF6E85AF1EB 0AC2603C9B4BE3A8
_tcp.projektzentrisch.de. TLSA  3 1 2 
56A671F5ED718EADF4FD6376E800E5FC6F82ECBE13AD8D6283742DF6 
1F99A129125DE8BC2106182D50672CF69FEF42AA97AA8D0C21506AD4 481D7A21B450EE9F
_tcp.projektzentrisch.de. TLSA  3 1 2 
5A459743D85930AB16B8F6006257A0530981F97D42

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-10-17 Thread Markus Ueberall via Postfix-users

On 17.08.23, 01:48 Viktor Dukhovni wrote via Postfix-users:

So far, the pattern of Microsoft's outbound systems disconnecting
immediately after a completed TLS handshake strongly correlates with a
broken TLSA setup.


For the record: I stumbled across this a couple of days ago when I 
received a message on LinkedIn telling me that a number of e-mails sent 
via Microsoft's outbound systems had bounced. Given that occasional 
tests using MECSA (https://mecsa.jrc.ec.europa.eu/) and DNSSEC and DANE 
Validation (part of the Microsoft Remote Connectivity Analyzer, 
https://testconnectivity.microsoft.com/tests/O365DaneValidation/input) 
looked /good/ (all TLSA entries for ECDSA/RSA certificates used by a 
certain domain and its subdomains were always listed under subname 
"_tcp", with a couple of CNAME entries "*._tcp", "[*.]_tcp.subdomain", 
... pointing to said subname), it took a while to realize that the above 
"STARTTLS,QUIT" behaviour is due to the fact that said outbound systems 
do not like to come across non-matching TLSA entries (for other 
certificates used by the webserver) anymore.


The simple solution was to introduce a new specific subname "_25._tcp" 
(which takes precedence over the generic "*._tcp" CNAME) and 
duplicate/move the TLSA entries directly related to the certificate used 
by postfix for the (sub)domain(s) in question there. In hindsight, this 
means: Whenever the MRCA test results (see above) show something marked 
in red, you should check whether it's possible to modify your configuration.


KR, Markus

___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Viktor Dukhovni via Postfix-users
On Wed, Aug 16, 2023 at 06:22:28PM -0400, pgnd via Postfix-users wrote:

> not exactly the same issue to my read, but there may be more to it?

As suspected, the OP has an incomplete DANE TLSA RRset that fails to
match the system's RSA certificate (the additional ECDSA certifcate does
match, but Microsoft's outbound servers negotiate RSA).

See:

https://mail.sys4.de/pipermail/dane-users/2017-August/000417.html
https://mail.sys4.de/pipermail/dane-users/2017-August/000416.html

So far, the pattern of Microsoft's outbound systems disconnecting
immediately after a completed TLS handshake strongly correlates with a
broken TLSA setup.

In this case, one that would not be found by the DANE survey, because
the code currently prefers ECDSA, but I should perhaps implement a
random client-side preference to have a better chance of detecting this
issue (or just prefer RSA over ECDSA on odd day numbers since the
epoch).  That would still fail to find problem systems that ignore the
client preference order and only expose the second algorithm's
certificate when it is the only one supported by the client.

Problem found via:

danesmtp ()
{
local host=$1;
shift;
local opts=(-starttls smtp -connect "$host:25" -verify 9 
-verify_return_error -dane_ee_no_namechecks -dane_tlsa_domain "$host");
set -- $(dig +short +nosplit -t tlsa "_25._tcp.$host" | egrep -i '^[23] 
[01] [012] [0-9a-f]+$');
while [ $# -ge 4 ]; do
opts=("${opts[@]}" "-dane_tlsa_rrdata" "$1 $2 $3 $4");
shift 4;
done;
( sleep 1;
printf "QUIT\r\n" ) | openssl s_client -tls1_2 -cipher 'aRSA:aECDSA' 
"${opts[@]}"
}

Possible choices for "-cipher" are:

- aRSA:aECDSA
- aECDSA:aRSA
- aECDSA
- aRSA

If any fail with a certificate verification problem due to a mismatched
TLSA record (rather than failure to find a common ciphersuite), you have
a TLSA misconfiguration.

Always simplest to stick to just one widely supported algorithm, for
now, in most cases a vanilla RSA cert with a 2048-bit key.

Though perhaps all SMTP clients capable of doing DANE are sufficiently
bleeding edge to also be expected to support ECDSA (P256).

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread pgnd via Postfix-users

There is currently a similar thread on "mailop" mailing list about
connections from MS to *submission* ports, that connect, do valid AUTH
(using proper credentials!) and then hang up.

People in that thread suspect that this behavior might be associated with
connections from Outlook mobile app being proxied by MS servers. Probably
something went wrong there.

