• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 304
  • Last Modified:

Spoofing through Exchange

I have an Exchange server on Server 2000 that is a victim of spoofing. An example of this is user@domain.com is getting mail from user2@domain.com with junk in it for commercial products such as Cialis and porn. Now user knows user2 wouldn't send that, and I know user2 didn't. I know someone is just sending mail as through telnet but how do you stop a thing like that? I was looking through the Exchange System Manager and I found that the Default Virtual Smtp connector allows anonymous access, but if I remove that it won't allow inbound mail even if I am replying to an email that someone from @domain.com sent me. There is an outbound security checkbox for anonymous access, but I am afraid that will do something similar. Any ideas on how to stop this sort of thing?

Thanks in advance.
-Joe
0
productivetech
Asked:
productivetech
  • 2
  • 2
1 Solution
 
LauraEHunterMVPCommented:
Follow the steps in this tutorial to ensure that your Exchange server is not being used for mail relaying: http://www.petri.co.il/preventing_exchange_2000_2003_from_relaying.htm

As far as preventing someone from using "user2@domain.com" as the "From" address in a SPAM email, there is nothing you can do about this.  I (or anyone else) can craft an email message on any email server with a From: line of santaclaus@northpole.org or productivetech@productivetechsnetwork.com and there isn't anything that can be done to prevent it.  Your due diligence extends to ensuring that the email server that you administer is not being used as an open relay for SPAMmers, using the steps in the link above. As far as the other bit is concerned, you would need to deploy some sort of anti-virus/SPAM filtering mechanism for your environment - I'm a big believer in the Barracuda anti-spam appliances, but there are literally dozens of options to choose from in this space.
0
 
productivetechAuthor Commented:
Thanks, I already made sure the server is not an open relay. I was thinking exactly what you said and I regret that I was right. I have had great luck with GFI and DNS Blacklist checking, which can automatically delete mail from offenders which I think I will want to use in this situation again. I have heard good things about Barracuda but they are a little pricey.
0
 
LeeDerbyshireCommented:
The problem is, when they spoof your own domain, then the server has no idea that it's being used as a relay.  It's only a relay when neither the sending domain, or the receiving domain, are your own.  You might try setting up an SPF record for your domain, and then turning on Sender ID checking in Exchange.
0
 
productivetechAuthor Commented:
Sender ID checking in Exchange sounds like a good idea. I was looking through the Exchange System Manager and found a check box for "Allow anonymous access" under the properties of the Default Smtp Virtual Server. That seems like that kind of settings would resolve everything, but in a test it seemed to block mail inbound. I saw a similar setting under out bound security as well. Are these settings of any use in my situation?
0
 
LeeDerbyshireCommented:
I'm afraid not.  Sending servers will try to connect anonymously to your server, since they don't have credentials to log on to your domain.
0

Featured Post

Making Bulk Changes to Active Directory

Watch this video to see how easy it is to make mass changes to Active Directory from an external text file without using complicated scripts.

  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now