Re: thanks to thinking people.

2010-07-24 Thread Brian Godette

 On 7/20/2010 1:01 PM, Ted Mittelstaedt wrote:


You are mistaken.  I'm a proponent of port 25 blocks.  What I
am saying is that port 25 blocks work far better than attempting to
spamfilter outbound mail.  It is the other guy who is arguing that
spamfiltering outbound mail is better than port 25 blocks.

Ted

 You need to actually read what I'm writing instead of skimming. The 
subjects being discussed are outbound mail from your own MTA, not 
joe-user's IP address, your own mail server's IP address. How internal 
and/or authenticated users with an infection can cause your MTA to end 
up on blacklists (especially trap fed) regardless of your rate based 
tripwires/log scanning. And how dumb-bots nearly never send outbound (to 
the rest of the world) through your MTA, only the smarter ones that can 
use SMTP-AUTH usually do that. That all leads to needing something a bit 
more than log scanning and rate limiting.


Again, blocking outbound 25 from everything but your own MTA is all well 
and good for containing internal outbreaks from causing everyone else 
grief, but it has little impact on keeping your own MTA clean.


Re: thanks to thinking people.

2010-07-24 Thread Brian Godette

 On 7/22/2010 2:23 PM, Ted Mittelstaedt wrote:



On 7/22/2010 11:29 AM, Benny Pedersen wrote:

On tor 22 jul 2010 20:03:18 CEST, Charles Gregory wrote

A forged sender looks no different than a legitimate sender. Postfix
would have no way to be 'smart' about this (except for some instances
of SPF fail, but then why 'bounce'? Why not reject?).


and why not show logs ?

bounces is newer external since postfix change sender to mailer-daemon
with will end in some mailbox local if it was sent from local ip, if it
sent remotely its just a reject that makes the remote mta do the bounce,
but it will be the same that happend remotely when it bounces

if bounces go external then the mta is not configured correct, and it
can be other reasons it does bounce then just not used a reject



Nonsense.

You have internal users.

They are using auth-smtp.

One of those internal users is running a laptop

He takes laptop to starflucks and joins the wireless

He sends mail through your server.

How exactly does Postfix know that he is an internal
user.

Spammer in the wild sees a mail from your user with a
senders address of ilovec...@example.com originating
from your smtp-auth system

Spammer in the wild guesses user is using a UID of
ilovecats and a password of pussy

Spammer in wild authenticates into your auth-smtp
server and spams the world with a forged senders
address.

How exactly does Postfix know the difference between
Spammer and the internal user on the laptop at Starflucks?

The notion of bouncing mail to inside users is a joke.

Ted



You don't BOUNCE you SMTP REJECT. No DSNs, no backscatter, and any FP 
from a legit user ends up with a support call to the correct party. If 
the outbound message does not exceed your SMTP REJECT level you let it 
go out WITHOUT MODIFICATION, no markup, no nothing.


Re: thanks to thinking people.

2010-07-22 Thread Benny Pedersen

On ons 21 jul 2010 19:09:55 CEST, Alexandre Chapellon wrote

You can have forged return-path and /or stollen credentials... in both
cases you look like a backscatter source.


show logs

i belive postfix is smart to change forged sender to something that is  
not fqdn before it bounce :)


--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



Re: thanks to thinking people.

2010-07-22 Thread Charles Gregory

On Thu, 22 Jul 2010, Benny Pedersen wrote:

On ons 21 jul 2010 19:09:55 CEST, Alexandre Chapellon wrote

You can have forged return-path and /or stollen credentials... in both
cases you look like a backscatter source.
i belive postfix is smart to change forged sender to something that is 
not fqdn before it bounce :)


A forged sender looks no different than a legitimate sender. Postfix would 
have no way to be 'smart' about this (except for some instances of SPF 
fail, but then why 'bounce'? Why not reject?).


- C


Re: thanks to thinking people.

2010-07-22 Thread Benny Pedersen

On tor 22 jul 2010 20:03:18 CEST, Charles Gregory wrote
A forged sender looks no different than a legitimate sender. Postfix  
would have no way to be 'smart' about this (except for some  
instances of SPF fail, but then why 'bounce'? Why not reject?).


and why not show logs ?

bounces is newer external since postfix change sender to mailer-daemon  
with will end in some mailbox local if it was sent from local ip, if  
it sent remotely its just a reject that makes the remote mta do the  
bounce, but it will be the same that happend remotely when it bounces


if bounces go external then the mta is not configured correct, and it  
can be other reasons it does bounce then just not used a reject


--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



Re: [sa] Re: thanks to thinking people.

2010-07-22 Thread Charles Gregory

On Thu, 22 Jul 2010, Benny Pedersen wrote:

On tor 22 jul 2010 20:03:18 CEST, Charles Gregory wrote
A forged sender looks no different than a legitimate sender. Postfix would 
have no way to be 'smart' about this (except for some instances of SPF 
fail, but then why 'bounce'? Why not reject?).


and why not show logs ?


Sorry. Not OP. Just noting that the opinion that postfix should be smart 
enough to rewrite a forged sender just doesn't make sense.


bounces is newer external since postfix change sender to mailer-daemon with 
will end in some mailbox local if it was sent from local ip


 Postfix doesn't change the sender. Mailer Daemon is the 'sender' for 
all buonces. But it will be sent TO the original sender listed in the 
'From' header. If postfix has generated the From header based on 
transaction authentication, then a 'bounce' would indeed go back to the 
originating mail account. But if you are merely going by IP, then the 
'sender' that postfix tries to 'bounce' mail to will be the forged sender. 
And postfix has no way to know it is forged


- C


Re: thanks to thinking people.

2010-07-22 Thread Ted Mittelstaedt



On 7/22/2010 11:03 AM, Charles Gregory wrote:

On Thu, 22 Jul 2010, Benny Pedersen wrote:

On ons 21 jul 2010 19:09:55 CEST, Alexandre Chapellon wrote

You can have forged return-path and /or stollen credentials... in both
cases you look like a backscatter source.

i belive postfix is smart to change forged sender to something that is
not fqdn before it bounce :)


A forged sender looks no different than a legitimate sender. Postfix
would have no way to be 'smart' about this (except for some instances of
SPF fail, but then why 'bounce'? Why not reject?).



Wash your mouth out!  Didn't you know Postfix is God's Gift to Mail 
Admins?  It can do ANYTHING.  Postfix is so smart that it can reach back 
through the SMTP connection to the spammer and blow his computer

up!!!


Or so the Postfix bigots would have you believe.

Ted


Re: thanks to thinking people.

2010-07-22 Thread Ted Mittelstaedt



On 7/22/2010 11:29 AM, Benny Pedersen wrote:

On tor 22 jul 2010 20:03:18 CEST, Charles Gregory wrote

A forged sender looks no different than a legitimate sender. Postfix
would have no way to be 'smart' about this (except for some instances
of SPF fail, but then why 'bounce'? Why not reject?).


and why not show logs ?

bounces is newer external since postfix change sender to mailer-daemon
with will end in some mailbox local if it was sent from local ip, if it
sent remotely its just a reject that makes the remote mta do the bounce,
but it will be the same that happend remotely when it bounces

if bounces go external then the mta is not configured correct, and it
can be other reasons it does bounce then just not used a reject



Nonsense.