No definite conclusion yet.


thx for the ref -- found the thread on mailop.

not exactly the same issue to my read, but there may be more to it?

in any case, it'd be at least consistent some legit sends from *outlook.com 
making it thru, and such other mobile/proxied attempts not.

wait -n- see ...

___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Jaroslaw Rafa via Postfix-users
Dnia 15.08.2023 o godz. 16:14:58 pgnd via Postfix-users pisze:
> they come in frequent waves of ~5-10 from countless different outlook.com
> hosts -- but, so far, these waves (and totals) are ONLY from outlook.com
> -- getting by postscreen cache after expire with "PASS NEW".
> 
> i never receive content with these; i just see the connect->disconnect
> sequence.  protections appear to be doing what they should.
> 
> OK mail from outlook does make it's way thru; e.g., since Monday,
> 
>   xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" 
> /var/log/postfix/postfix.log | wc -l
>4343
> 
> any wisdom as to what this M$ noise is ? and what (else) to do about it?
> if anything ...

There is currently a similar thread on "mailop" mailing list about
connections from MS to *submission* ports, that connect, do valid AUTH
(using proper credentials!) and then hang up.

People in that thread suspect that this behavior might be associated with
connections from Outlook mobile app being proxied by MS servers. Probably
something went wrong there.

No definite conclusion yet.
-- 
Regards,
   Jaroslaw Rafa
   r...@rafa.eu.org
--
"In a million years, when kids go to school, they're gonna know: once there
was a Hushpuppy, and she lived with her daddy in the Bathtub."
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Viktor Dukhovni via Postfix-users
On Wed, Aug 16, 2023 at 02:07:39PM +, Serg wrote:

> Thanks for pointing this out, I forgot to update it when migrating from RSA 
> to ECC certificate.

It seems you don't have monitoring in place that checks the correctness
of your TLSA records vis-à-vis your certificate chain.  Monitoring is an
essential part of deploying inbound DANE TLSA.  My standard advice is to
deploy the monitoring first, and only then deploy DANE.  You should be
the first to know if and when something goes wrong.

Also consider:

https://github.com/tlsaware/danebot

[ Contributions of code to implement "hooks" welcome, as well as code to
  support changing the list of requested DNS names without having to
  change the key.  The github project could also be a place to host
  similar functionality for other ACME clients. ]

> > Far less hassle (a few extra *lines* in the log per day) than not being
> > able to receive mail. And you contribute to the survey stats.
> 
> Oh, haven't thought it has such functionality (shodan/censys/etc never
> reached me due to any security issues found).

The primary purpose of the survey is to keep the DANE ecosystem in a
clean-enough state to not hamper further adoption.  If too many domains
had broken TLSA records, DANE would wither away without ever reaching
critical mass.

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Serg via Postfix-users

On 8/16/23 13:55, Viktor Dukhovni via Postfix-users wrote:

There's good reason for that, your MX host has DANE TLSA records that
don't match its certificate chain:


Thanks for pointing this out, I forgot to update it when migrating from RSA to 
ECC certificate.

On 8/16/23 13:55, Viktor Dukhovni via Postfix-users wrote:

Your server refuses SMTP connections from the DANE survey,

   flopster.at.encryp.ch[65.21.140.233]: GREETING 554 5.7.1 
: Unverified Client host rejected: opt-out from the 
research
   flopster.at.encryp.ch[2a01:4f9:3b:2a5f:86e2:89a:e1f7:b837]: GREETING 554 5.7.1 
: Unverified Client host rejected: opt-out from the 
research

so, unfortunately, you've also not been previously notified of this
problem.

I would like to encourage postmasters to not block SMTP connections from
the DANE survey: https://stats.dnssec-tools.org/about.html

There is typically just one connection a day per MX IP
address, perhaps a couple of extra connections if a problem is found.

Far less hassle (a few extra *lines* in the log per day) than not being
able to receive mail. And you contribute to the survey stats.



Oh, haven't thought it has such functionality (shodan/censys/etc never reached 
me due to any security issues found).
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Viktor Dukhovni via Postfix-users
On Wed, Aug 16, 2023 at 10:56:07AM +, Serg via Postfix-users wrote:
> I have checked email server of mine and can confirm I am seeing that too 
> (logs are since Aug 13 03:50:38 EEST):
> 
> > admin@flopster ~ $ sudo grep -e .outbound.protection.outlook.com 
> > /var/log/mail.log | grep 'ehlo=1 starttls=1 quit=1 commands=3' | tail
> > Aug 16 13:47:34 flopster postfix/smtpd[23237]: disconnect from 
> > mail-mw2nam12on20617.outbound.protection.outlook.com[2a01:111:f400:fe5a::617]
> >  ehlo=1 starttls=1 quit=1 commands=3
> > [...]

