Is such an SSL attack possible against Postfix?

2010-07-21 Thread Ralf Hildebrandt
http://blog.fefe.de/?ts=b2b8f9f8
sorry, it's in german. I'll translate some bits:

Sombody went to Torrent trackers and announced blog.fefe.de:443 as
Torrent client (for a really popular download I guess).

Thus, blog.fefe.de:443 got flooded with torrent-client traffic on the
SSL port.

Port 25 outgoing will be blocked by most ISPs, but let's assume that's
not done by all IPS. It would work with the submission port!

-- 
Ralf Hildebrandt
  Geschäftsbereich IT | Abteilung Netzwerk
  Charité - Universitätsmedizin Berlin
  Campus Benjamin Franklin
  Hindenburgdamm 30 | D-12203 Berlin
  Tel. +49 30 450 570 155 | Fax: +49 30 450 570 962
  ralf.hildebra...@charite.de | http://www.charite.de



RE: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Jonathan Tripathy
Port 25 outgoing will be blocked by most ISPs
---
 
This may be the case in your country, but from where I'm from, I've never had a 
problem sending out on port 25, even on home residental ISPs :)



winmail.dat

RE: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Gordan Bobic
On Wed, 2010-07-21 at 10:02 +0100, Jonathan Tripathy wrote:
 Port 25 outgoing will be blocked by most ISPs
 --
  
 This may be the case in your country, but from where I'm from, I've
 never had a problem sending out on port 25, even on home residental
 ISPs :)

My observation is the same. I am aware of only one ISP blocking
outbound port 25, and that is Three, and from what I have been able to
check, they only block for access from mobile phones. Of course,
outbound port 587 isn't blocked.

Back to the original point about SSL DDoS, you have to consider how SSL
works for SMTP. The correct way to do SMTP encryption is via TLS, not
SMTPS, which mean the connection gets set up without SSL, and then
switches to TLS on protocol level. That means the client would have to
know how to talk SMTP first, which BT clients don't.

OTOH, if you are running SMTPS, then SSL would get established first,
before the protocol connection is set up, so you would get hit with the
SSL setup overheads. But you shouldn't be running SMTPS, it's very
existence is an ill thought out hangover from the dark ages.

Gordan



Re: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Charles Marcus
Jonathan Tripathy wrote:
 Port 25 outgoing will be blocked by most ISPs

 This may be the case in your country, but from where I'm from, I've
 never had a problem sending out on port 25, even on home residental
 ISPs :)

Any ISP that does *not* block port 25 for residential service is a part
of the spam/zombie problem, and if yours doesn't, you should complain,
loudly if necessary, and encourage them to block it.


Re: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Daniel V. Reinhardt


- Original Message 

 From: Ralf Hildebrandt ralf.hildebra...@charite.de
 To: postfix-users@postfix.org
 Sent: Wed, July 21, 2010 5:00:16 AM
 Subject: Is such an SSL attack possible against Postfix?
 
 http://blog.fefe.de/?ts=b2b8f9f8
 sorry, it's in german. I'll translate  some bits:
 
 Sombody went to Torrent trackers and announced  blog.fefe.de:443 as
 Torrent client (for a really popular download I  guess).
 
 Thus, blog.fefe.de:443 got flooded with torrent-client traffic on  the
 SSL port.
 
 Port 25 outgoing will be blocked by most ISPs, but let's  assume that's
 not done by all IPS. It would work with the submission  port!
 

All,

In my opinion the port really doesn't matter.  If the IP is up and fully 
operational and you send enough traffic to it then yes a DDoS is going to 
happen. If the port isn't open it will just say connection refused, but get 
enough traffic to saturate that bandwidth to the server, and the link will go 
down.

So in this instance you would only be able to protect yourself via TCP and UDP 
Flood Protection on your IDS and HIPS systems or other firewall tools.

Thanks,
Daniel Reinhardt
Website: www.cryptodan.com
Email:  crypto...@yahoo.com


  


RE: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Jonathan Tripathy
Jonathan Tripathy wrote:
 Port 25 outgoing will be blocked by most ISPs

 This may be the case in your country, but from where I'm from, I've
 never had a problem sending out on port 25, even on home residental
 ISPs :)

Any ISP that does *not* block port 25 for residential service is a part
of the spam/zombie problem, and if yours doesn't, you should complain,
loudly if necessary, and encourage them to block it.


-

Every ISP in the UK?

I beg to disagree. Blocking port 25 is a violation of Net Neutrality.