You have internal users.

They are using auth-smtp.

One of those internal users is running a laptop

He takes laptop to starflucks and joins the wireless

He sends mail through your server.

How exactly does Postfix know that he is an internal
user.

Spammer in the wild sees a mail from your user with a
senders address of ilovec...@example.com originating
from your smtp-auth system

Spammer in the wild guesses user is using a UID of
ilovecats and a password of pussy

Spammer in wild authenticates into your auth-smtp
server and spams the world with a forged senders
address.

How exactly does Postfix know the difference between
Spammer and the internal user on the laptop at Starflucks?

The notion of bouncing mail to inside users is a joke.

Ted


Re: thanks to thinking people.

2010-07-22 Thread Alexandre Chapellon
Thanks Ted for that example i could not have wrote in english myself.

Le jeudi 22 juillet 2010 à 13:23 -0700, Ted Mittelstaedt a écrit :

 
 On 7/22/2010 11:29 AM, Benny Pedersen wrote:
  On tor 22 jul 2010 20:03:18 CEST, Charles Gregory wrote
  A forged sender looks no different than a legitimate sender. Postfix
  would have no way to be 'smart' about this (except for some instances
  of SPF fail, but then why 'bounce'? Why not reject?).
 
  and why not show logs ?
 
  bounces is newer external since postfix change sender to mailer-daemon
  with will end in some mailbox local if it was sent from local ip, if it
  sent remotely its just a reject that makes the remote mta do the bounce,
  but it will be the same that happend remotely when it bounces
 
  if bounces go external then the mta is not configured correct, and it
  can be other reasons it does bounce then just not used a reject
 
 
 Nonsense.
 
 You have internal users.
 
 They are using auth-smtp.
 
 One of those internal users is running a laptop
 
 He takes laptop to starflucks and joins the wireless
 
 He sends mail through your server.
 
 How exactly does Postfix know that he is an internal
 user.
 
 Spammer in the wild sees a mail from your user with a
 senders address of ilovec...@example.com originating
 from your smtp-auth system
 
 Spammer in the wild guesses user is using a UID of
 ilovecats and a password of pussy
 
 Spammer in wild authenticates into your auth-smtp
 server and spams the world with a forged senders
 address.
 
 How exactly does Postfix know the difference between
 Spammer and the internal user on the laptop at Starflucks?
 
 The notion of bouncing mail to inside users is a joke.
 
 Ted


-- 
Alexandre Chapellon alexandre.chapel...@mana.pf
Mana SAS


Re: thanks to thinking people.

2010-07-21 Thread Matus UHLAR - fantomas
 On 20.07.10 00:48, RW wrote:
 I was asking what's the point of adding headers or markup  that *is*
 seen by the recipient.

 On 7/20/2010 4:55 AM, Matus UHLAR - fantomas wrote:
 I think Brian understood youre question as disagreement :)

 I think there's no logical point. In case of FP you are only telling the
 recipient your spam filter sucks :)

On 20.07.10 11:16, Ted Mittelstaedt wrote:
 Exactly, meaning that if you run SA on outbound mail then there's no
 point at all unless you configure it to DELETE the outbound mail it
 thinks is spam - and if you do that your going to get shot by your users
 over the FPs.

I think that at this level by outgoing email we mean email coming from
authenticated users. Such e-mail we can reject at smtp time so the users
will get proper error message.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
I drive way too fast to worry about cholesterol. 


Re: thanks to thinking people.

2010-07-21 Thread Alexandre Chapellon
Le mardi 20 juillet 2010 à 18:56 -0600, LuKreme a écrit :

 On Jul 20, 2010, at 18:07, Alexandre Chapellon alexandre.chapel...@mana.pf 
 wrote:
 
  Bouncing spam?? What a good way to become a backscatter source (in 
  addition to spam)!
 
 We are talking about Checking OUTBOUND messages. It is perfectly ok to bounce 
 internal messages. 

You can have forged return-path and /or stollen credentials... in both
cases you look like a backscatter source.

-- 
Alexandre Chapellon alexandre.chapel...@mana.pf
Mana SAS


Re: thanks to thinking people.

2010-07-20 Thread Matus UHLAR - fantomas
   On Mon, 19 Jul 2010 13:25:26 -0700
   Ted Mittelstaedtt...@ipinc.net  wrote:
   It's been our experience that spam-scanning outbound mail causes a
   lot more problems than setting up mailserver monitoring and being
   responsive to it.  Sooner or later one of your customers is going
   to call you and bitch because their mail ended up in their
   coorespondents spam folder due to them using HTML or including a
   bad URL and if it was your server that tagged it spam,

On 7/19/2010 4:01 PM, RW wrote:
   What's the point of adding spam-filtering headers or markup to
   outgoing mail?

 On Mon, 19 Jul 2010 16:58:49 -0600
 Brian Godette bgode...@idcomm.com wrote:
  Indeed, the point would be to score and SMTP reject outbound over
  some score, anything under would be sent unmodified.

On 20.07.10 00:48, RW wrote:
 I was asking what's the point of adding headers or markup  that *is*
 seen by the recipient.

I think Brian understood youre question as disagreement :)

I think there's no logical point. In case of FP you are only telling the
recipient your spam filter sucks :)

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Eagles may soar, but weasels don't get sucked into jet engines. 


Re: thanks to thinking people.

2010-07-20 Thread Ted Mittelstaedt



On 7/19/2010 3:55 PM, Brian Godette wrote:

On 7/19/2010 2:25 PM, Ted Mittelstaedt wrote:



On 7/19/2010 12:56 PM, Brian Godette wrote:

On 7/19/2010 1:29 PM, Ted Mittelstaedt wrote:



On 7/19/2010 8:43 AM, Brian Godette wrote:

On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:

Hi all,

Few months ago I asked this list if using SA on outgoing smtp was a
good idea (Thread: SA on outgoing SMTP).
This thread quickly moved to Block direct port 25 for non-mta users!
I was really afraid of doing so and didn't really wanted to go this
way.
now about 6 months later I have to say: I was a fool! Today.
After spending some time trying to find a more user-friendly way to
clean up the mess around here, I came to the conclusion that port 25
blocking on the bound of my network was inevitable.
Today it's done, and I have followed few others advices given on
list.
I wanted to testify the benfits of good designed network for thoose
who like me are afrais of annying customer with security (even more
blocking port 25 on the limits of the network is not really annoying
for most of customers).

Thanks to Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
help dudes, all I have to care about now is my mailservers
configuration!

--
Alexandre Chapellon alexandre.chapel...@mana.pf
mailto:alexandre.chapel...@mana.pf
Mana SAS



I hope you realize you still need to deal with the issues of users
with
weak/guessable passwords and phishing of account info as well as the
newer bots that recover account info from Outlook/Outlook
Express/Thunderbird.

