handmade.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
handmade.social is for all handmade artisans to create accounts for their Etsy and other handmade business shops.

Server stats:

35
active users

#smtp

0 posts0 participants0 posts today
Peter N. M. Hansteen<p>I thought I had seen it all when it comes to mail delivery and security issues. </p><p>But this morning I was introduced to the fact that there are Exchange admins who will implement a rule that all incoming mail from outside their own organization should be flagged as potentially dangerous and presented to the user with the option to block sender and no option to mark the message or the sender as valid.</p><p>Yes, that for every single message.</p><p><a href="https://mastodon.social/tags/exchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exchange</span></a> <a href="https://mastodon.social/tags/smtp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smtp</span></a> <a href="https://mastodon.social/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.ie/@Ciela" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Ciela</span></a></span> <span class="h-card" translate="no"><a href="https://spookygirl.boo/@thelusciouslibra" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thelusciouslibra</span></a></span> I can recommend <span class="h-card" translate="no"><a href="https://monocles.social/@monocles" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>monocles</span></a></span> tho you should <em>never ever</em> rely on any <a href="https://infosec.space/tags/eMail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eMail</span></a> hoster, but <em>use <a href="https://infosec.space/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a></em> which is easier than ever thanks to <span class="h-card" translate="no"><a href="https://mastodon.online/@thunderbird" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thunderbird</span></a></span> on <a href="https://infosec.space/tags/Desktop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Desktop</span></a> and <a href="https://infosec.space/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a>!</p><p>Also <a href="https://infosec.space/tags/monocles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monocles</span></a> does have a cool <a href="https://infosec.space/tags/eMail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eMail</span></a> client and don't demand extra for <a href="https://infosec.space/tags/IMAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMAP</span></a> &amp; <a href="https://infosec.space/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> as well as offering <a href="https://infosec.space/tags/PayPal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayPal</span></a>, <a href="https://infosec.space/tags/Stripe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stripe</span></a>, <a href="https://infosec.space/tags/SEPA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SEPA</span></a> <a href="https://infosec.space/tags/WireTransfer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireTransfer</span></a>, <a href="https://infosec.space/tags/CashByMail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CashByMail</span></a> and <a href="https://infosec.space/tags/Monero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Monero</span></a> for payment, and they cost as little as €2 p.m.</p>
Florian Haas<p>Recent Thunderbird releases have added a "Redirect" option to the message forwarding context menu. However, using this feature doesn't set any of the Resent-* headers defined in RFC&nbsp;5322 sec.&nbsp;3.6.6, so functionally this is no different from a normal email forward.</p><p>Clearly I'm misunderstanding what the feature is meant to do. Anyone clued in enough to be able to fill me in?</p><p><a href="https://datatracker.ietf.org/doc/html/rfc5322#section-3.6.6" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/html/</span><span class="invisible">rfc5322#section-3.6.6</span></a></p><p><a href="https://mastodon.social/tags/Thunderbird" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Thunderbird</span></a> <a href="https://mastodon.social/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://mastodon.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> <a href="https://mastodon.social/tags/RFC5322" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC5322</span></a></p>
Patryk Krawaczyński<p>SMTP Smuggling Attack ( <a href="https://nfsec.pl/ai/6561" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nfsec.pl/ai/6561</span><span class="invisible"></span></a> ) <a href="https://infosec.exchange/tags/smtp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smtp</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/servers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>servers</span></a> <a href="https://infosec.exchange/tags/twittermigration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>twittermigration</span></a> </p><p><a href="https://www.youtube.com/watch?v=P1Jjz-1EskY" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=P1Jjz-1Esk</span><span class="invisible">Y</span></a></p>
Stahlbrandt<p>If your domain is bsky.app and you are using amazon <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> for your <a href="https://infosec.exchange/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> services and your mail server is spam listed when required for such high priority activities as account <a href="https://infosec.exchange/tags/verification" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>verification</span></a>, you have an issue, and a <a href="https://infosec.exchange/tags/systemdesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systemdesign</span></a> <a href="https://infosec.exchange/tags/flaw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flaw</span></a>. Even more so if the said server was spam listed for 6 times in the last three months. <a href="https://infosec.exchange/tags/bluesky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bluesky</span></a> <a href="https://infosec.exchange/tags/fail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail</span></a> <a href="https://infosec.exchange/tags/esmtp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esmtp</span></a> <a href="https://infosec.exchange/tags/smtp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smtp</span></a> <a href="https://infosec.exchange/tags/spamcop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spamcop</span></a> <a href="https://infosec.exchange/tags/blacklist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blacklist</span></a></p>
