Is this Comcast/Xfinity security warning not to use "port 25" legit or a phish of some kind?

I received this email today. Is it legit or an attempted phish?

I see nothing in that that makes me question its legitimacy.

Thanks will go ahead and make port change.

And I will add - about time. ISPs should have been blocking port 25 (outgoing SMTP) traffic for years.

Glad to see that this is finally happening.

I have Comcast/Xfinity and I didn’t receive this email. If I’m understanding the email correctly (always a dicey proposition) I have three thoughts:

  1. It’s a scam. (Unlikely)
  • or -
  1. They’re shutting down your access to port 25 because they detected spam coming from your PC. If this is true you might want to run some malware detectors to see if you accidentally picked up a trojan.
  • or -
  1. Dang you send a lot of email! =P

This.

(Bolding mine.) http://customer.comcast.com/help-and-support/internet/email-port-25-no-longer-supported/

Run a set of malware diagnostics on your computer. Your computer is probably infected.

The OP said they were going to make a port change, so I would assume they were legitimately using port 25.

But yes, overall this seems to be an effort to stop botnets from sending spam from people’s infected computers.

I got one of those emails yesterday. However, I had changed my outgoing port from 25 to 465 some months ago. Don’t know why Comcast sent me the notice.

Side question:

What’s so special about port 25 and port 465? How are they different other than being different numbers?

Nothing, except they are (or, in the case of port 465, were) standardized as being the proper ports for SMTP to use. That means mail software that speaks SMTP will default to using those ports.

I have a Mac, and I got this e-mail. I was legitimately still using port 25 without realizing it (since I rarely go into that section of Firefox’s preferences).

Isn’t port 25 for plain text email and port 465 is for secure email?

Wikipedia article cited above calls it “legacy secure SMTP in violation of specifications.”

Where I come from, willfully violating Internet RFC specifications for a service is serious stuff. No IANA specification calls out using 465/tcp for email of any kind.

Apparently, this assignment (465/tcp to SSL-wrapped email) was in response to something Netscape went off on their own to do in Netscape 3.0 (which, if you recall, had an integrated email client) back in the 90s. 465/tcp was assigned outside of the standards track to this function ages ago, but since has been superceded by using ESMTP authorization and security features over the normal SMTP port 25/tcp. 465/tcp is actually reassigned to something completely different, but apparently no one cares.

Related Wikipedia article:

So, yeah, Comcast is perpetuating an outdated and deprecated technical solution in defiance of specification guidance because doing the right thing may be too hard to explain to their userbase.

SMTP over SSL on port 465 is enough of a de facto standard that all email clients in current use will support it. And it is usually easier for users to setup than SMTP authorization.

Well I’m pretty sure my hosting provider, bluehost, offers secure SMTP over the same port. 14 years sounds like a long time to still be doing things the wrong way, just because it was the right way for a year in the 90s. Is there any other example of multiple services ignoring RFCs for so long?

People have been using email ports for encrypted P2P traffic as well, as ISPs are less likely to block total access to an email port.

Does this mean Comcast will now prevent its residential customers from being able to connect to port 25 on any other machine over their Internet connection?

Yes. Port 25 says “this chunk of data (or packet, in technical terms) carries outgoing email”. If traffic on that port is not email, it’s not standards-compliant and they have no obligation to support it (and even a minor one to prevent it).

As one of those lame-o liberal arts types, I immediately suspected the message was not a phish because the English was too good.

Not perfect (“impacted customers” sounds like a reason for Comcast to see an oral surgeon), but better than typical phisher pidgin.

More to the point, SMTP traffic on port 25 should only be allowed from residential customers to the Comcast mail servers. The Comcast mail server can then authenticate the sender and relay the message. Other Mail servers can then reject all port 25 traffic from Comcast IP addresses that isn’t the known Comcast mail server. People who wish to use a non-Comcast mail server (i.e a work mail server) to relay their mail should be using the authenticated Mail Submission Agent on port 587 (preferably with encryption).
This also means that Comcast users cannot have their computers hijacked to participate in spam email botnets sending emails to other email servers. That traffic will be blocked.