Blocking outbound 25 from the rest of your network, and disallowing
submission to your MX on 25 from your network, does very little for
keeping your own MX from sending spam which is what SA on outgoing
SMTP
would be for. It's great from a policy standpoint and contains the
simple bots, but for keeping your outbound from MX clean, not so
much.



That absolutely isn't true. Yes I agree that it's possible for a
spammer to write a virus that uses the submission port and
authenticated SMTP to send mail and runs on a user's PC. But if your
running even a simple log analysis script on your mailserver and you
READ the daily reports from it, then a user that sends many tens to
hundreds of thousands of e-mails will stick out like a sore thumb.

We have NEVER had a spammer do this to one of our users. I don't know
why because it seems to me like it's an obvious way to relay spam. What
we HAVE had happen is spammers guess weak passwords and relay spam
through the webmail interface. My guess is that it's just a lot
easier to do this for them. Of course, when they do that their outgoing
spam is stamped with the username that was used to relay, and it's
very easy to detect and change the password.

So far, all the spam viruses we have encountered on user systems are
of the variety where they infect the client and attempt to relay to
port 25.

Ted


So basically you're agreeing with what I said. It stops the simple bots,
but the other stuff, not so much.



No, you said it does very little and I said it only does very little
in THEORY, but in actual practice (right now) it does a tremendous
amount.


In actual practice it does very little for YOUR OWN MX, the simple bots
simply do not target internal mail servers, they send direct. Which is
why I said it's good from a policy standpoint but does nothing to
actually prevent YOUR OWN MX from ending up on an RBL because all the
bots that can do that don't care that you've got outbound 25 from your
internal network blocked.



Last I checked RBL's worked off IP addresses not MX's.  If joe schmoe
on some other network has a bot that's sending with my MX forged then
I'm not going to end up in an RBL.  If I have a customer with a bot on
it then that bot isn't going to be able to send since I block outbound
port 25 and virtually all bots only send via 25, not the submission
port (using auth) except for a few that will attack via a webmail
interface.



I won't rule out that the spammers won't become smarter but right now
they are stupid. I guess there's just too many wide-open servers still
out there for them to bother trying to get around one that's been
tightened down.


I've seen bots use smtp-auth from inside, whether it's by injecting into
O/OE or recovered auth I can't say. I've seen bots use webmail as you
have, I've also seen them use smtp-auth vs submission/ssl (587/495). But
again, that's only after they've either guessed or phished the account
info. In either case you're still left with having to scan outbound from
your own MX, and/or rate limit, or accept being RBL'd for short periods
of time being reactive to log analysis and spam reports.


If you keep on top of the logs then you won't generally be RBLed. And
you can run a monitoring program like Big Sister and with a bit of
scripting you can be notifed when your server starts spamming.
Out-of-the-box the SMTP monitor in Big Sister will alarm if the
mailserver starts slowing down - which 

Re: thanks to thinking people.

2010-07-20 Thread Ted Mittelstaedt



On 7/20/2010 4:55 AM, Matus UHLAR - fantomas wrote:

On Mon, 19 Jul 2010 13:25:26 -0700
Ted Mittelstaedtt...@ipinc.net   wrote:

It's been our experience that spam-scanning outbound mail causes a
lot more problems than setting up mailserver monitoring and being
responsive to it.  Sooner or later one of your customers is going
to call you and bitch because their mail ended up in their
coorespondents spam folder due to them using HTML or including a
bad URL and if it was your server that tagged it spam,



   On 7/19/2010 4:01 PM, RW wrote:

What's the point of adding spam-filtering headers or markup to
outgoing mail?



On Mon, 19 Jul 2010 16:58:49 -0600
Brian Godettebgode...@idcomm.com  wrote:

Indeed, the point would be to score and SMTP reject outbound over
some score, anything under would be sent unmodified.


On 20.07.10 00:48, RW wrote:

I was asking what's the point of adding headers or markup  that *is*
seen by the recipient.


I think Brian understood youre question as disagreement :)

I think there's no logical point. In case of FP you are only telling the
recipient your spam filter sucks :)



Exactly, meaning that if you run SA on outbound mail then there's no
point at all unless you configure it to DELETE the outbound mail it
thinks is spam - and if you do that your going to get shot by your users
over the FPs.

Ted


Re: thanks to thinking people.

2010-07-20 Thread Alexandre Chapellon
You argue about the fficiency of blicking network flow like we do
But beyond argue they are simples facts: 

Before I introduce port 25 blocking I had more than 200 feedback loop
complaints daily from differents MSP (Yahoo, AOL, abusix and others).
Since blocking is enabled it  I have have less than 50. Half of which
are from user that are not blocked already, and 30 others percents are
from my users who don't know to manage subscription list (let's say my
very own spammers).
I know it doesn't mean I do not spam at all right now But what I
know it means is that now I have much more control on what's going out
of my network.

Scanning outgoing mails throug ANY content scanning is dangerous because
of FP (except viral analysis maybe which produce very few FP). Further
more if you compare the amount of ressources spent with the amount of
spams stopped, networks ACL are much more efficicent than  ANY spam
filter configured to avoid FP!

Anyway, everyone here knows you can't fight spam with one single weapon
(there's no Hiroshima in this war). You need to protect your people, and
SA is good at it but you also need to make sure you're not yourself part
of the dark side... If everyone cares, we get a cleaner network.

Le mardi 20 juillet 2010 à 10:52 -0700, Ted Mittelstaedt a écrit :

 
 On 7/19/2010 3:55 PM, Brian Godette wrote:
  On 7/19/2010 2:25 PM, Ted Mittelstaedt wrote:
 
 
  On 7/19/2010 12:56 PM, Brian Godette wrote:
  On 7/19/2010 1:29 PM, Ted Mittelstaedt wrote:
 
 
  On 7/19/2010 8:43 AM, Brian Godette wrote:
  On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:
  Hi all,
 
  Few months ago I asked this list if using SA on outgoing smtp was a
  good idea (Thread: SA on outgoing SMTP).
  This thread quickly moved to Block direct port 25 for non-mta users!
  I was really afraid of doing so and didn't really wanted to go this
  way.
  now about 6 months later I have to say: I was a fool! Today.
  After spending some time trying to find a more user-friendly way to
  clean up the mess around here, I came to the conclusion that port 25
  blocking on the bound of my network was inevitable.
  Today it's done, and I have followed few others advices given on
  list.
  I wanted to testify the benfits of good designed network for thoose
  who like me are afrais of annying customer with security (even more
  blocking port 25 on the limits of the network is not really annoying
  for most of customers).
 
  Thanks to Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
  help dudes, all I have to care about now is my mailservers
  configuration!
 
  --
  Alexandre Chapellon alexandre.chapel...@mana.pf
  mailto:alexandre.chapel...@mana.pf
  Mana SAS
 
 
  I hope you realize you still need to deal with the issues of users
  with
  weak/guessable passwords and phishing of account info as well as the
  newer bots that recover account info from Outlook/Outlook
  Express/Thunderbird.
 
