Community Discussions and Support
Sv: only allow authenticated senders from local domains

[quote user="airyt"] We are getting lots of spam sent "from" ourselves. And no, we cannot filter on IP address since lots of outgoing mail comes from a variety of machines (hence the authentication).

 

Thanks, airyt[/quote]

 

Contact Rolf L directly to be part of testing his new rcptcheck deamon that takes care of your stated issues.
[quote user="airyt"] We are getting lots of spam sent "from" ourselves. And no, we cannot filter on IP address since lots of outgoing mail comes from a variety of machines (hence the authentication). <DIV> </DIV> <DIV>Thanks, airyt[/quote]</DIV> <DIV> </DIV> <DIV>Contact Rolf L directly to be part of testing his new rcptcheck deamon that takes care of your stated issues.</DIV>

hello,

 

would like to stem the tide of spam that is coming in from external computers with the from being a local address.

 

Eg:

domain.com has an account info@domain.com

Mercury is configured to only allow authenticated users to send to external accounts. But of course, for email destined for local addresses, we don't force authentication.

Therefore, mail that has a (spoofed) FROM address (info@domain.com) with a TO of (info@domain.com) will not be forced to authenticate. Can we make this happen?

 

We are getting lots of spam sent "from" ourselves. And no, we cannot filter on IP address since lots of outgoing mail comes from a variety of machines (hence the authentication).

 

Thanks, airyt
<DIV>hello,</DIV> <DIV> </DIV> <DIV>would like to stem the tide of spam that is coming in from external computers with the from being a local address.</DIV> <DIV> </DIV> <DIV>Eg:</DIV> <DIV>domain.com has an account <A href="mailto:info@domain.com">info@domain.com</A></DIV> <DIV>Mercury is configured to only allow authenticated users to send to external accounts. But of course, for email destined for local addresses, we don't force authentication.</DIV> <DIV>Therefore, mail that has a (spoofed) FROM address (<A href="mailto:info@domain.com">info@domain.com</A>) with a TO of (<A href="mailto:info@domain.com">info@domain.com</A>) will not be forced to authenticate. Can we make this happen?</DIV> <DIV> </DIV> <DIV>We are getting lots of spam sent "from" ourselves. And no, we cannot filter on IP address since lots of outgoing mail comes from a variety of machines (hence the authentication).</DIV> <DIV> </DIV> <DIV>Thanks, airyt</DIV>

[quote user="airyt"]

hello,

 

would like to stem the tide of spam that is coming in from external computers with the from being a local address.
 
Eg:
domain.com has an account info@domain.com
Mercury is configured to only allow authenticated users to send to external accounts. But of course, for email destined for local addresses, we don't force authentication.
Therefore, mail that has a (spoofed) FROM address (info@domain.com) with a TO of (info@domain.com) will not be forced to authenticate. Can we make this happen?
You can require all remove systems delivering you mail to authenticate since they have no way to do this.  What you are asking can be done with filters but it's a pain in the rear. Personally I use PopfileD and Popfile with greywall and a couple of blacklist to detect all of the spam and it does not make any difference at all what the addresses are in the incoming messages.  My system is +99.8% effective is catching the spam.  I really can't take the time to fight and block the additional 0.02% of the spam that makes it through.  ;-)
 We are getting lots of spam sent "from" ourselves. And no, we cannot filter on IP address since lots of outgoing mail comes from a variety of machines (hence the authentication).
Thanks, airyt

[/quote]

[quote user="airyt"]<div>hello,</div> <div> </div> <blockquote><div>would like to stem the tide of spam that is coming in from external computers with the from being a local address.</div><div> </div><div>Eg:</div><div>domain.com has an account <a href="mailto:info@domain.com" mce_href="mailto:info@domain.com">info@domain.com</a></div><div>Mercury is configured to only allow authenticated users to send to external accounts. But of course, for email destined for local addresses, we don't force authentication.</div><div>Therefore, mail that has a (spoofed) FROM address (<a href="mailto:info@domain.com" mce_href="mailto:info@domain.com">info@domain.com</a>) with a TO of (<a href="mailto:info@domain.com" mce_href="mailto:info@domain.com">info@domain.com</a>) will not be forced to authenticate. Can we make this happen?</div></blockquote><div>You can require all remove systems delivering you mail to authenticate since they have no way to do this.  What you are asking can be done with filters but it's a pain in the rear. Personally I use PopfileD and Popfile with greywall and a couple of blacklist to detect all of the spam and it does not make any difference at all what the addresses are in the incoming messages.  My system is +99.8% effective is catching the spam.  I really can't take the time to fight and block the additional 0.02% of the spam that makes it through.  ;-) </div><blockquote><div> We are getting lots of spam sent "from" ourselves. And no, we cannot filter on IP address since lots of outgoing mail comes from a variety of machines (hence the authentication).</div></blockquote><blockquote><div>Thanks, airyt</div></blockquote> [/quote]

