Guys,
I recently updated our installation to the current 4.2.1, and I'm wondering if you have an idea how I can prevent a particular kind of spoof. I'm using blacklists / RBL / SPF / Spamtrap / Tarpitting as well as requiring secure connections where possible, and largely this has worked out well to keep my server secure. However, I recently got a spam that I'm not clear on as far as how it passed through:
SMTP excerpt (I put in [real address] and [obviously bad domain] to replace some identifying strings):
Tue, 06 Dec 2016 10:39:07 -> 84.255.249.10 -> Success: Action=[Accept Connection], Details=[Port 25]
Tue, 06 Dec 2016 10:39:07 -> 84.255.249.10 -> Success: Action=[Received Hello], Details=[Host=84-255-249-10.static.t-2.net]
Tue, 06 Dec 2016 10:39:08 -> 84.255.249.10 -> Success: Action=[Received Sender], Details=[untutoredllzr@[obviously bad domain].com]
Tue, 06 Dec 2016 10:39:10 -> 84.255.249.10 -> Success: Action=[SPF Check], Details=[Domain=[obviously bad domain].com, Result=NONE]
Tue, 06 Dec 2016 10:39:10 -> 84.255.249.10 -> Success: Action=[Received Recipient], Details=[[real address]@audiosears.com]
Tue, 06 Dec 2016 10:39:10 -> 84.255.249.10 -> Success: Action=[Received Recipient], Details=[[real address]@audiosears.com]
Tue, 06 Dec 2016 10:39:10 -> 84.255.249.10 -> Success: Action=[Received Recipient], Details=[[real address]@audiosears.com]
Tue, 06 Dec 2016 10:39:10 -> 84.255.249.10 -> Success: Action=[Start Mail Transaction]
Tue, 06 Dec 2016 10:39:11 -> 84.255.249.10 -> Success: Action=[Bayesian Scoring], Details=[Score=50.62%]
Tue, 06 Dec 2016 10:39:11 -> 84.255.249.10 -> Success: Action=[Complete Mail Transaction], Details=[From Host=84-255-249-10.static.t-2.net, Size=2 KB, From=untutoredllzr@[obviously bad domain].com, To=[real address]@audiosears.com;[real address]@audiosears.com;[real address]@audiosears.com]
Tue, 06 Dec 2016 10:39:11 -> 84.255.249.10 -> Success: Action=[Close Connection]
The fact that this email came through in and of itself is ok (the filters can't stop everything), but viewing the source of this email, the sender address is NOT untutoredllzr@[obviously bad domain].com but is instead one of our mailing list addresses, in which the box for 'Enable SMTP Sender' is NOT checked (none of our mailing list addresses are enabled for this):
Received: from 84-255-249-10.static.t-2.net ([84.255.249.10]) by mail.audiosears.com
with SMTP (Code Crafters Ability Mail Server);
Tue, 06 Dec 2016 10:39:10 -0500
Message-ID: <HHKA1951.5080861@[obviously bad domain].com>
Date: Tue, 6 Dec 2016 15:53:57 +0100
From: "[real mailing list address]@audiosears.com" <[real mailing list address]@audiosears.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: <[real address]@audiosears.com>
Subject: RE: RE: insurance
Content-Type: multipart/alternative;
boundary="------------010107070709000707020804"
This is a multi-part message in MIME format.
--------------010107070709000707020804
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
So I'm guessing one of two things happened; (1) the current version of AMS may not be checking properly to make sure mailing lists aren't being used as SMTP senders when not set up that way or (2) there's some level of spoof here where the sender is changing the to: address AFTER the antispam checks are performed. If the scenario is (2), is there a way to ensure that a SMTP sender cannot change the to: address midstream (much less use a to: address that should be unusable in this case)?