There's good reason for that, your MX host has DANE TLSA records that
don't match its certificate chain:

$ danesmtp ()
{
local host=$1;
shift;
local opts=(-starttls smtp -connect "$host:25" -verify 9 
-verify_return_error -brief -dane_ee_no_namechecks -dane_tlsa_domain "$host");
set -- $(dig +short +nosplit -t tlsa "_25._tcp.$host" | egrep -i '^[23] 
[01] [012] [0-9a-f]+$');
while [ $# -ge 4 ]; do
opts=("${opts[@]}" "-dane_tlsa_rrdata" "$1 $2 $3 $4");
shift 4;
done;
( sleep 1;
printf "QUIT\r\n" ) | openssl s_client "${opts[@]}"
}

$ danesmtp flopster.at.encryp.ch
verify depth is 9
depth=0 CN = flopster.at.encryp.ch
verify error:num=65:No matching DANE TLSA records
34371133440:error:1416F086:SSL 
routines:tls_process_server_certificate:certificate verify 
failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1921:

Microsoft supports DANE outbound and will not deliver mail to sites with
misconfigured TLSA records.  This can only be discovered as part of
completing the TLS handshake.

Your server refuses SMTP connections from the DANE survey,

  flopster.at.encryp.ch[65.21.140.233]: GREETING 554 5.7.1 
: Unverified Client host rejected: opt-out from the 
research
  flopster.at.encryp.ch[2a01:4f9:3b:2a5f:86e2:89a:e1f7:b837]: GREETING 554 
5.7.1 : Unverified Client host rejected: opt-out from 
the research

so, unfortunately, you've also not been previously notified of this
problem.

I would like to encourage postmasters to not block SMTP connections from
the DANE survey: https://stats.dnssec-tools.org/about.html

There is typically just one connection a day per MX IP
address, perhaps a couple of extra connections if a problem is found.

Far less hassle (a few extra *lines* in the log per day) than not being
able to receive mail. And you contribute to the survey stats.

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Viktor Dukhovni via Postfix-users
On Wed, Aug 16, 2023 at 09:12:44AM -0400, pgnd via Postfix-users wrote:

>   4   0.321516 192.0.2.25 → 52.101.62.16 SMTP 121 S: 220 
> mx1.example.net ESMTP .

Your server's hostname and served domains continue to be hidden.  Are
you perhaps willing and able to post those details?  Without that
information, no further differential diagnostics are possible.

>   4   0.318693 192.0.2.25 → 209.85.128.182 SMTP 133 S: 220 
> mx1.example.net ESMTP .

I am assuming your server's name isn't actually mx1.example.net,
certainly not what Microsoft is connecting to, since that name has no IP
address in the public DNS (example.net is an IANA reserved name for use
in documentation).

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread pgnd via Postfix-users

BTW I explicitly allow mail from their IP ranges at postscreen level:

...

#outlook.com
40.92.0.0/15permit
40.107.0.0/16   permit
52.100.0.0/14   permit
104.47.0.0/17   permit

they published some more ranges but when I checked, I haven't noticed mail from 
other than these ranges


i suppose that can't hurt here.

i added the ranges, and, as expected, see ALLOWLISTED @ postscreen; tho, the 
connection still terminates as above.



taking a stab at looking at TLS, for one of these short/failed from-outlook.com 
attempts,

