Re: [exim] DoS attack with nested MIME levels

Página superior
Eliminar este mensaje
Responder a este mensaje
Autor: Alan J. Flavell
Fecha:  
A: Exim users list
Asunto: Re: [exim] DoS attack with nested MIME levels
On Thu, 14 Jul 2005, Mark Nipper wrote:

> On 14 Jul 2005, Michael Haardt wrote:
> > out of the blue, I am getting a bunch of mails with a very deep MIME
> > nesting and an "email-info.scr" file inside.

[...]
> > Any idea what that crap is?
>
>     I'd also be very interested in feedback on this issue as
> I've had the exact same situation crop up just recently. 


I've generally found that the first step when confronted by such stuff
is to type the offending attachment filename into a search engine and
see what comes up. This seems to be no exception, and a mere glance
at the first two or three hits at google indicates that this is almost
certainly a phishing attempt.

> This results in an error message which the remote side encapsulates
> in one additional layer of MIME, and then tries to attempt delivery
> again to my end!


Are you implying that the envelope sender of the original abusive mail
is one of your own email addresses? Then that would seem to be quite
a reasonable handle on which to catch it in the first place, without
even proceeding to the DATA stage and AV scanning.

>     As far as I've read, the remote end is in error here and
> should have stopped attempting delivery after the first 5xx level
> error message resulting in an undeliverable message or some such
> frozen in the remote SMTP queue.


In this kind of situation where the remote MTA hasn't managed to
identify the item as abusive, I'd expect it to compose a non-delivery
report (i.e with a null envelope sender) addressed to the original
envelope-sender. At that point, the chain should stop. If it
doesn't, something is very wrong at their end.

If in fact it's composing these non-delivery reports with non-null
envelope senders, then we'd blacklist those envelope senders as being
a misuse of mail procedures. If it's obvious that the reports are
being generated by bogus virus alert software - most recent example
seen here being Symantec_AntiVirus_for_SMTP_Gateways@??? - then
we have a specific rejection message for them, otherwise we'd just use
our routine blacklisting message (and possibly inform their
postmaster, if we deemed it beneficial to us to do so).


As a general comment, we experience quite a number of problems with
sites at which our users have email addresses which they've forwarded
to us - sites whose anti-abuse measures are significantly less
effective than ours. In effect, the forwarding MTA is "laundering"
abusive mail, and offering it to us in a way that defeats several of
our normal anti-abuse measures, mostly those which take effect without
the overhead of having to actually scan the data. We've tried several
strategems to deal with a few of the sites that are of most importance
to our users, but none of the strategems have been without their
problems, I'm afraid.

best regards