  Blocking outbound 25 from the rest of your network, and disallowing
  submission to your MX on 25 from your network, does very little for
  keeping your own MX from sending spam which is what SA on outgoing
  SMTP
  would be for. It's great from a policy standpoint and contains the
  simple bots, but for keeping your outbound from MX clean, not so
  much.
 
 
  That absolutely isn't true. Yes I agree that it's possible for a
  spammer to write a virus that uses the submission port and
  authenticated SMTP to send mail and runs on a user's PC. But if your
  running even a simple log analysis script on your mailserver and you
  READ the daily reports from it, then a user that sends many tens to
  hundreds of thousands of e-mails will stick out like a sore thumb.
 
  We have NEVER had a spammer do this to one of our users. I don't know
  why because it seems to me like it's an obvious way to relay spam. What
  we HAVE had happen is spammers guess weak passwords and relay spam
  through the webmail interface. My guess is that it's just a lot
  easier to do this for them. Of course, when they do that their outgoing
  spam is stamped with the username that was used to relay, and it's
  very easy to detect and change the password.
 
  So far, all the spam viruses we have encountered on user systems are
  of the variety where they infect the client and attempt to relay to
  port 25.
 
  Ted
 
  So basically you're agreeing with what I said. It stops the simple bots,
  but the other stuff, not so much.
 
 
  No, you said it does very little and I said it only does very little
  in THEORY, but in actual practice (right now) it does a tremendous
  amount.
 
  In actual practice it does very little for YOUR OWN MX, the simple bots
  simply do not target internal mail servers, they send direct. Which is
  why I said it's good from a policy standpoint but does nothing to
  actually prevent YOUR OWN MX from ending up on an RBL because all the
  bots that can do that don't care that you've got outbound 25 from your
  internal network blocked.
 
 
 

Re: thanks to thinking people.

2010-07-20 Thread Ted Mittelstaedt


You are mistaken.  I'm a proponent of port 25 blocks.  What I
am saying is that port 25 blocks work far better than attempting to
spamfilter outbound mail.  It is the other guy who is arguing that
spamfiltering outbound mail is better than port 25 blocks.

Ted

On 7/20/2010 11:46 AM, Alexandre Chapellon wrote:

You argue about the fficiency of blicking network flow like we do
But beyond argue they are simples facts:

Before I introduce port 25 blocking I had more than 200 feedback loop
complaints daily from differents MSP (Yahoo, AOL, abusix and others).
Since blocking is enabled it  I have have less than 50. Half of which
are from user that are not blocked already, and 30 others percents are
from my users who don't know to manage subscription list (let's say my
very own spammers).
I know it doesn't mean I do not spam at all right now But what I
know it means is that now I have much more control on what's going out
of my network.

Scanning outgoing mails throug ANY content scanning is dangerous because
of FP (except viral analysis maybe which produce very few FP). Further
more if you compare the amount of ressources spent with the amount of
spams stopped, networks ACL are much more efficicent than  ANY spam
filter configured to avoid FP!

Anyway, everyone here knows you can't fight spam with one single weapon
(there's no Hiroshima in this war). You need to protect your people, and
SA is good at it but you also need to make sure you're not yourself part
of the dark side... If everyone cares, we get a cleaner network.

Le mardi 20 juillet 2010 à 10:52 -0700, Ted Mittelstaedt a écrit :



On 7/19/2010 3:55 PM, Brian Godette wrote:

On 7/19/2010 2:25 PM, Ted Mittelstaedt wrote:



On 7/19/2010 12:56 PM, Brian Godette wrote:

On 7/19/2010 1:29 PM, Ted Mittelstaedt wrote:



On 7/19/2010 8:43 AM, Brian Godette wrote:

On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:

Hi all,

Few months ago I asked this list if using SA on outgoing smtp was a
good idea (Thread: SA on outgoing SMTP).
This thread quickly moved to Block direct port 25 for non-mta users!
I was really afraid of doing so and didn't really wanted to go this
way.
now about 6 months later I have to say: I was a fool! Today.
After spending some time trying to find a more user-friendly way to
clean up the mess around here, I came to the conclusion that port 25
blocking on the bound of my network was inevitable.
Today it's done, and I have followed few others advices given on
list.
I wanted to testify the benfits of good designed network for thoose
who like me are afrais of annying customer with security (even more
blocking port 25 on the limits of the network is not really annoying
for most of customers).

Thanks to Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
help dudes, all I have to care about now is my mailservers
configuration!

--
Alexandre Chapellonalexandre.chapel...@mana.pf
mailto:alexandre.chapel...@mana.pf
Mana SAS



I hope you realize you still need to deal with the issues of users
with
weak/guessable passwords and phishing of account info as well as the
newer bots that recover account info from Outlook/Outlook
Express/Thunderbird.

Blocking outbound 25 from the rest of your network, and disallowing
submission to your MX on 25 from your network, does very little for
keeping your own MX from sending spam which is what SA on outgoing
SMTP
would be for. It's great from a policy standpoint and contains the
simple bots, but for keeping your outbound from MX clean, not so
much.



That absolutely isn't true. Yes I agree that it's possible for a
spammer to write a virus that uses the submission port and
authenticated SMTP to send mail and runs on a user's PC. But if your
running even a simple log analysis script on your mailserver and you
READ the daily reports from it, then a user that sends many tens to
hundreds of thousands of e-mails will stick out like a sore thumb.

We have NEVER had a spammer do this to one of our users. I don't know
why because it seems to me like it's an obvious way to relay spam. What
we HAVE had happen is spammers guess weak passwords and relay spam
through the webmail interface. My guess is that it's just a lot
easier to do this for them. Of course, when they do that their outgoing
spam is stamped with the username that was used to relay, and it's
very easy to detect and change the password.

So far, all the spam viruses we have encountered on user systems are
of the variety where they infect the client and attempt to relay to
port 25.

Ted


So basically you're agreeing with what I said. It stops the simple bots,
but the other stuff, not so much.



No, you said it does very little and I said it only does very little
in THEORY, but in actual practice (right now) it does a tremendous
amount.


In actual practice it does very little for YOUR OWN MX, the simple bots
simply do not target internal mail servers, they send direct. Which is
why I said it's good from a policy standpoint but does nothing to

Re: thanks to thinking people.

2010-07-20 Thread Alexandre Chapellon
Sorry it was not directly for you, but more like a general post.

Le mardi 20 juillet 2010 à 12:01 -0700, Ted Mittelstaedt a écrit :

 You are mistaken.  I'm a proponent of port 25 blocks.  What I
 am saying is that port 25 blocks work far better than attempting to
 spamfilter outbound mail.  It is the other guy who is arguing that
 spamfiltering outbound mail is better than port 25 blocks.
 