tshark -nr /tmp/tls.pcap
1   0.00 52.101.62.16 → 192.0.2.25 TCP 66 60645 → 25 [SYN] 
Seq=0 Win=64240 Len=0 MSS=1378 WS=256 SACK_PERM
2   0.000211 192.0.2.25 → 52.101.62.16 TCP 66 25 → 60645 [SYN, 
ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=1
3   0.044868 52.101.62.16 → 192.0.2.25 TCP 54 60645 → 25 [ACK] 
Seq=1 Ack=1 Win=525568 Len=0
4   0.321516 192.0.2.25 → 52.101.62.16 SMTP 121 S: 220 
mx1.example.net ESMTP .
5   0.365891 52.101.62.16 → 192.0.2.25 SMTP 105 C: EHLO 
DM5PR00CU002.outbound.protection.outlook.com
6   0.365969 192.0.2.25 → 52.101.62.16 TCP 54 25 → 60645 [ACK] 
Seq=68 Ack=52 Win=64189 Len=0
7   0.366134 192.0.2.25 → 52.101.62.16 SMTP 185 S: 
250-mx1.example.net | PIPELINING | SIZE 104857600 | STARTTLS | 
ENHANCEDSTATUSCODES | 8BITMIME | SMTPUTF8
8   0.410624 52.101.62.16 → 192.0.2.25 SMTP 64 C: STARTTLS
9   0.410814 192.0.2.25 → 52.101.62.16 SMTP 84 S: 220 2.0.0 
Ready to start TLS
10   0.455866 52.101.62.16 → 192.0.2.25 TLSv1.2 224 Client Hello
11   0.466708 192.0.2.25 → 52.101.62.16 TLSv1.2 1432 Server 
Hello
12   0.466719 192.0.2.25 → 52.101.62.16 TCP 1432 25 → 60645 
[PSH, ACK] Seq=1607 Ack=232 Win=64009 Len=1378 [TCP segment of a reassembled 
PDU]
13   0.466947 192.0.2.25 → 52.101.62.16 TLSv1.2 902 
Certificate, Server Key Exchange, Server Hello Done
14   0.511121 52.101.62.16 → 192.0.2.25 TCP 54 60645 → 25 [ACK] 
Seq=232 Ack=2985 Win=525568 Len=0
15   0.518474 52.101.62.16 → 192.0.2.25 TLSv1.2 212 Client Key 
Exchange, Change Cipher Spec, Encrypted Handshake Message
16   0.520753 192.0.2.25 → 52.101.62.16 TLSv1.2 296 New Session 
Ticket, Change Cipher Spec, Encrypted Handshake Message
17   0.567586 52.101.62.16 → 192.0.2.25 TLSv1.2 89 Application 
Data
18   0.568017 192.0.2.25 → 52.101.62.16 TLSv1.2 98 Application 
Data
19   0.568181 192.0.2.25 → 52.101.62.16 TLSv1.2 85 Encrypted 
Alert
20   0.612599 52.101.62.16 → 192.0.2.25 TCP 54 60645 → 25 [ACK] 
Seq=425 Ack=4151 Win=524288 Len=0
21   0.613008 52.101.62.16 → 192.0.2.25 TCP 54 60645 → 25 [RST, 
ACK] Seq=425 Ack=4151 Win=0 Len=0

&

tshark -nr /tmp/tls.pcap -V ssl
...
Transmission Control Protocol, Src Port: 25, Dst Port: 60645, 
Seq: 2985, Ack: 232, Len: 848
Source Port: 25
Destination Port: 60645
[Stream index: 0]
??  [Conversation completeness: Incomplete, DATA (15)]
...

iiuc, 15 == 1/SYN +2/SYN-ACK + 4/ACK +8/DATA and indicates the handshake lacks 
a FIN or RST closing sequence


for an OK send, from google,

tshark -nr /tmp/tls.pcap
1   0.00 209.85.128.182 → 192.0.2.25 TCP 74 47456 → 25 
[SYN] Seq=0 Win=65535 Len=0 MSS=1412 SACK_PERM TSval=1170316599 TSecr=0 WS=256
2   0.000181 192.0.2.25 → 209.85.128.182 TCP 74 25 → 47456 
[SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM TSval=3383420399 
TSecr=1170316599 WS=1
3   0.023599 209.85.128.182 → 192.0.2.25 TCP 66 47456 → 25 
[ACK] Seq=1 Ack=1 Win=65536 Len=0 TSval=1170316622 TSecr=3383420399
4   0.318693 192.0.2.25 → 209.85.128.182 SMTP 133 S: 220 
mx1.example.net ESMTP .
5   0.342110 209.85.128.182 → 192.0.2.25 TCP 66 47456 → 25 
[ACK] Seq=1 Ack=68 Win=65536 Len=0 TSval=1170316941 TSecr=3383420717
6   0.343199 209.85.128.182 → 192.0.2.25 SMTP 97 C: EHLO 
mail-yw1-f182.google.com
7   0.343282 192.0.2.25 → 209.85.128.182 TCP 66 25 → 47456 
[ACK] Seq=68 Ack=32 Win=65129 Len=0 TSval=3383420742 TSecr=1170316942
8   0.343408 192.0.2.25 → 209.85.128.182 SMTP 197 S: 
250-mx1.example.net | PIPELINING | SIZE 104857600 | STARTTLS | 
ENHANCEDSTATUSCODES | 8BITMIME | SMTPUTF8
9   0.367327 209.85.128.182 → 192.0.2.25 SMTP 76 C: STARTTLS
10   0.367387 192.0.2.25 → 209.85.128.182 SMTP 96 S: 220 2.0.0 
Ready to start TLS
11   0.391656 209.85.128.182 → 192.0.2.25 TLSv1 583 Client Hello
12   0.393450 192.0.2.25 → 209.85.128.182 TLSv1.3 1466 Server 
Hello, 

