We'd love to hear about it! Click here to go to the product suggestion community
I installed Sophos XG 17.5 on a Sophos XG in HA Active/Passive Cluster.
Yesterday and today we received several E-Mails from email@example.com to our internal domain firstname.lastname@example.org.
SPF-Records are set for domain.com.
The E-Mail was sent from an external adress that doesn't match the SPF-Record.
All these mails were accepted without restrictions or filtered out as beeing probable Spam.
The Policy is configured accordingly and SPF Check is activated in the Policy.
It looks like SPF isn't checked at all.
I already opend a ticket with our Distribution and waiting for response.
Anyone here experiencing the same?
Can you show us the mail header of this email?
Maybe they only spoof the FROM?
In reply to LuCar Toni:
This is the header (anonymized) of an example Mail that got through:
Received: from mail.domain.com (192.168.2.222) by SBSPZ2011.domain.local (192.168.2.2) with Microsoft SMTP Server (TLS) id 14.3.382.0; Thu, 6 Dec 2018 11:25:35 +0100Received: from emkei.cz ([188.8.131.52]:51434 helo=localhost) by mail.domain.com with esmtps (TLSv1.2:AECDH-AES256-SHA:256) (Exim 4.91) (envelope-from <email@example.com>) id 1gUqqF-0001Vp-Hs for firstname.lastname@example.org; Thu, 06 Dec 2018 11:25:11 +0100Received: by localhost (Postfix, from userid 33) id F2BE6D5CF7; Thu, 6 Dec 2018 11:25:10 +0100 (CET)To: <email@example.com>Subject: Test FakemailFrom: Administrator <firstname.lastname@example.org>X-Priority: 3 (Normal)Importance: NormalErrors-To: email@example.comReply-To: <firstname.lastname@example.org>Content-Type: text/plain; charset="utf-8"Message-ID: <20181206102510.F2BE6D5CF7@localhost>Date: Thu, 6 Dec 2018 11:25:10 +0100X-Sophos-IBS: successX-CTCH-PVer: 0000001X-CTCH-Spam: UnknownX-CTCH-VOD: UnknownX-CTCH-Flags: 0X-CTCH-RefID: str=0001.0A0C0207.5C08F907.00BE,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0X-CTCH-Score: 0.000X-CTCH-ScoreCust: 0.000X-CTCH-Rules:X-Sophos-Firewall: smtpd v1.0MIME-Version: 1.0Return-Path: email@example.comX-MS-Exchange-Organization-AuthSource: SBSPZ2011.domain.localX-MS-Exchange-Organization-AuthAs: Anonymous
The same mail that came through on this domain was catched by Office 365 in SPF Check.
In reply to Bjoern Ebner:
In my Tests during Beta, SPF was working. Unfortunatedly, anonymized Mailheaders do not help in this case... Nobody can proof how the SPF Record looks like...
In UTM's world softfail was ignored. Maybe your customer is using softfail as well instead of hardfail (~ instead of -).
Additionally, you should provide Logfiles to your Partner (/log/smtpd_main.log) and name him a Timestamp where this mail was sent. This will help for further troubleshooting (cause here we cannot due to lack of informations).
Edit: Just found your Support Case in our system. It's not configured to be softfail on this Domain. As seen, my colleague is allready helping you. I'll let him do his work :-)
In reply to HuberChristian:
I'm waiting for his response.
It's kind of strange that it doesn't work.
Maybe I do misunderstand the configuration completely or something is not working as it should be.
Just wanted to see if there are others were SPF does or doesn't work. :)
SPF Checking seems to work fine if any external address is used as sender.
It doesn't semm to work when as sender an internal domain is used for which a smtp policy is present.
Maybe you have configured any exception for this on a Domain Level, which is skipping SPF ?
Previously there was an exception but to skip SPF.
Currently there is no exception for this domain.
I could reproduce the same behaviour on Sophos UTM 9.510.
Meanwhile I tested with XG17.5 and https://emkei.cz as fakemailer as you did.
First mail was dropped because emkei.cz uses inproper RDNS (localhost instead of something valid.)
Switched RDNS-Check off in my XG.
Second mail was dropped because of Greylisting.
Switched this off in my XG.
Third mail was dropped because lack of authentication (It's a Mail of my domain, but the user did not authenticate, so it was dropped).
If you switched off all those protection features, I can well imagine you do have issues recieving that kind of spam... Furthermore you maybe should check what you configured under "Host based relay".
Any shouldn't be in there :)
I know that this Fake Mailer doesn't have a valid RDNS Entry.
I just disabled it to be able to test it with this Fake Mailer.
The original mail, that was the reason I started testing, did have a valid RDNS Entry, so that wouldn't have helped.
Greylisting is currently turned off because it often takes some time for mails to get delived, which is the downside of this mechanism.
Do you mean a authenticated relay, when you mention authentication?
I'm using Host Based Relays, which doesn't stop that. ;)