 Ted
 
 On 7/20/2010 11:46 AM, Alexandre Chapellon wrote:
  You argue about the fficiency of blicking network flow like we do
  But beyond argue they are simples facts:
 
  Before I introduce port 25 blocking I had more than 200 feedback loop
  complaints daily from differents MSP (Yahoo, AOL, abusix and others).
  Since blocking is enabled it  I have have less than 50. Half of which
  are from user that are not blocked already, and 30 others percents are
  from my users who don't know to manage subscription list (let's say my
  very own spammers).
  I know it doesn't mean I do not spam at all right now But what I
  know it means is that now I have much more control on what's going out
  of my network.
 
  Scanning outgoing mails throug ANY content scanning is dangerous because
  of FP (except viral analysis maybe which produce very few FP). Further
  more if you compare the amount of ressources spent with the amount of
  spams stopped, networks ACL are much more efficicent than  ANY spam
  filter configured to avoid FP!
 
  Anyway, everyone here knows you can't fight spam with one single weapon
  (there's no Hiroshima in this war). You need to protect your people, and
  SA is good at it but you also need to make sure you're not yourself part
  of the dark side... If everyone cares, we get a cleaner network.
 
  Le mardi 20 juillet 2010 à 10:52 -0700, Ted Mittelstaedt a écrit :
 
 
  On 7/19/2010 3:55 PM, Brian Godette wrote:
  On 7/19/2010 2:25 PM, Ted Mittelstaedt wrote:
 
 
  On 7/19/2010 12:56 PM, Brian Godette wrote:
  On 7/19/2010 1:29 PM, Ted Mittelstaedt wrote:
 
 
  On 7/19/2010 8:43 AM, Brian Godette wrote:
  On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:
  Hi all,
 
  Few months ago I asked this list if using SA on outgoing smtp was a
  good idea (Thread: SA on outgoing SMTP).
  This thread quickly moved to Block direct port 25 for non-mta users!
  I was really afraid of doing so and didn't really wanted to go this
  way.
  now about 6 months later I have to say: I was a fool! Today.
  After spending some time trying to find a more user-friendly way to
  clean up the mess around here, I came to the conclusion that port 25
  blocking on the bound of my network was inevitable.
  Today it's done, and I have followed few others advices given on
  list.
  I wanted to testify the benfits of good designed network for thoose
  who like me are afrais of annying customer with security (even more
  blocking port 25 on the limits of the network is not really annoying
  for most of customers).
 
  Thanks to Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
  help dudes, all I have to care about now is my mailservers
  configuration!
 
  --
  Alexandre Chapellonalexandre.chapel...@mana.pf
  mailto:alexandre.chapel...@mana.pf
  Mana SAS
 
 
  I hope you realize you still need to deal with the issues of users
  with
  weak/guessable passwords and phishing of account info as well as the
  newer bots that recover account info from Outlook/Outlook
  Express/Thunderbird.
 
  Blocking outbound 25 from the rest of your network, and disallowing
  submission to your MX on 25 from your network, does very little for
  keeping your own MX from sending spam which is what SA on outgoing
  SMTP
  would be for. It's great from a policy standpoint and contains the
  simple bots, but for keeping your outbound from MX clean, not so
  much.
 
 
  That absolutely isn't true. Yes I agree that it's possible for a
  spammer to write a virus that uses the submission port and
  authenticated SMTP to send mail and runs on a user's PC. But if your
  running even a simple log analysis script on your mailserver and you
  READ the daily reports from it, then a user that sends many tens to
  hundreds of thousands of e-mails will stick out like a sore thumb.
 
  We have NEVER had a spammer do this to one of our users. I don't know
  why because it seems to me like it's an obvious way to relay spam. What
  we HAVE had happen is spammers guess weak passwords and relay spam
  through the webmail interface. My guess is that it's just a lot
  easier to do this for them. Of course, when they do that their outgoing
  spam is stamped with the username that was used to relay, and it's
  very easy to detect and change the password.
 
  So far, all the spam viruses we have encountered on user systems are
  of the variety where they infect the client and attempt to relay to
  port 25.
 
  Ted
 
  So basically you're agreeing with what I said. It stops the simple bots,
  but the other stuff, not so much.
 
 
  No, you said it does very little and I 

Re: thanks to thinking people.

2010-07-20 Thread LuKreme
On Jul 20, 2010, at 12:16, Ted Mittelstaedt t...@ipinc.net wrote:

 Exactly, meaning that if you run SA on outbound mail then there's no
 point at all unless you configure it to DELETE the outbound mail it
 thinks is spam - and if you do that your going to get shot by your users
 over the FPs.

Well, no. If you do filter outbound and trigger on a spammy message, you bounce 
it, not delete it. 



Re: thanks to thinking people.

2010-07-20 Thread Alexandre Chapellon
Le mardi 20 juillet 2010 à 14:40 -0600, LuKreme a écrit :

 On Jul 20, 2010, at 12:16, Ted Mittelstaedt t...@ipinc.net wrote:
 
  Exactly, meaning that if you run SA on outbound mail then there's no
  point at all unless you configure it to DELETE the outbound mail it
  thinks is spam - and if you do that your going to get shot by your users
  over the FPs.
 
 Well, no. If you do filter outbound and trigger on a spammy message, you 
 bounce it, not delete it. 
 

Bouncing spam?? What a good way to become a backscatter source (in
addition to spam)!

Definately not to be done!
-- 
Alexandre Chapellon alexandre.chapel...@mana.pf
Mana SAS


Re: thanks to thinking people.

2010-07-20 Thread LuKreme
On Jul 20, 2010, at 18:07, Alexandre Chapellon alexandre.chapel...@mana.pf 
wrote:

 Bouncing spam?? What a good way to become a backscatter source (in 
 addition to spam)!

We are talking about Checking OUTBOUND messages. It is perfectly ok to bounce 
internal messages. 

Re: thanks to thinking people.

2010-07-20 Thread John Hardin

On Tue, 20 Jul 2010, Alexandre Chapellon wrote:


Le mardi 20 juillet 2010 ?? 14:40 -0600, LuKreme a ??crit :


On Jul 20, 2010, at 12:16, Ted Mittelstaedt t...@ipinc.net wrote:

Exactly, meaning that if you run SA on outbound mail then there's no 
point at all unless you configure it to DELETE the outbound mail it 
thinks is spam - and if you do that your going to get shot by your 
users over the FPs.


Well, no. If you do filter outbound and trigger on a spammy message, 
you bounce it, not delete it.


Bouncing spam?? What a good way to become a backscatter source (in
addition to spam)!

Definately not to be done!


Bounce _internally_, on _outbound_ email.

--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
 Today: the 41st anniversary of Apollo 11 landing on the Moon

Re: [sa] Re: thanks to thinking people.

2010-07-20 Thread Charles Gregory

On Tue, 20 Jul 2010, LuKreme wrote:
We are talking about Checking OUTBOUND messages. It is perfectly ok to 
bounce internal messages.


Caveat: As long as proper care is taken to send the bounce to the 
authenticated sender of the mail and NOT just lamely use the 'From' 
header! Still prefer an SMTP reject over a bounce!