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Serg via Postfix-users

I have checked email server of mine and can confirm I am seeing that too (logs 
are since Aug 13 03:50:38 EEST):


admin@flopster ~ $ sudo grep -e .outbound.protection.outlook.com 
/var/log/mail.log | grep 'ehlo=1 starttls=1 quit=1 commands=3' | tail
Aug 16 13:47:34 flopster postfix/smtpd[23237]: disconnect from 
mail-mw2nam12on20617.outbound.protection.outlook.com[2a01:111:f400:fe5a::617] 
ehlo=1 starttls=1 quit=1 commands=3
Aug 16 13:47:35 flopster postfix/smtpd[17815]: disconnect from 
mail-mw2nam12on2066.outbound.protection.outlook.com[40.107.244.66] ehlo=1 
starttls=1 quit=1 commands=3
Aug 16 13:48:30 flopster postfix/smtpd[23237]: disconnect from 
mail-db3eur04hn2210.outbound.protection.outlook.com[52.100.17.210] ehlo=1 
starttls=1 quit=1 commands=3
Aug 16 13:48:31 flopster postfix/smtpd[21126]: disconnect from 
mail-db3eur04hn031a.outbound.protection.outlook.com[2a01:111:f400:fe0c::31a] 
ehlo=1 starttls=1 quit=1 commands=3
Aug 16 13:49:55 flopster postfix/smtpd[21126]: disconnect from 
mail-dm6nam12hn2213.outbound.protection.outlook.com[52.100.166.213] ehlo=1 
starttls=1 quit=1 commands=3
Aug 16 13:49:57 flopster postfix/smtpd[23237]: disconnect from 
mail-dm6nam12hn2031b.outbound.protection.outlook.com[2a01:111:f400:fe59::31b] 
ehlo=1 starttls=1 quit=1 commands=3
Aug 16 13:50:33 flopster postfix/smtpd[23237]: disconnect from 
mail-mw2nam10hn2238.outbound.protection.outlook.com[52.100.157.238] ehlo=1 
starttls=1 quit=1 commands=3
Aug 16 13:50:35 flopster postfix/smtpd[21126]: disconnect from 
mail-mw2nam10hn20321.outbound.protection.outlook.com[2a01:111:f400:7e89::321] 
ehlo=1 starttls=1 quit=1 commands=3
Aug 16 13:52:03 flopster postfix/smtpd[23237]: disconnect from 
mail-bn8nam11hn2200.outbound.protection.outlook.com[52.100.171.200] ehlo=1 
starttls=1 quit=1 commands=3
Aug 16 13:52:03 flopster postfix/smtpd[21126]: disconnect from 
mail-bn8nam11hn20300.outbound.protection.outlook.com[2a01:111:f400:7eae::300] 
ehlo=1 starttls=1 quit=1 commands=3
admin@flopster ~ $ sudo grep -e .outbound.protection.outlook.com 
/var/log/mail.log | grep 'ehlo=1 starttls=1 quit=1 commands=3' | wc -l
10443


On 8/16/23 10:46, Emmanuel Fusté via Postfix-users wrote:

Le 15/08/2023 à 23:12, Viktor Dukhovni via Postfix-users a écrit :

On Tue, Aug 15, 2023 at 04:14:58PM -0400, pgnd via Postfix-users wrote:


2023-08-14T13:11:53.782611-04:00 svr01 postfix/postscreen[27910]: CONNECT from 
[52.101.56.17]:32607 to [209.123.234.54]:25
2023-08-14T13:11:59.860098-04:00 svr01 postfix/postscreen[27910]: PASS NEW 
[52.101.56.17]:32607
2023-08-14T13:12:00.058029-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: connect from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]
2023-08-14T13:12:00.118201-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: Anonymous TLS connection established 
from mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]: 
TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)
2023-08-14T13:12:00.131049-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: disconnect from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17] ehlo=1 
starttls=1 quit=1 commands=3

Perhaps they don't like your certificate and disconnect once the
handshake completes.


I second that.
But as outbound policy could be personalized by client/tenant hosted on O365 
you're lost until someone start winning at you by another channel or retract 
the offending specific configuration, all conditioned by logs inspections 
and/or end user complains on their side.
Already run into here.

Emmanuel.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Emmanuel Fusté via Postfix-users

Le 15/08/2023 à 23:12, Viktor Dukhovni via Postfix-users a écrit :

On Tue, Aug 15, 2023 at 04:14:58PM -0400, pgnd via Postfix-users wrote:


2023-08-14T13:11:53.782611-04:00 svr01 postfix/postscreen[27910]: CONNECT from 
[52.101.56.17]:32607 to [209.123.234.54]:25
2023-08-14T13:11:59.860098-04:00 svr01 postfix/postscreen[27910]: PASS NEW 
[52.101.56.17]:32607
2023-08-14T13:12:00.058029-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: connect from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]
2023-08-14T13:12:00.118201-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: Anonymous TLS connection established 
from mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]: 
TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)
2023-08-14T13:12:00.131049-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: disconnect from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17] ehlo=1 
starttls=1 quit=1 commands=3

Perhaps they don't like your certificate and disconnect once the
handshake completes.


I second that.
But as outbound policy could be personalized by client/tenant hosted on 
O365 you're lost until someone start winning at you by another channel 
or retract the offending specific configuration, all conditioned by logs 
inspections and/or end user complains on their side.

Already run into here.

Emmanuel.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread Matus UHLAR - fantomas via Postfix-users

On Tue, Aug 15, 2023 at 04:14:58PM -0400, pgnd via Postfix-users wrote:

2023-08-14T13:11:53.782611-04:00 svr01 postfix/postscreen[27910]: CONNECT from 
[52.101.56.17]:32607 to [209.123.234.54]:25
2023-08-14T13:11:59.860098-04:00 svr01 postfix/postscreen[27910]: PASS NEW 
[52.101.56.17]:32607
2023-08-14T13:12:00.058029-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: connect from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]
2023-08-14T13:12:00.118201-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: Anonymous TLS connection established 
from mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]: 
TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)
2023-08-14T13:12:00.131049-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: disconnect from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17] ehlo=1 
starttls=1 quit=1 commands=3


On 15.08.23 17:12, Viktor Dukhovni via Postfix-users wrote:

Perhaps they don't like your certificate and disconnect once the
handshake completes.  What are some of the domains this server is an MX
host for?


I have certificate signed by my personal CA and receive mail from microsoft 
services w/o problems.


BTW I explicitly allow mail from their IP ranges at postscreen level:

#google
209.85.128.0/17 permit
74.125.0.0/16   permit
#outlook.com
40.92.0.0/15permit
40.107.0.0/16   permit
52.100.0.0/14   permit
104.47.0.0/17   permit

they published some more ranges but when I checked, I haven't noticed mail from 
other than these ranges



OK mail from outlook does make it's way thru; e.g., since Monday,

   xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" 
/var/log/postfix/postfix.log | wc -l
4343


Isn't that outbound mail *to* Microsoft-hosted domains?  I wouldn't
expect that to appear in logs of incoming mail.


correct

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Honk if you love peace and quiet.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread Viktor Dukhovni via Postfix-users
On Tue, Aug 15, 2023 at 05:12:53PM -0400, Viktor Dukhovni via Postfix-users 
wrote:

> > 2023-08-14T13:12:00.131049-04:00 svr01 
> > postfix/postscreen-internal/smtpd[27907]: disconnect from 
> > mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17] 
> > ehlo=1 starttls=1 quit=1 commands=3
> 
> Perhaps they don't like your certificate and disconnect once the
> handshake completes.  What are some of the domains this server is an
> MX host for?

This is the key question that would have been useful to respond to.

> > OK mail from outlook does make it's way thru; e.g., since Monday,
> > 
> >xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" 
> > /var/log/postfix/postfix.log | wc -l
> > 4343
> 
> Isn't that outbound mail *to* Microsoft-hosted domains?  I wouldn't
> expect that to appear in logs of incoming mail.

This was just an observation that quoted count has no bearing on inbound
mail.

On Tue, Aug 15, 2023 at 06:02:20PM -0400, pgnd wrote:

> >> OK mail from outlook does make it's way thru; e.g., since Monday,
> >>
> >> xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" 
> >> /var/log/postfix/postfix.log | wc -l
> >>  4343
> > Isn't that outbound mail*to*  Microsoft-hosted domains?  I wouldn't
> > expect that to appear in logs of incoming mail.
> 
> i grabbed the 250 for my grep from proxy-accept, just for counting convenience
> e.g., here's an ok inbound that was accepted/delivered;

There was no need for these.  What are some domains that the server
MX-hosts?

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread pgnd via Postfix-users




OK mail from outlook does make it's way thru; e.g., since Monday,

xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" 
/var/log/postfix/postfix.log | wc -l
 4343

Isn't that outbound mail*to*  Microsoft-hosted domains?  I wouldn't
expect that to appear in logs of incoming mail.


i grabbed the 250 for my grep from proxy-accept, just for counting convenience
e.g., here's an ok inbound that was accepted/delivered;

