From: | Paul |
---|---|
Date: | 5/29/16 12:51 PM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
Hi all, Whilst checking the security logs on my actual mailserver (not the Xeams server) I noticed this huge amount of failed SMTP login attempts: ----- This is just a tiny sample, it's been going on for quite some time, with hundreds attempts every day. Is there something I might be overlooking (I'm by no means a Linux connoisseur :) , or is someone or something actually trying to abuse my mail server from my Xeams server? Thanks!,
|
|
Top |
From: | Dave |
---|---|
Date: | 6/5/16 5:26 PM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
You are suffering a dictionary attack from "outside", you are getting these message because these users don't exist on your PC. |
|
Top |
From: | Paul |
---|---|
Date: | 6/7/16 11:59 AM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
Hi Dave,
Thanks for your feedback, it indeed looks like some sort of (dictionary / brute force) attack. I'm not really a network security specialist, I'm weeding through firewall logs to find something relevant. The weird thing (to me) is that these attempts originate from the internal IP of my Xeams server, according to the log of my actual mail server. They both are in the same LAN, behind 2 firewalls, a software appliance Sophos UTM and a hardware WatchGuard. Only port 25 is forwarded / DNAT'd to the internal IP address of the Xeams server. As soon as I disable the port forwarding, the attack attempts do stop from showing up in my mail server logs. I then use the SMTP proxy of the Sophos UTM (which is very nice btw & free in the UTM Home Edition), and no more attacks. I updated the Xeams server (Linux Ubuntu) to the latest release LTS version & patches, same issue afterwards. What I dont understand is how this attack is able to get through the firewall via port 25 TCP and then originate this dictionary attack from Xeams IP to my actual mail server.
tbh, I will stop using Xeams as long as I haven't figured this out and until I have secured this breach properly.
Thanks, Paul. |
|
Top |
From: | Dave |
---|---|
Date: | 6/7/16 2:49 PM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
Hi Paul These attacks will get through and there is nothing you can do about it! SMTP works on port 25 and ANYTHING sent to this port will pass through a firewall. If it is an attempted "login" then it will reach you mail server (by way of Xeams) before it is "thrown out" as being incorrect - usually after a set number of retries that you specify. If as in the case I am plagued with someone just send "Syn" requests to Xeams they will appear as "Intrusion detections" and just cause wasted bandwidth while Xeams tries to make sense of them. There is no real way of stopping any of these other than in your case where you are running Linux when there are programs which will modify your firewall setting to "ban" the IP address that is used. There is a freeware program to do this (I can't remember the name as I only use windows) but this would be a solution for you - the length of time that the IP address is "banned" for is something you can set and this would enable you to say after three or so attempts block the IP address for10 to 15 mins. The attacker will of course change the spoofed address BUT as you will be changing it after three attempts they will soon run out of addresses or get bored. This program could intercept the attempts before they reached Xeams again and would just need to read the invalid password attempts log as it's input. |
|
Top |
From: | Paul |
---|---|
Date: | 6/9/16 8:07 AM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
Hi Dave,
Good idea indeed, I'll try and intercept these attempts at a higher level. Already figured out some IP ranges that are (still) trying to reach the IP of my Xeams server. It seems I can (relatively) easily single them out atm and block their range(s) -> xxx.yyy.*.*
Thanks, |
|
Top |
From: | dcol |
---|---|
Date: | 6/10/16 12:37 PM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
I ended up using Snort on my firewall to stop such attacks. The email server has a brute force filter, but I cannot use it because it will blacklist the Xeams IP and that stops all communication. You have to catch this on the front end like a firewall. But it would be nice to see Xeams add a new intrusion detection filter for these type attacks.
I use pfsense as my firewall and the pfblocker add-on practically eliminated most attacks since it blocks those countries that cause most of the issues. |
|
Top |
From: | Paul |
---|---|
Date: | 6/14/16 2:17 PM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
True, the brute force filter in Xeams is a nice option to have, where you even can set up the amount of bad password attempt before an IP gets blocked for 10 mins. But these attacks are not pointed at my Xeams server, those do also occur from time to time, but they're taken care of by the password attack filter & country IP range filter. The attacks are directed to my mailserver (= not Xeams) where Xeams sends the mails to after scanning, thats what I find so weird, the mailserver logs state this clearly. Internet <-> Edge Firewall <-TCP 25 DNAT-> Xeams Proxy <-Forward-> Actual Mailserver (not Xeams) |
|
Top |
From: | Richard Haakma |
---|---|
Date: | 7/4/16 12:52 AM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
With Xeams acting as a proxy it is just forwarding the early part of the SMTP conversation. It only does its filtering work once a full message has been received. So the external party's AUTH attempts are being fed straight through the proxy. It would be a good feature of Proxy Mode if it could prevent any form of AUTH attempt during the SMTP conversation.
|
|
Top |
From: | paul |
---|---|
Date: | 8/17/16 9:59 AM |
Topic: | Possible abuse originating from my Xeams server? |
Type: | General Discussions |
Post a follow up |
I found out that Xeams now offers the option to disable SMTP AUTH, which is great, thanks for that dear devs! I now get tons of these in the logs :-) I'm also using the SMTP proxy in Sophos UTM (Home free edition) as an extra check and buffer between XEAMS (frontend) and the actual mailserver (backend) Also the Sophos UTM checks mails for viruses with 2 engines, the Sophos and the Avira engine, thus an extra layer of protection.
Any other suggestions for (more/better) secure set-ups involving Xeams and where to put it in the mail-scanning chain would be most welcome :-) cheers
|
|
Top |