Author Topic: SMTP Smuggling  (Read 465 times)

0 Members and 1 Guest are viewing this topic.

Offline madiresTopic starter

  • Super Contributor
  • ***
  • Posts: 7769
  • Country: de
  • A qualified hobbyist ;)
SMTP Smuggling
« on: December 23, 2023, 04:04:39 pm »
Some security researchers had fun with SMTP's end-of-message sequence (<CR><LF>.<CR><LF>):
SMTP Smuggling - Spoofing E-Mails Worldwide (https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide)

A few MTAs accept variations of the end-of-message sequence, e.g. <CR>.<CR>, and enable an attacker to smuggle and spoof emails including SPF. GMX and Microsoft have fixed the security issue, while Cisco claims it's a feature. It can be configured by the customer, but the default setting is to allow messages with an invalid end-of-message sequence and to convert it into the standard format.
 

Offline Halcyon

  • Global Moderator
  • *****
  • Posts: 5681
  • Country: au
Re: SMTP Smuggling
« Reply #1 on: December 24, 2023, 09:13:22 am »
So the takeaway is, implement a strong DMARC policy (which is the default recommendation on all reputable email services, including Google Workspace, Microsoft 365 etc...).

For those on M365, set up a mail flow rule that actually rejects emails that fail DMARC (as opposed to going to Quarantine). Microsoft in their wisdom ignore the p=reject tag and decide to do their own thing.

Sysadmins that think their mail servers that they set up 15 years ago are still secure need to reconsider their profession.
 

Offline madiresTopic starter

  • Super Contributor
  • ***
  • Posts: 7769
  • Country: de
  • A qualified hobbyist ;)
Re: SMTP Smuggling
« Reply #2 on: December 24, 2023, 11:59:19 am »
... after an extensive period of testing. SPF is pretty simple, but DKIM causes headaches. Some large mail hosters do stupid things which break the DKIM check when receiving emails. For example, one mail hoster adds a specific header line if it's not set already. When the sender MTA signs the non-existence of that header line in DKIM, the mail hoster's MTA adds the header line and the DKIM verification fails. Also, the RFCs for DKIM are sloppy and a few mail hosters have created their own standards.
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf