However, in theory it would be possible that a spammer operation could
set up their own domain on M365 and configure it to use our outgoing
email server, as my only access control currently is the IP netblocks.
This could be prevented if I only accepted from those neblocks emails
that also originate from our own domain(s).
Unfortunately M365 does not seem to support any (standard) method of authentication for the outgoing mail server, it's a direct connection to
port 25 and that's pretty much it. Color me surprised.
However, in theory it would be possible that a spammer operation could
set up their own domain on M365 and configure it to use our outgoing
email server, as my only access control currently is the IP netblocks.
This could be prevented if I only accepted from those neblocks emails
that also originate from our own domain(s).
Am 08.11.2022 um 12:25:52 Uhr schrieb Otto J. Makela:
However, in theory it would be possible that a spammer operation
could set up their own domain on M365 and configure it to use our
outgoing email server, as my only access control currently is the IP
netblocks. This could be prevented if I only accepted from those
neblocks emails that also originate from our own domain(s).
And that isn't sufficient because the attacker could (if MS allows it)
set the MAIL FROM: to whatever they want.
This could be prevented if I only accepted from those neblocks emails
that also originate from our own domain(s).
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 493 |
Nodes: | 16 (2 / 14) |
Uptime: | 172:39:16 |
Calls: | 9,704 |
Calls today: | 4 |
Files: | 13,736 |
Messages: | 6,178,519 |