2023-07-17T10:19:12.601557-04:00 svr01 postfix/postscreen[44132]: 
CONNECT from [40.107.244.113]:33056 to [xx.xx.xx.xx]:25
2023-07-17T10:19:18.800849-04:00 svr01 postfix/postscreen[44132]: PASS 
NEW [40.107.244.113]:33056
2023-07-17T10:19:18.926665-04:00 svr01 postfix/ps-int/smtpd[44136]: 
connect from mail-mw2nam12on2113.outbound.protection.outlook.com[40.107.244.113]
2023-07-17T10:19:19.247918-04:00 svr01 postfix/ps-int/smtpd[44136]: 
Untrusted TLS connection established from 
mail-mw2nam12on2113.outbound.protection.outlook.com[40.107.244.113]: TLSv1.2 
with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)
2023-07-17T10:19:21.649503-04:00 svr01 auth-milter[34494]: 4325636CF1D: 
ERROR: Error parsing existing Authentication-Results header: dkim=none (message not 
signed)#015 header.d=none;dmarc=none action=none header.from=example2.com;
2023-07-17T10:19:21.368763-04:00 svr01 postfix/ps-int/smtpd[44136]: 
NOQUEUE: 
client=mail-mw2nam12on2113.outbound.protection.outlook.com[40.107.244.113]
2023-07-17T10:19:21.992068-04:00 svr01 milter-regex[1108]: localhost.mx1.example1.net 
[127.0.0.1]: ACCEPT, HELO: auth-milter.mx1.example2.net, FROM: , RCPT: 
, From:someone , To: me , 
Subject: 
2023-07-17T10:19:21.927171-04:00 svr01 postfix/preQ/smtpd[44140]: 
connect from localhost.mx1.example1.net[127.0.0.1]
2023-07-17T10:19:21.938905-04:00 svr01 postfix/preQ/smtpd[44140]: 
4RF2p96g9nz5K: client=localhost.mx1.example1.net[127.0.0.1], 
orig_client=mail-mw2nam12on2113.outbound.protection.outlook.com[40.107.244.113]
2023-07-17T10:19:21.941334-04:00 svr01 postfix/cleanup[44143]: 4RF2p96g9nz5K: 
message-id=
2023-07-17T10:19:22.020339-04:00 svr01 clamav-milter[5784]: Clean message from 
 to 
2023-07-17T10:19:28.048393-04:00 svr01 postfix/qmgr[1360]: 4RF2p96g9nz5K: 
from=, size=13112, nrcpt=1 (queue active)

2023-07-17T10:19:28.049981-04:00 svr01 postfix/ps-int/smtpd[44136]: proxy-accept: 
END-OF-MESSAGE: 250 2.0.0 Queued as 4325636CF1D; from= 
to= proto=ESMTP helo=

2023-07-17T10:19:28.052131-04:00 svr01 postfix/preQ/smtpd[44140]: 
disconnect from localhost.mx1.example1.net[127.0.0.1] ehlo=1 xforward=3 mail=1 
rcpt=1 data=1 quit=1 commands=8
2023-07-17T10:19:28.171477-04:00 svr01 postfix/ps-int/smtpd[44136]: 
disconnect from 
mail-mw2nam12on2113.outbound.protection.outlook.com[40.107.244.113] ehlo=2 
starttls=1 mail=1 rcpt=1 data=1 quit=1 commands=7
2023-07-17T10:19:28.268685-04:00 svr01 postfix/relay-mx2/smtp[44150]: 
Verified TLS connection established to 
internal.mx2.example2.net[172.28.25.1]:25: TLSv1.3 with cipher 
TLS_CHACHA20_POLY1305_SHA256 (256/256 bits) key-exchange X448 server-signature 
ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) 
client-digest SHA384
2023-07-17T10:19:28.955906-04:00 svr01 postfix/relay-mx2/smtp[44150]: 
4RF2p96g9nz5K: to=, 
relay=internal.mx2.example2.net[172.28.25.1]:25, delay=7, delays=6.1/0.01/0.49/0.4, 
dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 4RF2pJ53hDzWf3r)
2023-07-17T10:19:28.956613-04:00 svr01 postfix/qmgr[1360]: 
4RF2p96g9nz5K: removed


i'll look some more at TLS handshake, but can't yet grok why it'd work in some 
cases, and not others -- from *.outlook.com

as mentioned above, hardly a stress blip to worry about ...
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread pgnd via Postfix-users

There is no protection you can add to prevent this


fair enuf


other than firewalling them completely.


the wishful-thinking of fw'ing MS's entire ASN has crossed my mind more than 
once ;-)
 

Why do they do this? Only they know.


if they do, they certainly don't respond to @support/etc inquiries


Maybe they don't like something about the cipher used, but that seems unlikely 
since the session seems to be established normally. Maybe they have a message 
bigger than your announced SIZE=, but that shouldn't result in repeated 
connections. Maybe they just have something stuck in their queue. At any rate, 
nothing you can do about any of this.


fwiw, here

  250-SIZE 104857600

i'd expect (well, hope) that all the outlook.com servers were config'd 
similarly.
if they are, then i wouldn't expect to see _any_ *.outlook.com traffic; i do. 
tho, atm, the good/bad ratio is dropping like a stone.