- C


Re: thanks to thinking people.

2010-07-19 Thread Brian Godette

 On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:

Hi all,

Few months ago I asked this list if using SA on outgoing smtp was a 
good idea (Thread: SA on outgoing SMTP).

This thread quickly  moved to Block direct port 25 for non-mta users!
I was really afraid  of doing so and didn't really wanted to go this way.
now about 6 months later I have to say: I was a fool! Today.
After spending some time trying to find a more user-friendly way to 
clean up the mess around here, I came to the conclusion that port 25 
blocking on the bound of my network was inevitable.
Today it's done, and I have followed few others advices given on list. 
I wanted to testify the benfits of good designed network for thoose 
who like me are afrais of annying customer with security (even more 
blocking port 25 on the limits of the network is not really annoying 
for most of customers).


Thanks to  Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your 
help dudes, all I have to care about now is my mailservers configuration!


--
Alexandre Chapellon alexandre.chapel...@mana.pf 
mailto:alexandre.chapel...@mana.pf

Mana SAS



I hope you realize you still need to deal with the issues of users with 
weak/guessable passwords and phishing of account info as well as the 
newer bots that recover account info from Outlook/Outlook 
Express/Thunderbird.


Blocking outbound 25 from the rest of your network, and disallowing 
submission to your MX on 25 from your network, does very little for 
keeping your own MX from sending spam which is what SA on outgoing SMTP 
would be for. It's great from a policy standpoint and contains the 
simple bots, but for keeping your outbound from MX clean, not so much.


Re: thanks to thinking people.

2010-07-19 Thread Toni Mueller

Hi,

On Mon, 19.07.2010 at 09:43:20 -0600, Brian Godette bgode...@idcomm.com wrote:
 I hope you realize you still need to deal with the issues of users
 with weak/guessable passwords and phishing of account info as well
 as the newer bots that recover account info from Outlook/Outlook
 Express/Thunderbird.

this is true, BUT

 Blocking outbound 25 from the rest of your network, and disallowing
 submission to your MX on 25 from your network, does very little for
 keeping your own MX from sending spam which is what SA on outgoing
 SMTP would be for. It's great from a policy standpoint and contains
 the simple bots, but for keeping your outbound from MX clean, not
 so much.

this measure makes it much easier to track down the spammers in your
userbase, because the sent emails usually contain a header like
X-Authenticated: joe-sixpack-with-his-can-of-worms.

Then you only have to verify that the spam report is legit, and then
can simply block this user's account until they have cleaned their PC.

Running SA on outbound is still a necessity, though.


Kind regards,
--Toni++



Re: thanks to thinking people.

2010-07-19 Thread Ted Mittelstaedt



On 7/19/2010 8:43 AM, Brian Godette wrote:

On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:

Hi all,

Few months ago I asked this list if using SA on outgoing smtp was a
good idea (Thread: SA on outgoing SMTP).
This thread quickly moved to Block direct port 25 for non-mta users!
I was really afraid of doing so and didn't really wanted to go this way.
now about 6 months later I have to say: I was a fool! Today.
After spending some time trying to find a more user-friendly way to
clean up the mess around here, I came to the conclusion that port 25
blocking on the bound of my network was inevitable.
Today it's done, and I have followed few others advices given on list.
I wanted to testify the benfits of good designed network for thoose
who like me are afrais of annying customer with security (even more
blocking port 25 on the limits of the network is not really annoying
for most of customers).

Thanks to Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
help dudes, all I have to care about now is my mailservers configuration!

--
Alexandre Chapellon alexandre.chapel...@mana.pf
mailto:alexandre.chapel...@mana.pf
Mana SAS



I hope you realize you still need to deal with the issues of users with
weak/guessable passwords and phishing of account info as well as the
newer bots that recover account info from Outlook/Outlook
Express/Thunderbird.

Blocking outbound 25 from the rest of your network, and disallowing
submission to your MX on 25 from your network, does very little for
keeping your own MX from sending spam which is what SA on outgoing SMTP
would be for. It's great from a policy standpoint and contains the
simple bots, but for keeping your outbound from MX clean, not so much.



That absolutely isn't true.  Yes I agree that it's possible for a 
spammer to write a virus that uses the submission port and authenticated 
SMTP to send mail and runs on a user's PC.  But if your running even a 
simple log analysis script on your mailserver and you READ the daily 
reports from it, then a user that sends many tens to hundreds of 
thousands of e-mails will stick out like a sore thumb.


We have NEVER had a spammer do this to one of our users.  I don't know
why because it seems to me like it's an obvious way to relay spam.  What
we HAVE had happen is spammers guess weak passwords and relay spam 
through the webmail interface.  My guess is that it's just a lot

easier to do this for them.  Of course, when they do that their outgoing
spam is stamped with the username that was used to relay, and it's very 
easy to detect and change the password.


So far, all the spam viruses we have encountered on user systems are
of the variety where they infect the client and attempt to relay to
port 25.

Ted


Re: thanks to thinking people.

2010-07-19 Thread Brian Godette

 On 7/19/2010 1:29 PM, Ted Mittelstaedt wrote:



On 7/19/2010 8:43 AM, Brian Godette wrote:

On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:

Hi all,

Few months ago I asked this list if using SA on outgoing smtp was a
good idea (Thread: SA on outgoing SMTP).
This thread quickly moved to Block direct port 25 for non-mta users!
I was really afraid of doing so and didn't really wanted to go this 
way.

now about 6 months later I have to say: I was a fool! Today.
After spending some time trying to find a more user-friendly way to
clean up the mess around here, I came to the conclusion that port 25
blocking on the bound of my network was inevitable.
Today it's done, and I have followed few others advices given on list.
I wanted to testify the benfits of good designed network for thoose
who like me are afrais of annying customer with security (even more
blocking port 25 on the limits of the network is not really annoying
for most of customers).

Thanks to Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
help dudes, all I have to care about now is my mailservers 
configuration!


--
Alexandre Chapellon alexandre.chapel...@mana.pf
mailto:alexandre.chapel...@mana.pf
Mana SAS



I hope you realize you still need to deal with the issues of users with
weak/guessable passwords and phishing of account info as well as the
newer bots that recover account info from Outlook/Outlook
Express/Thunderbird.

Blocking outbound 25 from the rest of your network, and disallowing
submission to your MX on 25 from your network, does very little for
keeping your own MX from sending spam which is what SA on outgoing SMTP
would be for. It's great from a policy standpoint and contains the
simple bots, but for keeping your outbound from MX clean, not so much.



That absolutely isn't true.  Yes I agree that it's possible for a 
spammer to write a virus that uses the submission port and 
authenticated SMTP to send mail and runs on a user's PC.  But if your 
running even a simple log analysis script on your mailserver and you 
READ the daily reports from it, then a user that sends many tens to 
hundreds of thousands of e-mails will stick out like a sore thumb.