Now, by default, the ISP do put their DSL (dynamic and static)  IP addresses 
automatically on the RBL blacklist listed as a server which should not normally 
send email. To realistically send email from a dynamic IP, you need to remove 
yourself from that list, but you have to promise not to spam. Then, if you 
spam, you get put back on permanently



Re: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Ansgar Wiechers
On 2010-07-21 Daniel V. Reinhardt wrote:
 From: Ralf Hildebrandt ralf.hildebra...@charite.de
 To: postfix-users@postfix.org
 Sent: Wed, July 21, 2010 5:00:16 AM
 Subject: Is such an SSL attack possible against Postfix?
 
 http://blog.fefe.de/?ts=b2b8f9f8
 sorry, it's in german. I'll translate  some bits:
 
 Sombody went to Torrent trackers and announced  blog.fefe.de:443 as
 Torrent client (for a really popular download I  guess).
 
 Thus, blog.fefe.de:443 got flooded with torrent-client traffic on
 the SSL port.
 
 Port 25 outgoing will be blocked by most ISPs, but let's  assume
 that's not done by all IPS. It would work with the submission  port!
 
 In my opinion the port really doesn't matter.  If the IP is up and
 fully operational and you send enough traffic to it then yes a DDoS is
 going to happen. If the port isn't open it will just say connection
 refused, but get enough traffic to saturate that bandwidth to the
 server, and the link will go down.
 
 So in this instance you would only be able to protect yourself via TCP
 and UDP Flood Protection on your IDS and HIPS systems or other
 firewall tools.

The issue with this attack is that it might exhaust CPU resources on the
server without having to saturate the bandwidth, due to cryptographic
operations required by SSL. And that it seems to use BitTorrent as a
multiplicator, so it doesn't require a botnet.

Regards
Ansgar Wiechers
-- 
Abstractions save us time working, but they don't save us time learning.
--Joel Spolsky


Re: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Wietse Venema
Ralf Hildebrandt:
 * Ansgar Wiechers li...@planetcobalt.net:
 
  The issue with this attack is that it might exhaust CPU resources on the
  server without having to saturate the bandwidth, due to cryptographic
  operations required by SSL.
 
 Correct.
 
  And that it seems to use BitTorrent as a multiplicator, so it doesn't
  require a botnet.
 
 It brings it's own botnet :)

And thus, Postfix's botnet defenses kick in.  With port 25 and 587,
the session won't even get to the TLS handhake.  Postfix will go
into stress mode and hang up after the first SMTP error. Just
pray that there is a newline character somewhere in the client TLS
HELLO packet.

Wietse


Re: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Charles Marcus
Jonathan Tripathy wrote:
 Any ISP that does *not* block port 25 for residential service is a part
 of the spam/zombie problem, and if yours doesn't, you should complain,
 loudly if necessary, and encourage them to block it.

 Every ISP in the UK?

Every one that is not, at a bare minimum, closely monitoring it for
botnet traffic *and* *immediately* shutting down infected IPs, then yes,
absolutely...

But, since most residential users have no need to send/receive email
directly over port 25, it is *much* easier (and more effective) to just
block it for designated subnets, so they only have to worry about
monitoring those that they *know* will be using it (because they
specifically asked for it).

 I beg to disagree. Blocking port 25 is a violation of Net Neutrality.

Ridiculous, net neutrality has nothing to do with service level
agreements. Residential service does not in any way, shape or form
equate to requiring full SMTP services to be able to run your own full
blown mail server, nor does denying access to port 25 for 'normal'
residential users impact their ability to access the internet or
send/receive email.

If you want that level of service, upgrade to a service that provides
it, and that will be at least minimally monitored for abuse (it is in
the ISPs best interest to avoid getting their IP addresses on blacklists).


RE: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Jonathan Tripathy


 I beg to disagree. Blocking port 25 is a violation of Net Neutrality.

Ridiculous, net neutrality has nothing to do with service level
agreements. Residential service does not in any way, shape or form
equate to requiring full SMTP services to be able to run your own full
blown mail server, nor does denying access to port 25 for 'normal'
residential users impact their ability to access the internet or
send/receive email.

If you want that level of service, upgrade to a service that provides
it, and that will be at least minimally monitored for abuse (it is in
the ISPs best interest to avoid getting their IP addresses on blacklists).
 
-
 
I pay for a connection to the internet. Provided I don't do anything illegal, I 
should be allowed to pass whatever traffic I want on it - even SMTP traffic. 
Blocking outgoing port 25 is not a solution.
 
An example: what if I own an SMTP server somewhere else, and want to test it 
from my home one evening? 
 
Why should I be forced to use an ISP's mail server to send an email?
 
But this is getting a bit OT for this list I think.
 
Bottom line, ISPs should not block any traffic or any ports. That doesn't mean 
they should guarantee any level of uptime or speed (however whatever measure 
they apply should be uniform across all protocols), but the actual contents 
that is passed should not be touched. Also, ISP should *never* monitor traffic. 
This is a violation of privacy rights, net neutrality, as well implicates the 
ISP in a lot of legal areas that they would want to avoid (example: EU laws 
says that if an ISP it not aware of any illegal activity/content, then they are 
not doing anything wrong. If they monitor traffic, they become liable for 
everything illegal that is passed.)
 