David Bisset<p>For <a href="https://phpc.social/tags/developers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>developers</span></a>:</p><p>MailCatcher runs a super simple <a href="https://phpc.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> server - run this and set your favourite app to deliver to smtp://127.0.0.1:1025 instead of your default SMTP server, then check out in browser http://127.0.0.1:1080 to see the mail that's arrived so far.</p><p><a href="https://mailcatcher.me/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">mailcatcher.me/</span><span class="invisible"></span></a> <a href="https://phpc.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a></p>
Jonathan Kamens<p><a href="https://federate.social/tags/TFW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TFW</span></a> you don't receive the email from <a href="https://federate.social/tags/CVS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVS</span></a> with the record of your recent vaccination, and when you dig into why, it turns out it's because the <a href="https://federate.social/tags/Salesforce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Salesforce</span></a> mail server sending the emails doesn't have a DNS record for its host name so your mail server, like many other properly configured mail servers all over the internet, rejects its emails as spam.<br>Why are people so bad at their jobs?<br><a href="https://federate.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> <a href="https://federate.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a></p>
C.<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> </p><p>The update results in <a href="https://mindly.social/tags/Exchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exchange</span></a> <a href="https://mindly.social/tags/crashing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crashing</span></a> and being unable to deliver <a href="https://mindly.social/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> reliably.</p><p><a href="https://mindly.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> is currently working on a method for <a href="https://mindly.social/tags/sysadmins" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmins</span></a> to determine if the update is affecting their servers in this way, of if it's just normal Exchange operation.</p><p><a href="https://mindly.social/tags/MSExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSExchange</span></a> <a href="https://mindly.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> <a href="https://mindly.social/tags/bug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bug</span></a> <a href="https://mindly.social/tags/commentary" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commentary</span></a></p>
Harald Hannelius :verified:<p>A partner higher ed has a mailing list on <a href="https://mementomori.social/tags/ExchangeOnline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExchangeOnline</span></a> . So their <a href="https://mementomori.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> server contacts ours and says "Hello, here's an e-mail from your domain". Our <a href="https://mementomori.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> says no thanks (are we actually the only ones blocking based on SPF?). </p><p>The listserver should rewrite headers and use a return-path address from their domain. The From: header can have our user's emailaddress (think this breaks DKIM though?). </p><p>Good luck for our partner in fixing this on their end. They probably have to set up a <a href="https://mementomori.social/tags/MTA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MTA</span></a> and route all outgoing mail through that. Ms won't fix.</p>
Lukas Beran<p>Inbound SMTP DANE with DNSSEC for Exchange Online is generally available!</p><p>It can be configured via PowerShell and since December, it should be available also from Exchange admin center.</p><p>New accepted domains will start using the mx.microsoft domain instead of the mail.protection.outlook.com domain.</p><p>Some consumer Outlook domains have been already migrated, the remaining Outlook and Hotmail domains for consumer email is expected to be completed by the end of 2024.</p><p><a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/announcing-general-availability-of-inbound-smtp-dane-with-dnssec/ba-p/4281292" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcommunity.microsoft.com/t5</span><span class="invisible">/exchange-team-blog/announcing-general-availability-of-inbound-smtp-dane-with-dnssec/ba-p/4281292</span></a></p><p><a href="https://infosec.exchange/tags/smtp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smtp</span></a> <a href="https://infosec.exchange/tags/dane" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dane</span></a> <a href="https://infosec.exchange/tags/office365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>office365</span></a> <a href="https://infosec.exchange/tags/exchangeonline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exchangeonline</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://freiburg.social/@ditol" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ditol</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.world/@samueljohn" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>samueljohn</span></a></span> <span class="h-card" translate="no"><a href="https://23.social/@linuzifer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>linuzifer</span></a></span> </p><p><em>THIS</em> is where I disagree...</p><p>You may think it's elitist, but if people are too lazy to learn even fundamentals like how to use <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a> then maybe they should just not do <a href="https://infosec.space/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> at all?</p><ul><li>Like: We expect people to show at the every least theoretical proficiency in terms of <a href="https://infosec.space/tags/TrafficCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrafficCode</span></a> and <a href="https://infosec.space/tags/VehicleSafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VehicleSafety</span></a> in +every juristiction I'm aware of* and literally mandated <a href="https://infosec.space/tags/DrivingLicense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DrivingLicense</span></a>|s for that reason.</li></ul><p>I'll gladly teach <a href="https://infosec.space/tags/TechIlliterates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechIlliterates</span></a> but I won't waste my time on <a href="https://infosec.space/@kkarhan/113344834546549105" rel="nofollow noopener noreferrer" target="_blank">people that spread disinfo</a>...