We have NEVER had a spammer do this to one of our users.  I don't know
why because it seems to me like it's an obvious way to relay spam.  What
we HAVE had happen is spammers guess weak passwords and relay spam 
through the webmail interface.  My guess is that it's just a lot

easier to do this for them.  Of course, when they do that their outgoing
spam is stamped with the username that was used to relay, and it's 
very easy to detect and change the password.


So far, all the spam viruses we have encountered on user systems are
of the variety where they infect the client and attempt to relay to
port 25.

Ted

So basically you're agreeing with what I said. It stops the simple bots, 
but the other stuff, not so much.


I've seen bots use smtp-auth from inside, whether it's by injecting into 
O/OE or recovered auth I can't say. I've seen bots use webmail as you 
have, I've also seen them use smtp-auth vs submission/ssl (587/495). But 
again, that's only after they've either guessed or phished the account 
info. In either case you're still left with having to scan outbound from 
your own MX, and/or rate limit, or accept being RBL'd for short periods 
of time being reactive to log analysis and spam reports.


Re: thanks to thinking people.

2010-07-19 Thread Ted Mittelstaedt



On 7/19/2010 12:56 PM, Brian Godette wrote:

On 7/19/2010 1:29 PM, Ted Mittelstaedt wrote:



On 7/19/2010 8:43 AM, Brian Godette wrote:

On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:

Hi all,

Few months ago I asked this list if using SA on outgoing smtp was a
good idea (Thread: SA on outgoing SMTP).
This thread quickly moved to Block direct port 25 for non-mta users!
I was really afraid of doing so and didn't really wanted to go this
way.
now about 6 months later I have to say: I was a fool! Today.
After spending some time trying to find a more user-friendly way to
clean up the mess around here, I came to the conclusion that port 25
blocking on the bound of my network was inevitable.
Today it's done, and I have followed few others advices given on list.
I wanted to testify the benfits of good designed network for thoose
who like me are afrais of annying customer with security (even more
blocking port 25 on the limits of the network is not really annoying
for most of customers).

Thanks to Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
help dudes, all I have to care about now is my mailservers
configuration!

--
Alexandre Chapellon alexandre.chapel...@mana.pf
mailto:alexandre.chapel...@mana.pf
Mana SAS



I hope you realize you still need to deal with the issues of users with
weak/guessable passwords and phishing of account info as well as the
newer bots that recover account info from Outlook/Outlook
Express/Thunderbird.

Blocking outbound 25 from the rest of your network, and disallowing
submission to your MX on 25 from your network, does very little for
keeping your own MX from sending spam which is what SA on outgoing SMTP
would be for. It's great from a policy standpoint and contains the
simple bots, but for keeping your outbound from MX clean, not so much.



That absolutely isn't true. Yes I agree that it's possible for a
spammer to write a virus that uses the submission port and
authenticated SMTP to send mail and runs on a user's PC. But if your
running even a simple log analysis script on your mailserver and you
READ the daily reports from it, then a user that sends many tens to
hundreds of thousands of e-mails will stick out like a sore thumb.

We have NEVER had a spammer do this to one of our users. I don't know
why because it seems to me like it's an obvious way to relay spam. What
we HAVE had happen is spammers guess weak passwords and relay spam
through the webmail interface. My guess is that it's just a lot
easier to do this for them. Of course, when they do that their outgoing
spam is stamped with the username that was used to relay, and it's
very easy to detect and change the password.

So far, all the spam viruses we have encountered on user systems are
of the variety where they infect the client and attempt to relay to
port 25.

Ted


So basically you're agreeing with what I said. It stops the simple bots,
but the other stuff, not so much.



No, you said it does very little and I said it only does very little
in THEORY, but in actual practice (right now) it does a tremendous amount.

I won't rule out that the spammers won't become smarter but right now
they are stupid.  I guess there's just too many wide-open servers still
out there for them to bother trying to get around one that's been 
tightened down.



I've seen bots use smtp-auth from inside, whether it's by injecting into
O/OE or recovered auth I can't say. I've seen bots use webmail as you
have, I've also seen them use smtp-auth vs submission/ssl (587/495). But
again, that's only after they've either guessed or phished the account
info. In either case you're still left with having to scan outbound from
your own MX, and/or rate limit, or accept being RBL'd for short periods
of time being reactive to log analysis and spam reports.


If you keep on top of the logs then you won't generally be RBLed.  And 
you can run a monitoring program like Big Sister and with a bit of 
scripting you can be notifed when your server starts spamming. 
Out-of-the-box the SMTP monitor in Big Sister will alarm if the 
mailserver starts slowing down - which is customary when a spammer 
commences a large spam run.  But you can also write a script that runs 
once an hour

and monitors your mailflow and alarms if it jumps.  If your graphing
your mailflow then spam runs will create spikes that are very obvious.

It's been our experience that spam-scanning outbound mail causes a lot
more problems than setting up mailserver monitoring and being responsive
to it.  Sooner or later one of your customers is going to call you and
bitch because their mail ended up in their coorespondents spam folder 
due to them using HTML or including a bad URL and if it was your server

that tagged it spam, your going to be in a heap of trouble.  But if it's
your customer's recipient's mailserver then that admin will be in the
hotseat.  Sometimes even the spamassassin header addition, even if the
outbound mail ISN'T marked as spam, will trigger a spamfilter.  

Re: thanks to thinking people.

2010-07-19 Thread Matt
 Blocking outbound 25 from the rest of your network, and disallowing 
 submission to your MX on 25 from your network
, does very little for keeping your own MX from sending spam which is what SA 
on outgoing SMTP would be for.
 It's great from a policy standpoint and contains the simple bots, but for 
 keeping your outbound from MX clean,
 not so much.


In Exim you can ratelimit SMTP connections like so:

http://www.exim.org/exim-html-current/doc/html/spec_html/ch40.html#SECTratelimiting

# Slow down fast senders; note the need to truncate $sender_rate
# at the decimal point.
warn ratelimit = 100 / 1h / per_rcpt / strict
delay = ${eval: ${sg{$sender_rate}{[.].*}{}} - \
  $sender_rate_limit }s

Sure there are ways of doing this with other MTA's as well.

Since spam depends on many thousands of messages this effectively
limits the usefulness of your MTA for sending spam.  Must also limit
the number of connections per IP.  I also think this examples 100
recipients per hour is to low.

Matt


Re: thanks to thinking people.

2010-07-19 Thread RW
On Mon, 19 Jul 2010 13:25:26 -0700
Ted Mittelstaedt t...@ipinc.net wrote:


 It's been our experience that spam-scanning outbound mail causes a lot
 more problems than setting up mailserver monitoring and being
 responsive to it.  Sooner or later one of your customers is going to
 call you and bitch because their mail ended up in their
 coorespondents spam folder due to them using HTML or including a bad
 URL and if it was your server that tagged it spam,

What's the point of adding spam-filtering headers or markup to outgoing
mail?


Re: thanks to thinking people.

