Bill Hayles wrote:
> Hi, Bill,
>
> On Sat, 09 Apr 2011 12:39:47 +0000 in message
> number<4DA05393.4090007@???>, received here on 09/04/2011
> 15:38:28, W B Hacker<wbh@???> said:
>
>> Bill Hayles wrote:
>>> Hi, fellow Bill,
>>
>> Greets..
>>
>> ;-)
>>
>> *snip*
>>
>>>> will eventually show up.. see below in re rDNS.
>>>
>>> OK, not strictly Exim related, but one of my hobbyhorses. If you
>>> do that, you block a lot of legitimate servers (including
>>> mine!).
>>
>> Not so! I AM running Exim rDNS check, and did NOT block your
>> direct OFF tahini response.
>>
>> You(r server) passed the rDNS check for the IP from whence you
>> connected: craybox.com .....on 80.35.22.107.
>>
>> From *manual* inspection with 'host' and 'dig', one could argue
>> that you should NOT have passed...
>
> Interesting, and thanks for the test. It could be said that I should
> use the rDNS result as my primary_hostname, but I don't really want
> to do that.
Perhaps not - but there IS a middle-ground.
A single IP is permitted PTR RR for more than one <domain>.<tld>
>
>
>> .... but Exim's rDNS checking is very 'wise' w/r not rejecting
>> unless it has to..
>
> Fair enough. You know much more about this than me.
>>
Don't count on THAT. Old age and 'Irish Alzheimer's here...
;-)
>>> Also, this approach does not catch spam mail from infected
>>> computers (of which I get plenty).
>>
>> Oh, but it DOES! Near-as-dammit 100% of it.
>
> I think you're teaching me something, and there's something I'm not
> understanding. Correct me if I'm wrong.
>
> I have a (now former) former mailing list subscriber. Let's call
> them pest@???. For the last couple of weeks, this address has
> been sending me 20 or 30 spam messages per day from 65.54.190.140,
> which resolves to hotmail.com. I thought that the easiest way for me
> to deal with them is to reject them via a simple deny message.
>
*snip*
>> user's 'Win-desktop'.
>
> That's what I'm dealing with here.
>>
>> Those are *nearly always* on dynamic IP with no PTR RR, hence no
>> way to reverse that IP via a PTR RR to an A or MX record match.
>
> Agreed, but that isn't showing up in the Exim logs. The lines are
> similar to
>
> 2011-04-02 11:57:37 1Q6gXQ-0003pj-33<= pest@???
> H=(bay0-omc3-s2.bay0.hotmail.com) [65.54.190.140] P=esmtp S=6227
> id=BAY146-w3525C2A940475E432B764CA4A30@???
>
>> Those WILL fail Exim's rDNS check. As they should do.
>
> But the example above won't, unless I've misunderstood something.
Not to confuse - rDNS works, BUT ... this particular example appears to
NOT be flawed server credentials, but rather an abuse OF that server BY
an attack vector of a different sort.
'Page TWO':
It appears to be a WinCrobe that has captured the login UID:PWD of a
legitimate hotmail account holder and is using hotmail as a 'smarthost'.
AND/OR
.. is surreptitiously injecting messages into the (equivalent of) the
local MUA's outbound queue, ('outbox') effectively 'piggybacking' them
onto legitimate traffic when manually sent, ELSE fired-off by a timed
cleanup runner. Or BOTH.
AND/OR
.. may NOT be the box of that list member, but rather ANOTHER member's
WinBox using their credentials but masquerading from a random walk of a
compromised auto-built address book.
ANY of those MAY get a response from the *compromised* user (who may not
be the 'apparent' sender [1]) OR from MSN Hotmail admins.
IF reported accurately and politely.
UNTIL it gets cleaned up at the source, however, rather than block all
of hotmail or even that one server in their pool, one may use a very
specific match.
If you already have such, fine.
Otherwise, the example below may be modified.
As shown, it looks for a characteristic of messages that come in via
several different compromised WinBoxen using properly-credentialed MTA,
to virtually flood Hong Kong clients - appearing to tout rental office
space, hoping that SME thru large Enterprise owners and staff (a richer
target than schoolkids) will open them:
==
defer
regex = ^Subject:: office*
log_message = DS01B office rental scam rejected
==
You can do a regex on whatever is most consistent/least likely to false.
CAVEATS:
- regex is not the cheapest of tests.
- 'warn' first, tail the logs. Then 'defer' instead of 'deny' and tail
the logs again, and often enough to back it out if it is falsing.
Bill
[1] Check the Message_ID and other MUA 'fingerprints' by grep of the
list archives. The 'apparent' perp won't respond favorably if being
framed for the infection on someone ELSE's Winbox!