At the very least, if an ISP blocks port 25, then a simple phone call should 
allow this to be unblocked.



OT: ISP Blocking of port 25 - WAS: Re: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Charles Marcus
On 2010-07-21 11:16 AM, Gordan Bobic gor...@bobich.net wrote:
 If you want that level of service, upgrade to a service that
 provides it, and that will be at least minimally monitored for
 abuse (it is in the ISPs best interest to avoid getting their IP
 addresses on blacklists).

 Absolute nonsense. There are a lot of people who prefer to run their
 own mail servers, and they do so legitimately on residential-grade
 lines because they are cheaper than business ones.

Ok, so by that argument, if I sign up for entry level cable service, I
should then be able to 'demand' their fastest level of service at the
same price, or get Pay-Per-View movies for free, just because?

Ludicrous... SLAs were created for a reason - and no, just because you
have a bicycle does not give you the 'right' to demand unfettered access
to the autobahn.

 Either way, what you're wishing for isn't going to happen any time soon,
 and it's getting off topic.

Well, we agree on one thing at least... ;)

On 2010-07-21 11:21 AM, Jonathan Tripathy jon...@abpni.co.uk wrote:
 I pay for a connection to the internet. Provided I don't do anything
 illegal, I should be allowed to pass whatever traffic I want on it -
 even SMTP traffic.

That would depend on the terms of the contract you signed, now wouldn't it.

 Blocking outgoing port 25 is not a solution.

It completely eliminates the possibility of the connected PC from being
an active bot, even if it is compromised.

So, you are wrong, it is an incredibly simple and powerful solution to
that particular problem.

 An example: what if I own an SMTP server somewhere else, and want to
 test it from my home one evening?

Silly question... what if I have an entry level cable TV account, and
want to watch something on Pay-Per-View? By your argument, I should be
able to watch it without paying?

Sorry, port 25 access should be controlled, this is the only sane
solution to the problem of botnets, and as long as ISPs *don't* control
it, botnets will continue to be a plague on the internet.

 Why should I be forced to use an ISP's mail server to send an email?

You aren't. You have the option of paying for port 25 access, or finding
an ISP that allows residential customers to individually request and get
said access at no extra charge.

 But this is getting a bit OT for this list I think.

Again, agreed, and this will be my last list post...

 Bottom line, ISPs should not block any traffic or any ports.

I could say something like 'spoken like a true spammer', but that would
be rude - and likely not apply to you anyway, even though it does sound
like something a spammer would say.

 That doesn't mean they should guarantee any level of uptime or speed

Why not? If you believe you have the right to force them to not block
any ports, why should the speed or uptime be any different?

The bottom line is, internet access is determined by contract, so it all
depends on the terms of the contract.

 but the actual contents that is passed should not be touched.

For 'allowed' traffic, and with the exception of passive monitoring for
abusive behavior, I agree completely.

 Also, ISP should *never* monitor traffic.

Depending on what you mean by 'monitor', I emphatically disagree.

 This is a violation of privacy rights,

Not according to my definition of 'monitor' - I'm only talking about
monitoring behavior and looking for abusive patterns, not examining content.

 net neutrality,

Irrelevant...

 If they monitor traffic, they become liable for everything illegal
 that is passed.

I think they *should* be liable for all of the botnets spewing filth
from their networks - and since I agree they shouldn't be examining
*content*, as long as they aren't they wouldn't be liable for it.

 At the very least, if an ISP blocks port 25, then a simple phone call
 should allow this to be unblocked.

If they want to place you in the 'commercial' (for lack of a better
word) subnet for free, I have no problem with that. But the *default*
for residential service should be to block port 25.

Anyway, enough said on the subject, I don't imagine the above will
change anyone's mind...


Re: Is such an SSL attack possible against Postfix?

2010-07-21 Thread Stan Hoeppner
Charles Marcus put forth on 7/21/2010 7:46 AM:
 Jonathan Tripathy wrote:
 Port 25 outgoing will be blocked by most ISPs
 
 This may be the case in your country, but from where I'm from, I've
 never had a problem sending out on port 25, even on home residental
 ISPs :)
 
 Any ISP that does *not* block port 25 for residential service is a part
 of the spam/zombie problem, and if yours doesn't, you should complain,
 loudly if necessary, and encourage them to block it.

Complain that TCP 25 blocking should be the _default_ policy at either the
$access_concentrator or CPE, but not the _only_ policy.  A customer request to
open TCP 25 should be honored, and there should be an online form and
automatic process to open it instantly upon such a customer request.

Consumer choice is something many in the developed world consider to be a
right more than a side effect of capitalism.  Consumers should have the right
to run their own MX/outbound on their broadband connection if they so choose,
and they shouldn't be required to use their ISP's submission servers if they
prefer to send SMTP directly.

-- 
Stan