2010-07-19 Thread Brian Godette

 On 7/19/2010 2:25 PM, Ted Mittelstaedt wrote:



On 7/19/2010 12:56 PM, Brian Godette wrote:

On 7/19/2010 1:29 PM, Ted Mittelstaedt wrote:



On 7/19/2010 8:43 AM, Brian Godette wrote:

On 7/15/2010 6:55 PM, Alexandre Chapellon wrote:

Hi all,

Few months ago I asked this list if using SA on outgoing smtp was a
good idea (Thread: SA on outgoing SMTP).
This thread quickly moved to Block direct port 25 for non-mta users!
I was really afraid of doing so and didn't really wanted to go this
way.
now about 6 months later I have to say: I was a fool! Today.
After spending some time trying to find a more user-friendly way to
clean up the mess around here, I came to the conclusion that port 25
blocking on the bound of my network was inevitable.
Today it's done, and I have followed few others advices given on 
list.

I wanted to testify the benfits of good designed network for thoose
who like me are afrais of annying customer with security (even more
blocking port 25 on the limits of the network is not really annoying
for most of customers).

Thanks to Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
help dudes, all I have to care about now is my mailservers
configuration!

--
Alexandre Chapellon alexandre.chapel...@mana.pf
mailto:alexandre.chapel...@mana.pf
Mana SAS



I hope you realize you still need to deal with the issues of users 
with

weak/guessable passwords and phishing of account info as well as the
newer bots that recover account info from Outlook/Outlook
Express/Thunderbird.

Blocking outbound 25 from the rest of your network, and disallowing
submission to your MX on 25 from your network, does very little for
keeping your own MX from sending spam which is what SA on outgoing 
SMTP

would be for. It's great from a policy standpoint and contains the
simple bots, but for keeping your outbound from MX clean, not so 
much.




That absolutely isn't true. Yes I agree that it's possible for a
spammer to write a virus that uses the submission port and
authenticated SMTP to send mail and runs on a user's PC. But if your
running even a simple log analysis script on your mailserver and you
READ the daily reports from it, then a user that sends many tens to
hundreds of thousands of e-mails will stick out like a sore thumb.

We have NEVER had a spammer do this to one of our users. I don't know
why because it seems to me like it's an obvious way to relay spam. What
we HAVE had happen is spammers guess weak passwords and relay spam
through the webmail interface. My guess is that it's just a lot
easier to do this for them. Of course, when they do that their outgoing
spam is stamped with the username that was used to relay, and it's
very easy to detect and change the password.

So far, all the spam viruses we have encountered on user systems are
of the variety where they infect the client and attempt to relay to
port 25.

Ted


So basically you're agreeing with what I said. It stops the simple bots,
but the other stuff, not so much.



No, you said it does very little and I said it only does very little
in THEORY, but in actual practice (right now) it does a tremendous 
amount.


In actual practice it does very little for YOUR OWN MX, the simple bots 
simply do not target internal mail servers, they send direct. Which is 
why I said it's good from a policy standpoint but does nothing to 
actually prevent YOUR OWN MX from ending up on an RBL because all the 
bots that can do that don't care that you've got outbound 25 from your 
internal network blocked.




I won't rule out that the spammers won't become smarter but right now
they are stupid.  I guess there's just too many wide-open servers still
out there for them to bother trying to get around one that's been 
tightened down.



I've seen bots use smtp-auth from inside, whether it's by injecting into
O/OE or recovered auth I can't say. I've seen bots use webmail as you
have, I've also seen them use smtp-auth vs submission/ssl (587/495). But
again, that's only after they've either guessed or phished the account
info. In either case you're still left with having to scan outbound from
your own MX, and/or rate limit, or accept being RBL'd for short periods
of time being reactive to log analysis and spam reports.


If you keep on top of the logs then you won't generally be RBLed.  And 
you can run a monitoring program like Big Sister and with a bit of 
scripting you can be notifed when your server starts spamming. 
Out-of-the-box the SMTP monitor in Big Sister will alarm if the 
mailserver starts slowing down - which is customary when a spammer 
commences a large spam run.  But you can also write a script that runs 
once an hour

and monitors your mailflow and alarms if it jumps.  If your graphing
your mailflow then spam runs will create spikes that are very obvious.


At which point it's already too late.



It's been our experience that spam-scanning outbound mail causes a lot
more problems than setting up mailserver monitoring and being responsive
to it.  

Re: thanks to thinking people.

2010-07-19 Thread Brian Godette

 On 7/19/2010 4:01 PM, RW wrote:

On Mon, 19 Jul 2010 13:25:26 -0700
Ted Mittelstaedtt...@ipinc.net  wrote:



It's been our experience that spam-scanning outbound mail causes a lot
more problems than setting up mailserver monitoring and being
responsive to it.  Sooner or later one of your customers is going to
call you and bitch because their mail ended up in their
coorespondents spam folder due to them using HTML or including a bad
URL and if it was your server that tagged it spam,

What's the point of adding spam-filtering headers or markup to outgoing
mail?

Indeed, the point would be to score and SMTP reject outbound over some score, 
anything under would be sent unmodified. If it's a FP your own user contacts 
you.



Re: thanks to thinking people.

2010-07-19 Thread RW
On Mon, 19 Jul 2010 16:58:49 -0600
Brian Godette bgode...@idcomm.com wrote:

   On 7/19/2010 4:01 PM, RW wrote:
  On Mon, 19 Jul 2010 13:25:26 -0700
  Ted Mittelstaedtt...@ipinc.net  wrote:
 
 
  It's been our experience that spam-scanning outbound mail causes a
  lot more problems than setting up mailserver monitoring and being
  responsive to it.  Sooner or later one of your customers is going
  to call you and bitch because their mail ended up in their
  coorespondents spam folder due to them using HTML or including a
  bad URL and if it was your server that tagged it spam,
  What's the point of adding spam-filtering headers or markup to
  outgoing mail?
 Indeed, the point would be to score and SMTP reject outbound over
 some score, anything under would be sent unmodified.


I was asking what's the point of adding headers or markup  that *is*
seen by the recipient.


Re: thanks to thinking people.

2010-07-15 Thread Ted Mittelstaedt

Great!

1 down, 19,587,294,872,875 more admins to go!   ;-)

Ted

On 7/15/2010 5:55 PM, Alexandre Chapellon wrote:

Hi all,

Few months ago I asked this list if using SA on outgoing smtp was a good
idea (Thread: SA on outgoing SMTP).
This thread quickly  moved to Block direct port 25 for non-mta users!
I was really afraid  of doing so and didn't really wanted to go this
way.
now about 6 months later I have to say: I was a fool! Today.
After spending some time trying to find a more user-friendly way to
clean up the mess around here, I came to the conclusion that port 25
blocking on the bound of my network was inevitable.
Today it's done, and I have followed few others advices given on list. I
wanted to testify the benfits of good designed network for thoose who
like me are afrais of annying customer with security (even more blocking
port 25 on the limits of the network is not really annoying for most of
customers).

Thanks to  Ted Mittelstaedt, Matus UHLAR, Martin Gregorie, with your
help dudes, all I have to care about now is my mailservers
configuration!