<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SMTP Server Non-standard Port Detection in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74159#M15060</link>
    <description>&lt;P&gt;Good afternoon.&amp;nbsp; We recently ran a nessus scan against our R80.30 3.10 gateways, and of the 8 that were scanned, 2 showed the below vulnerability.&lt;/P&gt;&lt;P&gt;The 2 gateways that show the vulnerability show asmtpd is running, whereas the other 6 do not.&amp;nbsp; &amp;nbsp;These 8 gateways are paired up in 4 different HA clusters, and the 2 showing the vulnerability are not in the same cluster.&amp;nbsp; &amp;nbsp;My preference would be to disable this service, as I don't believe it's required for anything we're currently doing.&amp;nbsp; Can someone help point me in the right direction?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL class="vuln-column eight columns"&gt;&lt;LI&gt;Synopsis&lt;DIV class=""&gt;&lt;P&gt;The remote SMTP service is running on a non-standard port.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;Description&lt;DIV class="sanitize"&gt;&lt;P&gt;This SMTP server is running on a non-standard port. This might be a backdoor set up by attackers to send spam or even control of a targeted machine.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;Plugin Output&lt;DIV class="code sanitize"&gt;Banner : 220 CheckPoint FireWall-1 secure ESMTP server&lt;/DIV&gt;&lt;DIV class="code sanitize"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="code sanitize"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="code sanitize"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Tue, 04 Feb 2020 22:06:23 GMT</pubDate>
    <dc:creator>tbindenagel</dc:creator>
    <dc:date>2020-02-04T22:06:23Z</dc:date>
    <item>
      <title>SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74159#M15060</link>
      <description>&lt;P&gt;Good afternoon.&amp;nbsp; We recently ran a nessus scan against our R80.30 3.10 gateways, and of the 8 that were scanned, 2 showed the below vulnerability.&lt;/P&gt;&lt;P&gt;The 2 gateways that show the vulnerability show asmtpd is running, whereas the other 6 do not.&amp;nbsp; &amp;nbsp;These 8 gateways are paired up in 4 different HA clusters, and the 2 showing the vulnerability are not in the same cluster.&amp;nbsp; &amp;nbsp;My preference would be to disable this service, as I don't believe it's required for anything we're currently doing.&amp;nbsp; Can someone help point me in the right direction?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL class="vuln-column eight columns"&gt;&lt;LI&gt;Synopsis&lt;DIV class=""&gt;&lt;P&gt;The remote SMTP service is running on a non-standard port.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;Description&lt;DIV class="sanitize"&gt;&lt;P&gt;This SMTP server is running on a non-standard port. This might be a backdoor set up by attackers to send spam or even control of a targeted machine.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;Plugin Output&lt;DIV class="code sanitize"&gt;Banner : 220 CheckPoint FireWall-1 secure ESMTP server&lt;/DIV&gt;&lt;DIV class="code sanitize"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="code sanitize"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="code sanitize"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 04 Feb 2020 22:06:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74159#M15060</guid>
      <dc:creator>tbindenagel</dc:creator>
      <dc:date>2020-02-04T22:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74401#M15096</link>
      <description>Did you do a scan from outside, inside?&lt;BR /&gt;What Software Blades are running on the target appliances?</description>
      <pubDate>Fri, 07 Feb 2020 08:51:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74401#M15096</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-07T08:51:59Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74686#M15138</link>
      <description>&lt;P&gt;This was an internal scan.&amp;nbsp; Both gateways are running Firewall and Content Awareness, which is consistent across the board on all of our gateways.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 13:45:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74686#M15138</guid>
      <dc:creator>tbindenagel</dc:creator>
      <dc:date>2020-02-10T13:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74874#M15164</link>
      <description>The fact they are enabled at all in that configuration is troubling.&lt;BR /&gt;Not to mention inconsistent behavior on different cluster members.&lt;BR /&gt;You can try just killing the processes.&lt;BR /&gt;But I suspect a TAC case may be in order to understand why they are starting up to begin with.&lt;BR /&gt;&lt;BR /&gt;Note, in general, the behavior you are seeing is expected if asmtpd is running, which will appear to be listening on a random high port.&lt;BR /&gt;Specific transparent connections are "folded" to it as needed by the gateway.&lt;BR /&gt;Random ones such as ones that come from your nessus scan would ultimately not be able to do anything.&lt;BR /&gt;A proper stealth rule for your gateway should mitigate this.</description>
      <pubDate>Tue, 11 Feb 2020 23:46:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/74874#M15164</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-11T23:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82303#M16642</link>
      <description>Hi tbdenagel, were you able to get this resolved? I am also getting pop up on my nessus scans as well. The non-standard port is TCP61805. Support suggested I enable "Bad SMTP" IPS signature but that is just a mitigation and not actually resolving the issue.</description>
      <pubDate>Fri, 17 Apr 2020 23:08:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82303#M16642</guid>
      <dc:creator>David_Chau</dc:creator>
      <dc:date>2020-04-17T23:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82493#M16678</link>
      <description>&lt;P&gt;I was able to resolve this by modifying the $FWDIR/conf/fwauthd.conf file to comment out the following line:&lt;/P&gt;&lt;P&gt;25 fwssd in.asmtpd wait 0&lt;/P&gt;&lt;P&gt;I believe a cpstop;cpstart is required after the change&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 14:39:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82493#M16678</guid>
      <dc:creator>tbindenagel</dc:creator>
      <dc:date>2020-04-20T14:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82555#M16692</link>
      <description>&lt;P&gt;Does commenting out this line prevent the SMTP service from running on non-standard ports or stop the SMTP service completely?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 21:39:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82555#M16692</guid>
      <dc:creator>David_Chau</dc:creator>
      <dc:date>2020-04-20T21:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82559#M16693</link>
      <description>This is for the SMTP Security Server specifically.&lt;BR /&gt;Unless you are actually using SMTP "With Resources" in your configuration (which is very legacy at this point), this is probably is safe to leave commented out.</description>
      <pubDate>Mon, 20 Apr 2020 22:35:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82559#M16693</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-20T22:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Server Non-standard Port Detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82561#M16694</link>
      <description>&lt;P&gt;Thanks for confirming!&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 23:00:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMTP-Server-Non-standard-Port-Detection/m-p/82561#M16694</guid>
      <dc:creator>David_Chau</dc:creator>
      <dc:date>2020-04-20T23:00:08Z</dc:date>
    </item>
  </channel>
</rss>