I've been seeing a massive increase in this type of spam lately too.

Thomas, why is it impossible to require clients to provide a password for sending?  The MercuryS module already provides password protected relaying controls, why can't the same mechanism be used to authenticate the client for non-relaying?

<p>I've been seeing a massive increase in this type of spam lately too.</p><p>Thomas, why is it impossible to require clients to provide a password for sending?  The MercuryS module already provides password protected relaying controls, why can't the same mechanism be used to authenticate the client for non-relaying? </p>

Thomas, why is it impossible to require clients to provide a password

for sending?  The MercuryS module already provides password protected

relaying controls, why can't the same mechanism be used to authenticate

the client for non-relaying?

It's not, you can require all client to authenticate for sending via MercuryS; want you cannot do is have the sending SMTP systems authenticate when sending mail rto your local users.  These sending systems come from all over the world and there is no way that they would have any way to authenticate using a local userID and password.
<blockquote>Thomas, why is it impossible to require clients to provide a password for sending?  The MercuryS module already provides password protected relaying controls, why can't the same mechanism be used to authenticate the client for non-relaying?</blockquote>It's not, you can require all client to authenticate for sending via MercuryS; want you cannot do is have the sending SMTP systems authenticate when sending mail rto your local users.  These sending systems come from all over the world and there is no way that they would have any way to authenticate using a local userID and password.

[quote user="Thomas R. Stephenson"]It's not, you can require all client to authenticate for sending via MercuryS; [/quote]

That's all I need, but how do you enable it?  The connection controls in MercuryS only restrict relaying by password, I do not see any option to restrict all message sending.

<p>[quote user="Thomas R. Stephenson"]It's not, you can require all client to authenticate for sending via MercuryS; [/quote]</p><p>That's all I need, but how do you enable it?  The connection controls in MercuryS only restrict <i>relaying</i> by password, I do not see any option to restrict <i>all</i> message sending. </p>

[quote user="Barius"]

[quote user="Thomas R. Stephenson"]

It's not, you can require all client to authenticate for sending via MercuryS;

[/quote]

That's all I need, but how do you enable it?  The connection controls in MercuryS only restrict relaying by password, I do not see any option to restrict all message sending.

Huh?  Looks like we are not communicating.   If the mail client is not sending to a local address is relaying and authorization will be required to get through MercuryS.  Any mailer (or server) sending to a local user will always get through since you never require authentication any inbound mail.

[/quote]
[quote user="Barius"]<blockquote><p>[quote user="Thomas R. Stephenson"]</p><p>It's not, you can require all client to authenticate for sending via MercuryS; </p><p>[/quote]</p><p>That's all I need, but how do you enable it?  The connection controls in MercuryS only restrict <i>relaying</i> by password, I do not see any option to restrict <i>all</i> message sending.</p></blockquote><p>Huh?  Looks like we are not communicating.   If the mail client is not sending to a local address is relaying and authorization will be required to get through MercuryS.  Any mailer (or server) sending to a local user will always get through since you never require authentication any inbound mail. </p>[/quote]

I understand that the server cannot authenticate mail being delivered from non-local domains to the local domain, but why can it not authenticate mail that is addressed from it's own domain?  Any mail being sent from *@mydomain.com is always going to come from a client or server that is known to me, so why is it impossible to add a feature that would let me verify that fact via password?

If it is a protocol limitation I would understand, though it is my understanding that MIME is intended to be extensible...