I guess twiddle the TLS knobs (or use the defaults) to maybe get them to use a 
different cipher, but that's just a shot in the dark and frankly I'd be 
surprised if it helped.


i've already dropped back to defaults.  no change in behavior.  i was wondering 
if there was something to _add_; sounds like a likely no.


What should you do? Just ignore it. Unless it gets to the DDOS point, even 
thousands of short-lived ghost connections won't stress postfix or interfere 
with other mail.

point taken.  i certainly haven't noticed any related load blips as a result.


The biggest annoyance is junking up the logs.


+1


You could try to catch a tcp dump of one of the offending connections, but I 
expect that will look perfectly normal from your end.


as far as i recognize 'normal', vs typical, that's been the case; i'll poke 
again, but TBH, not really worth the diagnostic bother beyond the annoyance.
as long as something isn't broken on my end; so far, i haven't see anything 
that looks like anything more than noise.

___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread Viktor Dukhovni via Postfix-users
On Tue, Aug 15, 2023 at 04:14:58PM -0400, pgnd via Postfix-users wrote:

> 2023-08-14T13:11:53.782611-04:00 svr01 postfix/postscreen[27910]: CONNECT 
> from [52.101.56.17]:32607 to [209.123.234.54]:25
> 2023-08-14T13:11:59.860098-04:00 svr01 postfix/postscreen[27910]: PASS NEW 
> [52.101.56.17]:32607
> 2023-08-14T13:12:00.058029-04:00 svr01 
> postfix/postscreen-internal/smtpd[27907]: connect from 
> mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]
> 2023-08-14T13:12:00.118201-04:00 svr01 
> postfix/postscreen-internal/smtpd[27907]: Anonymous TLS connection 
> established from 
> mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]: 
> TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)
> 2023-08-14T13:12:00.131049-04:00 svr01 
> postfix/postscreen-internal/smtpd[27907]: disconnect from 
> mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17] ehlo=1 
> starttls=1 quit=1 commands=3

Perhaps they don't like your certificate and disconnect once the
handshake completes.  What are some of the domains this server is an MX
host for?

> OK mail from outlook does make it's way thru; e.g., since Monday,
> 
>xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" 
> /var/log/postfix/postfix.log | wc -l
> 4343

Isn't that outbound mail *to* Microsoft-hosted domains?  I wouldn't
expect that to appear in logs of incoming mail.

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread Noel Jones via Postfix-users

On 8/15/2023 3:14 PM, pgnd via Postfix-users wrote:
my "BFFs" @ M$'s *.outlook.com have decided over the last month or 
so to send many 10K's of these


 2023-08-14T13:11:53.782611-04:00 svr01 
postfix/postscreen[27910]: CONNECT from [52.101.56.17]:32607 to 
[209.123.234.54]:25
 2023-08-14T13:11:59.860098-04:00 svr01 
postfix/postscreen[27910]: PASS NEW [52.101.56.17]:32607
 2023-08-14T13:12:00.058029-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: connect from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]
 2023-08-14T13:12:00.118201-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: Anonymous TLS connection 
established from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)
 2023-08-14T13:12:00.131049-04:00 svr01 
postfix/postscreen-internal/smtpd[27907]: disconnect from 
mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17] ehlo=1 starttls=1 quit=1 commands=3


they come in frequent waves of ~5-10 from countless different 
outlook.com hosts --  but, so far, these waves (and totals) are ONLY 
from outlook.com -- getting by postscreen cache after expire with 
"PASS NEW".


i never receive content with these; i just see the 
connect->disconnect sequence. protections appear to be doing what 
they should.


OK mail from outlook does make it's way thru; e.g., since Monday,

   xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" 
/var/log/postfix/postfix.log | wc -l

    4343

any wisdom as to what this M$ noise is ? and what (else) to do about 
it? if anything ...





So they connect, say EHLO, start a TLS session, and disconnect. 
There is no protection you can add to prevent this, other than 
firewalling them completely.


Why do they do this? Only they know. Maybe they don't like something 
about the cipher used, but that seems unlikely since the session 
seems to be established normally. Maybe they have a message bigger 
than your announced SIZE=, but that shouldn't result in repeated 
connections. Maybe they just have something stuck in their queue. At 
any rate, nothing you can do about any of this.


I guess twiddle the TLS knobs (or use the defaults) to maybe get 
them to use a different cipher, but that's just a shot in the dark 
and frankly I'd be surprised if it helped.


You could try to catch a tcp dump of one of the offending 
connections, but I expect that will look perfectly normal from your end.


What should you do? Just ignore it. Unless it gets to the DDOS 
point, even thousands of short-lived ghost connections won't stress 
postfix or interfere with other mail. The biggest annoyance is 
junking up the logs.




  -- Noel Jones
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org