<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Connection to Earthlink mail servers blocked by Snort in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4003860#M17981</link>
    <description>&lt;P&gt;I was simply relying on the info from ARIN which shows Roswell High School as the owner of the IP with registration dating back to 1999. I suppose the info could be wrong but I have no better methods/tools that are free to check this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://rdap.arin.net/registry/ip/207.69.189.224" target="_blank"&gt;https://rdap.arin.net/registry/ip/207.69.189.224&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Dec 2019 04:34:10 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2019-12-27T04:34:10Z</dc:date>
    <item>
      <title>Connection to Earthlink mail servers blocked by Snort</title>
      <link>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4002050#M17957</link>
      <description>&lt;P&gt;I received a complaint from a user who cannot send from his corporate email account to his Earthlink mail account. After tracing all the steps where a connection could be blocked, I isolated it to the firepower. Apparently Snort believes the server as a bad reputation.&lt;/P&gt;&lt;P&gt;I checked a few IPs on Talos and they are (or were) definitely blacklisted. EG:&lt;/P&gt;&lt;P&gt;&lt;A href="https://talosintelligence.com/reputation_center/lookup?search=207.69.189.229" target="_blank" rel="noopener"&gt;https://talosintelligence.com/reputation_center/lookup?search=207.69.189.229&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Interestingly enough, if I check by the corresponding machine name, it comes back as trusted.&lt;/P&gt;&lt;P&gt;&lt;A href="https://talosintelligence.com/reputation_center/lookup?search=mx6.earthlink.net" target="_blank" rel="noopener"&gt;https://talosintelligence.com/reputation_center/lookup?search=mx6.earthlink.net&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is a new one on me. Is this a Cisco or Earthlink problem and is there a way to whitelist just the relevant MX IPs?&lt;/P&gt;&lt;P&gt;Sample Trace&lt;/P&gt;&lt;P&gt;-- packet-tracer input DMZ-INT tcp 198.204.112.74 54321 207.69.189.229 25)&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 198.204.115.1 using egress ifc OUTSIDE-INT&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit tcp ifc DMZ-INT object-group mta-dmz any4 eq smtp rule-id 268435642&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268435642: ACCESS POLICY: RR-CO-AC - Default&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268435642: L7 RULE: acl_dmz1#64&lt;BR /&gt;object-group network mta-dmz&lt;BR /&gt;description: MTAs in the DMZ&lt;BR /&gt;network-object 198.204.112.74 255.255.255.255&lt;BR /&gt;network-object 172.21.6.10 255.255.255.255&lt;BR /&gt;network-object 198.204.112.91 255.255.255.255&lt;BR /&gt;network-object 172.21.6.72 255.255.255.255&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-198.204.112.0&lt;BR /&gt;nat (DMZ-INT,OUTSIDE-INT) static obj-198.204.112.0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 198.204.112.74/54321 to 198.204.112.74/54321&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 619176969, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Packet: TCP, SYN, seq 580167530&lt;BR /&gt;Session: new snort session&lt;BR /&gt;Reputation: packet blacklisted, drop&lt;BR /&gt;Snort: processed decoder alerts or actions queue, drop&lt;BR /&gt;Snort detect_sdrop: gid 136, sid 1, drop&lt;BR /&gt;Snort id 5, NAP id 2, IPS id 0, Verdict BLACKLIST, Blocked by SI/Reputation&lt;BR /&gt;Snort Verdict: (black-list) black list this flow&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ-INT&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OUTSIDE-INT&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (reputation) Blocked or blacklisted by the reputation preprocessor&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 17:19:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4002050#M17957</guid>
      <dc:creator>Stephen Carville</dc:creator>
      <dc:date>2019-12-20T17:19:48Z</dc:date>
    </item>
    <item>
      <title>Re: Connection to Earthlink mail servers blocked by Snort</title>
      <link>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4003246#M17973</link>
      <description>&lt;P&gt;There a few things to mention here:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You can always submit a dispute directly from the TALOS page&lt;/LI&gt;
&lt;LI&gt;I checked that IP in both Umbrella Investigate and VirtusTotal and both are reporting several malware samples associated with it:
&lt;UL&gt;
&lt;LI&gt;Virus Total:&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.virustotal.com/gui/ip-address/207.69.189.229/details" target="_blank"&gt;https://www.virustotal.com/gui/ip-address/207.69.189.229/details&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Umbrella Investigate:
&lt;UL&gt;
&lt;LI&gt;I cannot post a link since you need an account with Umbrella investigate. So, if you have one feel free to do the search&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;This particular IP appears to be assigned to&amp;nbsp;Roswell High School. Thus, the issue is not with the Service Provider but the actual consumer of the IP.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2019 20:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4003246#M17973</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2019-12-24T20:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Connection to Earthlink mail servers blocked by Snort</title>
      <link>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4003798#M17978</link>
      <description>&lt;P&gt;I checked Umbrella and it verified the MX IPs have been associated with malware recently so it looks like the blacklisting was justified. However, it seems to be lifted -- at least for the time being -- so the user can send emails normally.&lt;/P&gt;&lt;P&gt;The bit about Roswell High School is a little weird. I wonder if it is just a joke.&lt;/P&gt;&lt;P&gt;Anyway, thanks for the help.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2019 22:09:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4003798#M17978</guid>
      <dc:creator>Stephen Carville</dc:creator>
      <dc:date>2019-12-26T22:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: Connection to Earthlink mail servers blocked by Snort</title>
      <link>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4003860#M17981</link>
      <description>&lt;P&gt;I was simply relying on the info from ARIN which shows Roswell High School as the owner of the IP with registration dating back to 1999. I suppose the info could be wrong but I have no better methods/tools that are free to check this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://rdap.arin.net/registry/ip/207.69.189.224" target="_blank"&gt;https://rdap.arin.net/registry/ip/207.69.189.224&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2019 04:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-to-earthlink-mail-servers-blocked-by-snort/m-p/4003860#M17981</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2019-12-27T04:34:10Z</dc:date>
    </item>
  </channel>
</rss>

