Solved

Possibility of a whitelisted (Internet) IP address being spoofed

Posted on 2016-07-29
4
137 Views
Last Modified: 2016-08-01
Currently we don't permit Tcp25 from public Internet to our Exchange server:
all emails go to our internet-facing ProofPoint , then only ProofPoint forward
it our Exchange 2010 server

We plan to permit Tcp 25 direct into our local Exchange 2010 server from an
IP address ie whitelist this public IP address which is our HQ's ProofPoint IP:

a) if it's only a firewall rule that permit our HQ's ProofPoint IP to come in to
    our Exchange server, I guess this IP can be spoofed.  What if this IP is also
    whitelisted, can it be spoofed as well?  I read only Udp can be spoofed or
    is this mistaken?

b) is there any risk of MITM attack for this forwarding ?  The forwarded emails
     are not encrypted
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 18

Accepted Solution

by:
Mal Osborne earned 250 total points
ID: 41734298
A) Probably not. A device spoofing your IP address would somehow need to be able to the routed from and too.

B) In theory, anyone who can get to see your traffic could implement a "Man in the middle" attack, unless encryption is used. Unencrypted email is not very secure.
0
 
LVL 95

Assisted Solution

by:John Hurst
John Hurst earned 250 total points
ID: 41734560
We plan to permit TCP 25 direct

At a client, my own consulting machine has a DHCP reservation and then that IP address is allowed in the Juniper firewall so that I may send out email separately from their email system.

I do not think you are at excessive risk for doing this. My machine does not compromise the client network.
0
 

Author Comment

by:sunhux
ID: 41734739
https://community.mimecast.com/docs/DOC-1419

Refer to above link: there are indications in the link that allude to IP addr spoofing:

Create an Anti-Spoofing Policy to Allow "Spoofing Based on IP"

5.Enter the list of hostnames to apply the bypass to in the Hostnames box. Confirmation is issued
   that the "IP address used by the sending server matches the hostname specified"
   ie for the protection to be effective, it needs both IP address plus hostname to match
0
 
LVL 95

Assisted Solution

by:John Hurst
John Hurst earned 250 total points
ID: 41735147
I looked quickly and will look again when I have time. If your firewall is otherwise properly locked down, open a port for one IP address only (not everyone) is not likely to cause harm.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question