<p>I understand that the server cannot authenticate mail being delivered from non-local domains <i>to</i> the local domain, but why can it not authenticate mail that is addressed <i>from</i> it's own domain?  Any mail being <i>sent</i> from *@mydomain.com is always going to come from a client or server that is known to me, so why is it impossible to add a feature that would let me verify that fact via password?</p><p>If it is a protocol limitation I would understand, though it is my understanding that MIME is intended to be extensible... </p>

I find that most of the spam with identical To/From headers is caught by the spamhaus.org blacklists, actually. Still, we are right now testing a daemon that will tag all incoming messages that have the same address as sender and recipient. (Using it to block messages would be possible as well, but then you would have to be sure that no local users send test messages to themselves or include their own address in mailings to recipient lists.)

/Rolf 

<p>I find that most of the spam with identical To/From headers is caught by the spamhaus.org blacklists, actually. Still, we are right now testing a daemon that will tag all incoming messages that have the same address as sender and recipient. (Using it to block messages would be possible as well, but then you would have to be sure that no local users send test messages to themselves or include their own address in mailings to recipient lists.) </p><p>/Rolf </p>

I understand that the server cannot authenticate mail being delivered from non-local domains to the local domain, but why can it not authenticate mail that is addressed from it's own domain?  Any mail being sent

from *@mydomain.com is always going to come from a client or server

that is known to me, so why is it impossible to add a feature that

would let me verify that fact via password?

The authentication is done by MercuryS and does not check any addresses at all.  The AUTH protocol is only triggered the sending system requests authorization using the AUTH command.  The protocol has nothing to do with the actual sending or receiving.  MercuryS can be set to block relaying and one of the ways to allow sending systems to relay is to allow systems that use the AUTH command to relay.  Servers sending to the system will ignore the AUTH statement in the receiving servers response since they are not trying to relay but deliver mail.

If it is a protocol limitation I would understand, though it is my understanding that MIME is intended to be extensible...

It has nothing to do with MIME since it's not even looking at the body of the mail message or the SMTP MAIL FROM: or RCPT TO: addresses. It's only looking at the AUTH command sent by the sending system.

<blockquote><p>I understand that the server cannot authenticate mail being delivered from non-local domains <i>to</i> the local domain, but why can it not authenticate mail that is addressed <i>from</i> it's own domain?  Any mail being <i>sent</i> from *@mydomain.com is always going to come from a client or server that is known to me, so why is it impossible to add a feature that would let me verify that fact via password?</p></blockquote><p>The authentication is done by MercuryS and does not check any addresses at all.  The AUTH protocol is only triggered the sending system requests authorization using the AUTH command.  The protocol has nothing to do with the actual sending or receiving.  MercuryS can be set to block relaying and one of the ways to allow sending systems to relay is to allow systems that use the AUTH command to relay.  Servers sending to the system will ignore the AUTH statement in the receiving servers response since they are not trying to relay but deliver mail. </p><blockquote>If it is a protocol limitation I would understand, though it is my understanding that MIME is intended to be extensible... </blockquote><p>It has nothing to do with MIME since it's not even looking at the body of the mail message or the SMTP MAIL FROM: or RCPT TO: addresses. It's only looking at the AUTH command sent by the sending system. </p>

[quote user="Rolf Lindby"]

I find that most of the spam with identical To/From headers is caught by the spamhaus.org blacklists, actually. Still, we are right now testing a daemon that will tag all incoming messages that have the same address as sender and recipient. (Using it to block messages would be possible as well, but then you would have to be sure that no local users send test messages to themselves or include their own address in mailings to recipient lists.)

/Rolf 

You should also mention that your daemon allows the addition of the X-RCPT-TO: header showing the original messages SMTP RCPT TO: address.  It might be that this would be more useful to most.  [:)]

[/quote]
[quote user="Rolf Lindby"]<blockquote><p>I find that most of the spam with identical To/From headers is caught by the spamhaus.org blacklists, actually. Still, we are right now testing a daemon that will tag all incoming messages that have the same address as sender and recipient. (Using it to block messages would be possible as well, but then you would have to be sure that no local users send test messages to themselves or include their own address in mailings to recipient lists.) </p><p>/Rolf </p></blockquote><p>You should also mention that your daemon allows the addition of the X-RCPT-TO: header showing the original messages SMTP RCPT TO: address.  It might be that this would be more useful to most.  [:)] </p>[/quote]

[quote user="Thomas R. Stephenson"]It has nothing to do with MIME...[/quote]

Err, sorry, I meant SMTP not MIME.  I must have had a brain fart.

