Hi
We presently use Mercury/32 to manage mail for three domains. Our mail passes through a 3rd party filtering service.
We use Google Apps GMail for staff that are out of the office and who need to work in local authority offices. This is because the local authority will not allow IMAP connections. GMail is configured so that mail is routed via our server which allows us to make and keep a copy of all messages sent. But - GMail does not allow an SMTP password to be entered as part of the 'remote gateway' setup.
We also allow certain staff to access their mail from home or on the move via IMAP.
SMTP>Relaying control is configured as follows to allow GMail to relay mail via our server:
Use strict local relaying restrictions is checked
Authenticated SMTP connections may relay mail is checked
Only Authenticated SMTP connections my relay mail is not checked
The other problem I have is that in order for staff to relay mail via our server from their home computers we need to configure Mercury/32 to allow connections from any source. This is because staff that use IMAP do not have static IP addresses, which would allow me to add those addresses to the Connection Control section of Mercury's SMTP configuration.
However, today one of our staff received a message containing malicious code. The message headers have our postmaster address as the sender address. The message originated from an external IP. I've appended the headers below.
I'm not really sure how to proceed. I need to keep all connections open for staff IMAP access and I also cannot allow only authenticated relaying because Google Apps does not make provision for entering an SMTP password.
Does anyone have any suggestions for me, please? I've not had to go down this route before so am out of my depth.
Thanks.
*********************************************************************************************************
05:28:16.861: Connection from 122.144.10.242, Thu Apr 17 05:28:16 2014<lf>
05:28:16.861: << 220 **our-domain**.co.uk ESMTP server ready.<cr><lf>
05:28:16.080: >> EHLO **our-domain**.co.uk<cr><lf>
05:28:16.080: << 250-**our-domain**.co.uk Hello **our-domain**.co.uk; ESMTPs are:<cr><lf>250-TIME<cr><lf>
05:28:16.080: << 250-SIZE 0<cr><lf>
05:28:16.080: << 250-AUTH CRAM-MD5 LOGIN<cr><lf>
05:28:16.080: << 250-AUTH=LOGIN<cr><lf>
05:28:16.080: << 250 HELP<cr><lf>
05:28:18.406: >> MAIL FROM:<postmaster@**our-domain**.co.uk><cr><lf>
05:28:18.406: << 250 Sender OK - send RCPTs.<cr><lf>
05:28:18.624: >> RCPT TO:<user@**our-domain**.co.uk><cr><lf>
05:28:18.624: << 250 Recipient OK - send RCPT or DATA.<cr><lf>
05:28:18.842: >> DATA<cr><lf>
05:28:18.858: << 354 OK, send data, end with CRLF.CRLF<cr><lf>
05:28:18.061: >> From: "The Post Office" <postmaster@**our-domain**.co.uk><cr><lf>
05:28:18.076: >> To: user@**our-domain**.co.uk<cr><lf>
05:28:18.076: >> Subject: DELIVERY REPORTS ABOUT YOUR E-MAIL<cr><lf>
05:28:18.076: >> Date: Thu, 17 Apr 2014 10:25:24 +0600<cr><lf>
05:28:18.076: >> MIME-Version: 1.0<cr><lf>
05:28:18.076: >> Content-Type: multipart/mixed;<cr><lf>
05:28:18.076: >> boundary="----=_NextPart_000_0001_45AB10F8.B838EC9C"<cr><lf>
05:28:18.076: >> X-Priority: 3<cr><lf>
05:28:18.076: >> X-MSMail-Priority: Normal<cr><lf>
05:28:18.076: >> X-Mailer: Microsoft Outlook Express 6.00.2600.0000<cr><lf>
05:28:18.076: >> X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000<cr><lf>
05:28:18.076: >> <cr><lf>
05:28:18.076: >> This is a multi-part message in MIME format.<cr><lf>
05:28:18.076: >> <cr><lf>
05:28:18.076: >> ------=_NextPart_000_0001_45AB10F8.B838EC9C<cr><lf>
05:28:18.076: >> Content-Type: text/plain;<cr><lf>
05:28:18.076: >> charset=us-ascii<cr><lf>
05:28:18.076: >> Content-Transfer-Encoding: 7bit<cr><lf>
05:28:18.076: >> <cr><lf>
05:28:18.076: >> Dear user of **our-domain**.co.uk,<cr><lf>
05:28:18.092: >> <cr><lf>
05:28:18.092: >> We have detected that your email account was used to send a huge amount of spam during this week.<cr><lf>
05:28:18.092: >> Probably, your computer had been compromised and now contains a trojan proxy server.<cr><lf>
05:28:18.092: >> <cr><lf>
05:28:18.092: >> We recommend that you follow the instructions in the attached text file in order to keep your computer safe.<cr><lf>
05:28:18.092: >> <cr><lf>
05:28:18.092: >> Best wishes,<cr><lf>
05:28:18.092: >> **our-domain**.co.uk support team.<cr><lf>
05:28:18.092: >> <cr><lf>
05:28:18.092: >> <cr><lf>
05:28:18.092: >> ------=_NextPart_000_0001_45AB10F8.B838EC9C<cr><lf>
05:28:18.092: >> Content-Type: application/octet-stream;<cr><lf>
05:28:18.092: >> name="tftmth.zip"<cr><lf>
05:28:18.092: >> Content-Transfer-Encoding: base64<cr><lf>
05:28:18.092: >> Content-Disposition: attachment;<cr><lf>
05:28:18.092: >> filename="tftmth.zip"<cr><lf>
05:28:18.092: >> <cr><lf>
<p>Hi</p><p>We presently use Mercury/32 to manage mail for three domains. Our mail passes through a 3rd party filtering service.</p><p>We use Google Apps GMail for staff that are out of the office and who need to work in local authority offices. This is because the local authority will not allow IMAP connections.&nbsp;<span style="font-size: 10pt;">GMail is configured so that mail is routed via our server which allows us to make and keep a copy of all messages sent. But - GMail does not allow an SMTP password to be entered as part of the 'remote gateway' setup.</span></p><p>We also allow certain staff to access their mail from home or on the move via IMAP.