</p><p>It's 2024: <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> has been out for over a decade and there are a shitload of guides ranging from written documentation to Zoomer-friendly TikTok-Style shorts on how to get started.</p><ul><li><p>I don't expect people to do <a href="https://infosec.space/tags/airgapped" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>airgapped</span></a> <a href="https://www.youtube.com/watch?v=vdab4T_CoN8" rel="nofollow noopener noreferrer" target="_blank">pffline-PGP</a> but with <span class="h-card" translate="no"><a href="https://mastodon.online/@thunderbird" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thunderbird</span></a></span> including <a href="https://infosec.space/tags/Enigmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Enigmail</span></a> and not requiring any external dependencies like the god-awful <a href="https://infosec.space/tags/GPG4Win" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPG4Win</span></a> stuff's easier than ever.</p></li><li><p>Same with <a href="https://infosec.space/tags/mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobile</span></a>: <a href="https://infosec.space/tags/Appls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Appls</span></a> like <span class="h-card" translate="no"><a href="https://monocles.social/@monocles" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>monocles</span></a></span> / <a href="https://infosec.space/tags/monoclesChat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monoclesChat</span></a> are so easy, I've been able to onboard literal tech-illiterates remotely with few steps and <a href="https://docs.monocles.eu/apps/chat.app/" rel="nofollow noopener noreferrer" target="_blank">simple instructions</a>. </p></li></ul><p>FOR THE LAST TIME: </p><p>*STOP MAKING EXCUSES TO JUSTIFY ESCALATING COMMITMENT TO EVIDENTLY BAD SOLUTIONS!"</p><ul><li>Cuz <a href="https://web.archive.org/web/20240000000000*/https://twitter.com/thegrugq/status/1085614812581715968" rel="nofollow noopener noreferrer" target="_blank">when push comes to shove</a> <span class="h-card" translate="no"><a href="https://mastodon.world/@Mer__edith" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Mer__edith</span></a></span> herself would introduce a <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Govware</span></a> <a href="https://infosec.space/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> into <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>signalapp</span></a></span> when faced with indefinite jailtime...</li></ul><p>Whereas with <a href="https://infosec.space/tags/SelfCustody" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfCustody</span></a> of all the keys as well as <a href="https://infosec.space/tags/ReproduceableBuilds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReproduceableBuilds</span></a> and <em>real</em> <a href="https://infosec.space/tags/decentralization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decentralization</span></a>, this would be evidently impossible even if all the devs wanted to comply honestly and not just because they could be held at gunpoint.</p><ul><li><a href="https://infosec.space/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> is not your friend. It's merely a tax-exempt <em>"non-profit"</em> corporation, and corporations are explicitly nobodys friend - espechally when they demand <a href="https://infosec.space/tags/PII" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PII</span></a> like <a href="https://infosec.space/@kkarhan/111968251463697943" rel="nofollow noopener noreferrer" target="_blank">phone numbers</a> for useage.</li></ul><p>Compare that to <a href="https://infosec.space/tags/monocles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monocles</span></a> where you do pay like €2 p.m. but in return get <a href="https://infosec.space/tags/standard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>standard</span></a> <a href="https://infosec.space/tags/protocols" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protocols</span></a> like <a href="https://infosec.space/tags/IMAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMAP</span></a>, <a href="https://infosec.space/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> &amp; <a href="https://infosec.space/tags/XMPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XMPP</span></a> and <a href="https://monocles.eu/more/#payment-section" rel="nofollow noopener noreferrer" target="_blank">can pay anonymously</a> and not have to provide any PII whatsoever!</p><ul><li>And unlike <a href="https://infosec.space/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> they ain't dependent on <a href="https://infosec.space/tags/VC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VC</span></a> funding and <a href="https://infosec.space/tags/grant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>grant</span></a> money to keep the lights on.</li></ul><p>Make of that what you will, but just like allowing flatearthers to roam freely without caretaker supervision doesn't make the world less round, so won't the facts change about <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a>, <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a> &amp; <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a>. </p><ul><li>The only reason Signal is still online and not <a href="https://infosec.space/tags/pwned" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pwned</span></a> like <a href="https://infosec.space/tags/EncroChat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EncroChat</span></a> is because it's either a Sting op like <a href="https://infosec.space/tags/AN%C3%98M" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ANØM</span></a> aka. <a href="https://infosec.space/tags/OperationIronside" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationIronside</span></a> aka. <a href="https://infosec.space/tags/OperationTr%C3%B8janShield" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationTrøjanShield</span></a> or they have already backdoored their <a href="https://infosec.space/tags/backend" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backend</span></a> so hard that all their <a href="https://infosec.space/tags/marketing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>marketing</span></a> is just <a href="https://infosec.space/tags/lies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lies</span></a> like <a href="https://infosec.space/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a>...