[quote user="Thomas R. Stephenson"]The authentication is done by MercuryS and does not check any addresses

at all.  The AUTH protocol is only triggered the sending system

requests authorization using the AUTH command.  The protocol has

nothing to do with the actual sending or receiving.  MercuryS can be

set to block relaying and one of the ways to allow sending systems to

relay is to allow systems that use the AUTH command to relay.  Servers

sending to the system will ignore the AUTH statement in the receiving

servers response since they are not trying to relay but deliver mail.[/quote]

I think that is my point, MercuryS should have a feature that would check not just the AUTH but also the MAIL FROM address.  Any time a mail is received with MAIL FROM <someuser>@<local-domain> it must be accompanied by a successful AUTH before it gets passed on for further processing.  Is there some technical limitation I'm not seeing here...?

&lt;p&gt;[quote user=&quot;Thomas R. Stephenson&quot;]It has nothing to do with MIME...[/quote]&lt;/p&gt;&lt;p&gt;Err, sorry, I meant SMTP not MIME.&amp;nbsp; I must have had a brain fart. &lt;/p&gt;&lt;p&gt;[quote user=&quot;Thomas R. Stephenson&quot;]The authentication is done by MercuryS and does not check any addresses at all.&amp;nbsp; The AUTH protocol is only triggered the sending system requests authorization using the AUTH command.&amp;nbsp; The protocol has nothing to do with the actual sending or receiving.&amp;nbsp; MercuryS can be set to block relaying and one of the ways to allow sending systems to relay is to allow systems that use the AUTH command to relay.&amp;nbsp; Servers sending to the system will ignore the AUTH statement in the receiving servers response since they are not trying to relay but deliver mail.[/quote]&lt;/p&gt;&lt;p&gt;I think that is my point, MercuryS &lt;i&gt;should&lt;/i&gt; have a feature that would check not just the AUTH but &lt;i&gt;also&lt;/i&gt; the MAIL FROM address.&amp;nbsp; Any time a mail is received with MAIL FROM &amp;lt;someuser&amp;gt;@&amp;lt;local-domain&amp;gt; it must be accompanied by a successful AUTH before it gets passed on for further processing.&amp;nbsp; Is there some technical limitation I&#039;m not seeing here...?&lt;/p&gt;

[quote user="Rolf Lindby"]

I find that most of the spam with identical To/From headers is caught by the spamhaus.org blacklists, actually. Still, we are right now testing a daemon that will tag all incoming messages that have the same address as sender and recipient. (Using it to block messages would be possible as well, but then you would have to be sure that no local users send test messages to themselves or include their own address in mailings to recipient lists.)

/Rolf 

[/quote]

I find Spamcop.net is even better. Unfortunately, some of my clients have clueless IT depts. that don't know how to administrate their own Exchange servers and they keep getting blacklisted because they relay spam to the Spamcop honeypots.  It's forced me to turn off Spamcop entirely.  Strangely, Spamhaus doesn't seem to suffer from this problem, but it's also not as effective as Spamcop in my experience.

[quote user=&quot;Rolf Lindby&quot;]&lt;p&gt;I find that most of the spam with identical To/From headers is caught by the spamhaus.org blacklists, actually. Still, we are right now testing a daemon that will tag all incoming messages that have the same address as sender and recipient. (Using it to block messages would be possible as well, but then you would have to be sure that no local users send test messages to themselves or include their own address in mailings to recipient lists.) &lt;/p&gt;&lt;p&gt;/Rolf&amp;nbsp;&lt;/p&gt;&lt;p&gt;[/quote]&lt;/p&gt;&lt;p&gt;I find Spamcop.net is even better. Unfortunately, some of my clients have clueless IT depts. that don&#039;t know how to administrate their own Exchange servers and they keep getting blacklisted because they relay spam to the Spamcop honeypots.&amp;nbsp; It&#039;s forced me to turn off Spamcop entirely.&amp;nbsp; Strangely, Spamhaus doesn&#039;t seem to suffer from this problem, but it&#039;s also not as effective as Spamcop in my experience. &lt;/p&gt;

I think that is my point, MercuryS should have a feature that would check not just the AUTH but also

the MAIL FROM address.  Any time a mail is received with MAIL FROM

<someuser>@<local-domain> it must be accompanied by a

successful AUTH before it gets passed on for further processing.  Is

there some technical limitation I'm not seeing here...?

