Solved

Internal Domain details revealed to the public through Outlook message format!

Posted on 2007-12-01
8
238 Views
Last Modified: 2010-03-06
When a message is sent using MS Outlook to any domain , its posible to see the internal details of the sending domain by simply looking at the details of the message itself

Is it possible to fix this security issue?

Thanks
0
Comment
Question by:Dlala
  • 3
  • 2
  • 2
  • +1
8 Comments
 
LVL 104

Expert Comment

by:Sembee
ID: 20388493
Short answer.
No.

Why do you think it is a security issue? If someone gets in to a position to use that information then you have bigger problems to worry about.

I receive emails from major companies, including Microsoft and they all have that information in them.

Simon.
0
 
LVL 13

Accepted Solution

by:
vishal_breed earned 500 total points
ID: 20388536
Unfortunately, this behaviour is by design, and necessary to the function of SMTP mail. http://www.outlookexchange.com/articles/drewnicholson/internetheaders.asp

But I have heard using some third party softwares it is possible; some LAW / finance firms use this options.
0
 

Author Comment

by:Dlala
ID: 20388573
But why do we need to "publish" this private data anyway?

0
 
LVL 17

Expert Comment

by:upul007
ID: 20388589
If you do not want your internal details to appear on the email headers, you should outsource your email servers to another party. That way, it will be their info that gets transmitted. There are different ways to tackle this. Whats the firewall you use? some hybrid firewalls have features that may assist you.

Of course, then instead of just seeing headers another party can see the entire email and wheres the confidentiality in that.
0
Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

 
LVL 104

Expert Comment

by:Sembee
ID: 20388646
That is the way that SMTP and Exchange works.
If you are bouncing the email through internal servers then that information will be shown on the headers. The message ID is based on the server name.

This is the type of question I get from so called "Auditors" who look for something when they cannot find anything else at fault.
It is not a security risk.

There is no point arguing about it as it cannot be changed. You will have to flag it to Microsoft, but don't expect anything to be changed before Exchange 15.
As already pointed out, the most you could do is use a firewall or other service to strip the headers, but that could put your email messages at risk of not being readable by the recipient.

Simon.
0
 

Author Comment

by:Dlala
ID: 20388671
At least an attacker could use that to build some knowledge about the internal domain.The data that is revealed contains internal IP addresses which should remain internal

A sample text is shown below:

Received: from 89.211.33.162  (EHLO MR.dlalaholding.com) (89.211.33.162)
  by mta332.mail.re4.yahoo.com with SMTP; Thu, 26 Jul 2007 05:24:09 -0700
Received: from EXCHANGE.dlala.local ([192.168.2.17]) by MR.dlalaholding.com with Microsoft SMTPSVC(6.0.3790.3959);

The internal exchange server "exchange.dlala.local" with IP 192.168.2.17 is frowarding all emails to an SMTP relay server in a DMZ with 89.211.33.162 as a public IP
Its also showing the exact build of the SMTP relay server

Isnt this too much to be seen by a hacker?
0
 
LVL 17

Expert Comment

by:upul007
ID: 20388847
Good question.

There is a small set of guidelines in place for the use of emails. Its better that you refer toe following article:

http://www.ietf.org/rfc/rfc4406.txt

which is a link from:

http://www.imc.org/rfcs.html

and

http://www.imc.org/mail-standards.html

Note that the standards advised there may not be adhered to by all.  
0
 
LVL 17

Expert Comment

by:upul007
ID: 20388912
Networks all across the globe get hacked all the time. With or without access to email headers, if a person needs to get in they will.

If you have a domain, some of your records will be available to the public anyway.

Just knowing your IP will not be enough to get in. It's up to you to ensure that your network is secure from such unauthorised access.

0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

MS Outlook is a world-class email client application that is mainly used for e-communication globally.  In this article, we will discuss the basic idea about MS Outlook, its advanced features, and types of MS Outlook File formats.
Finding original email is quite difficult due to their duplicates. From this article, you will come to know why multiple duplicates of same emails appear and how to delete duplicate emails from Outlook securely and instantly while vital emails remai…
The view will learn how to download and install SIMTOOLS and FORMLIST into Excel, how to use SIMTOOLS to generate a Monte Carlo simulation of 30 sales calls, and how to calculate the conditional probability based on the results of the Monte Carlo …
The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now