</p><p>SMTP&gt;Relaying control is configured as follows to allow GMail to relay mail via our server:&nbsp;</p><p>Use strict local relaying restrictions is checked</p><p>Authenticated SMTP connections may relay mail is checked</p><p>Only Authenticated SMTP connections my relay mail is not checked<span style="font-size: 10pt;">&nbsp;</span></p><p>The other problem I have is that in order for staff to relay mail via our server from their home computers we need to configure Mercury/32 to allow connections from any source. This is because staff that use IMAP do not have static IP addresses, which would allow me to add those addresses to the Connection Control section of Mercury's SMTP configuration.</p><p>However, today one of our staff received a message containing malicious code. The message headers have our postmaster address as the sender address. The message originated from an external IP. I've appended the headers below.</p><p>I'm not really sure how to proceed. I need to keep all connections open for staff IMAP access and I also cannot allow only authenticated relaying because Google Apps does not make provision for entering an SMTP password.</p><p>Does anyone have any suggestions for me, please? I've not had to go down this route before so am out of my depth.</p><p>Thanks.&nbsp;</p><p>*********************************************************************************************************</p><p>05:28:16.861: Connection from 122.144.10.242, Thu Apr 17 05:28:16 2014&lt;lf&gt;</p><p>05:28:16.861: &lt;&lt; 220 **our-domain**.co.uk ESMTP server ready.&lt;cr&gt;&lt;lf&gt;</p><p>05:28:16.080: &gt;&gt; EHLO **our-domain**.co.uk&lt;cr&gt;&lt;lf&gt;</p><p>05:28:16.080: &lt;&lt; 250-**our-domain**.co.uk Hello **our-domain**.co.uk; ESMTPs are:&lt;cr&gt;&lt;lf&gt;250-TIME&lt;cr&gt;&lt;lf&gt;</p><p>05:28:16.080: &lt;&lt; 250-SIZE 0&lt;cr&gt;&lt;lf&gt;</p><p>05:28:16.080: &lt;&lt; 250-AUTH CRAM-MD5 LOGIN&lt;cr&gt;&lt;lf&gt;</p><p>05:28:16.080: &lt;&lt; 250-AUTH=LOGIN&lt;cr&gt;&lt;lf&gt;</p><p>05:28:16.080: &lt;&lt; 250 HELP&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.406: &gt;&gt; MAIL FROM:&lt;postmaster@**our-domain**.co.uk&gt;&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.406: &lt;&lt; 250 Sender OK - send RCPTs.&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.624: &gt;&gt; RCPT TO:&lt;user@**our-domain**.co.uk&gt;&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.624: &lt;&lt; 250 Recipient OK - send RCPT or DATA.&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.842: &gt;&gt; DATA&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.858: &lt;&lt; 354 OK, send data, end with CRLF.CRLF&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.061: &gt;&gt; From: "The Post Office" &lt;postmaster@**our-domain**.co.uk&gt;&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; To: user@**our-domain**.co.uk&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; Subject: DELIVERY REPORTS ABOUT YOUR E-MAIL&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; Date: Thu, 17 Apr 2014 10:25:24 +0600&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; MIME-Version: 1.0&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; Content-Type: multipart/mixed;&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; <span class="Apple-tab-span" style="white-space:pre"> </span>boundary="----=_NextPart_000_0001_45AB10F8.B838EC9C"&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; X-Priority: 3&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; X-MSMail-Priority: Normal&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; X-Mailer: Microsoft Outlook Express 6.00.2600.0000&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; &lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; This is a multi-part message in MIME format.&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; &lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; ------=_NextPart_000_0001_45AB10F8.B838EC9C&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; Content-Type: text/plain;&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; <span class="Apple-tab-span" style="white-space:pre"> </span>charset=us-ascii&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; Content-Transfer-Encoding: 7bit&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; &lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.076: &gt;&gt; Dear user of **our-domain**.co.uk,&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; &lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; We have detected that your email account was used to send a huge amount of spam during this week.&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; Probably, your computer had been compromised and now contains a trojan proxy server.&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; &lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; We recommend that you follow the instructions in the attached text file in order to keep your computer safe.&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; &lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; Best wishes,&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; **our-domain**.co.uk support team.&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; &lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; &lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; ------=_NextPart_000_0001_45AB10F8.B838EC9C&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; Content-Type: application/octet-stream;&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; <span class="Apple-tab-span" style="white-space:pre"> </span>name="tftmth.zip"&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; Content-Transfer-Encoding: base64&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; Content-Disposition: attachment;&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; <span class="Apple-tab-span" style="white-space:pre"> </span>filename="tftmth.zip"&lt;cr&gt;&lt;lf&gt;</p><p>05:28:18.092: &gt;&gt; &lt;cr&gt;&lt;lf&gt;&nbsp;</p>