Probably could be coded but there are a couple that will reduce the usefulness.

1.  AUTH is ESMTP and any SMTP mailer (server or client) does not do AUTH.  Your road warriors may not have access to a mail client/server that does ESMTP AUTH.

2.  The MAIL FROM: address is not normally the same as the From: address in spam so it's pretty easy to send with the MAIL FROM: a faked domain with a From: address in the local domain.

That said Rolf Lindby's daemon does tag these messages with an X-BLOCKED header so that you can filter then off to the spam user.  You will still receive them but they will not get to the local users.

 

&lt;blockquote&gt;I think that is my point, MercuryS &lt;i&gt;should&lt;/i&gt; have a feature that would check not just the AUTH but &lt;i&gt;also&lt;/i&gt; the MAIL FROM address.&amp;nbsp; Any time a mail is received with MAIL FROM &amp;lt;someuser&amp;gt;@&amp;lt;local-domain&amp;gt; it must be accompanied by a successful AUTH before it gets passed on for further processing.&amp;nbsp; Is there some technical limitation I&#039;m not seeing here...?&lt;/blockquote&gt;&lt;p&gt;Probably could be coded but there are a couple that will reduce the usefulness.&lt;/p&gt;&lt;p&gt;1.&amp;nbsp; AUTH is ESMTP and any SMTP mailer (server or client) does not do AUTH.&amp;nbsp; Your road warriors may not have access to a mail client/server that does ESMTP AUTH. &lt;/p&gt;&lt;p&gt;2.&amp;nbsp; The MAIL FROM: address is not normally the same as the From: address in spam so it&#039;s pretty easy to send with the MAIL FROM: a faked domain with a From: address in the local domain.&lt;/p&gt;&lt;p&gt;That said Rolf Lindby&#039;s daemon does tag these messages with an X-BLOCKED header so that you can filter then off to the spam user.&amp;nbsp; You will still receive them but they will not get to the local users. &lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;

It's not clear from transflt.mer whether or not authenticated connections are checked.  If they aren't, and they shouldn't be if they are, then you're solution is to use that to simply deny mail sent from your domain.

 

Cheers,

Sabahattin

 

&lt;P&gt;It&#039;s not clear from transflt.mer whether or not authenticated connections are checked.&amp;nbsp; If they aren&#039;t, and they shouldn&#039;t be if they are, then you&#039;re solution is to use that to simply deny mail sent from your domain.&lt;/P&gt; &lt;P mce_keep=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Cheers,&lt;/P&gt; &lt;P&gt;Sabahattin&lt;/P&gt; &lt;P mce_keep=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;

AFAIK the MAIL FROM transaction filters take no account of authentication, only the "exempt" setting from the MercS connection control list. (although a HELO rule can be deferred by using "D,.." instead of "H,..." to allow exemption by authentication)

Most of our clients are on the internal LAN or fixed external IP's, so these are exempted as above, and I have a couple of eXit rules in transflt.mer for the external dynamic usernames, before the Reject rule for MAIL FROM: *@ourdomain.

The few that get in via those usernames are all caught by Spamhalter.

This works ok for us at the moment, but I agree it would be good to see some more options to combat this type of spam.

&lt;p&gt;AFAIK the MAIL FROM transaction filters take no account of authentication, only the &quot;exempt&quot; setting from the MercS connection control list. (although a HELO rule can be deferred by using &quot;D,..&quot; instead of &quot;H,...&quot; to allow exemption by authentication) &lt;/p&gt;&lt;p&gt;Most of our clients are on the internal LAN or fixed external IP&#039;s, so these are exempted as above, and I have a couple of eXit rules in transflt.mer for the external dynamic usernames, before the Reject rule for MAIL FROM: *@ourdomain.&lt;/p&gt;&lt;p&gt;The few that get in via those usernames are all caught by Spamhalter.&lt;/p&gt;&lt;p&gt;This works ok for us at the moment, but I agree it would be good to see some more options to combat this type of spam. &lt;/p&gt;
live preview
enter atleast 10 characters
WARNING: You mentioned %MENTIONS%, but they cannot see this message and will not be notified
Saving...
Saved
With selected deselect posts show selected posts
All posts under this topic will be deleted ?
Pending draft ... Click to resume editing
Discard draft