<br></li></ul><p>Because all <a href="https://infosec.space/tags/centralized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>centralized</span></a>, <a href="https://infosec.space/tags/SingleVendor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingleVendor</span></a> &amp; <a href="https://infosec.space/tags/SingleProvider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingleProvider</span></a> solutions are bad, and if they don't even allow for <a href="https://infosec.space/tags/SelfCustody" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfCustody</span></a> then they are just a <a href="https://infosec.space/tags/grift" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>grift</span></a> to <a href="https://infosec.space/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> tech-illiterates that don't know and/or don't care! </p><p><a href="https://infosec.space/tags/thxbye" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thxbye</span></a> <a href="https://infosec.space/tags/EOD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EOD</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Critical <a href="https://hachyderm.io/tags/Zimbra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zimbra</span></a> <a href="https://hachyderm.io/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> flaw exploited to backdoor servers using <a href="https://hachyderm.io/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a><br>The Zimbra remote code execution flaw is tracked as CVE-2024-45519 and exists in Zimbra's postjournal service, which is used to parse incoming emails over <a href="https://hachyderm.io/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a>. Attackers can exploit the vulnerability by sending specially crafted emails with commands to execute in the CC field, which are then executed when the postjournal service processes the email. <br><a href="https://www.bleepingcomputer.com/news/security/critical-zimbra-rce-flaw-exploited-to-backdoor-servers-using-emails/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-zimbra-rce-flaw-exploited-to-backdoor-servers-using-emails/</span></a></p>
David Cantrell 🏏<p>The approximately four generations deprecated VM that handles my email is finally being killed off by my ISP, and I can't really say that I blame them. I have about a month to find a new email provider for <a href="https://fosstodon.org/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> and <a href="https://fosstodon.org/tags/IMAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMAP</span></a>. No, I'm not going to host it myself again. Suggestions? So far <a href="https://fosstodon.org/tags/Fastmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fastmail</span></a> looks like it's not complete and utter dogshit although obviously it will never be as capable as my tangled mess of custom <a href="https://fosstodon.org/tags/exim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exim</span></a> and <a href="https://fosstodon.org/tags/procmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>procmail</span></a>.</p>
Lukas Beran<p>Inbound SMTP DANE (DNS-Based Authentication of Named Entities) is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server’s encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).</p><p>By default, SMTP doesn’t guarantee encryption, which makes it vulnerable to man-in-the-middle attacks. To secure email communication, SMTP can use STARTTLS, which upgrades a plain text connection to an encrypted one. However, STARTTLS by itself doesn’t verify the authenticity of the receiving mail server’s certificate, leaving it vulnerable to attacks where a malicious entity might impersonate the server.</p><p>DANE addresses this issue by enabling domain owners to publish their mail server’s encryption certificates in DNS records, which are protected by DNSSEC (Domain Name System Security Extensions). This allows sending mail servers to verify the authenticity of the receiving mail server’s certificate before establishing an encrypted connection.</p><p>When an email is received, the receiving mail server uses DANE to publish its certificate in the DNS, allowing the sending server to check the certificate’s validity before establishing a secure TLS connection. This ensures that emails are delivered over an encrypted connection and that the encryption certificate is trustworthy and has not been tampered with.</p><p><a href="https://www.cswrld.com/2024/09/how-to-turn-on-inbound-smtp-dane-in-office-365/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cswrld.com/2024/09/how-to-turn</span><span class="invisible">-on-inbound-smtp-dane-in-office-365/</span></a></p><p><a href="https://infosec.exchange/tags/smtp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smtp</span></a> <a href="https://infosec.exchange/tags/dane" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dane</span></a> <a href="https://infosec.exchange/tags/inbound" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>inbound</span></a> <a href="https://infosec.exchange/tags/office365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>office365</span></a> <a href="https://infosec.exchange/tags/exchangeonline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exchangeonline</span></a> <a href="https://infosec.exchange/tags/dnssec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnssec</span></a> <a href="https://infosec.exchange/tags/cswrld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cswrld</span></a></p>
Gregory Shapiro :donor:<p>Greetings, time for my <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a>!</p><p>I’m a security and infrastructure technologist who lives in the Northern California Bay Area and works at <a href="https://infosec.exchange/tags/Proofpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proofpoint</span></a>. Outside of work, I assist in maintaining open source <a href="https://infosec.exchange/tags/sendmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sendmail</span></a> and am a <a href="https://infosec.exchange/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> committer. For my fellow geeks, my favorite protocols are <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a>, <a href="https://infosec.exchange/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a>, and <a href="https://infosec.exchange/tags/XMPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XMPP</span></a>.</p><p>When I'm not buried in my laptop, I like to travel and hang out with my partner and our two dogs.</p>