• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 194
  • Last Modified:

Possibility of a whitelisted (Internet) IP address being spoofed

Currently we don't permit Tcp25 from public Internet to our Exchange server:
all emails go to our internet-facing ProofPoint , then only ProofPoint forward
it our Exchange 2010 server

We plan to permit Tcp 25 direct into our local Exchange 2010 server from an
IP address ie whitelist this public IP address which is our HQ's ProofPoint IP:

a) if it's only a firewall rule that permit our HQ's ProofPoint IP to come in to
    our Exchange server, I guess this IP can be spoofed.  What if this IP is also
    whitelisted, can it be spoofed as well?  I read only Udp can be spoofed or
    is this mistaken?

b) is there any risk of MITM attack for this forwarding ?  The forwarded emails
     are not encrypted
0
sunhux
Asked:
sunhux
  • 2
3 Solutions
 
Mal OsborneAlpha GeekCommented:
A) Probably not. A device spoofing your IP address would somehow need to be able to the routed from and too.

B) In theory, anyone who can get to see your traffic could implement a "Man in the middle" attack, unless encryption is used. Unencrypted email is not very secure.
0
 
John HurstBusiness Consultant (Owner)Commented:
We plan to permit TCP 25 direct

At a client, my own consulting machine has a DHCP reservation and then that IP address is allowed in the Juniper firewall so that I may send out email separately from their email system.

I do not think you are at excessive risk for doing this. My machine does not compromise the client network.
0
 
sunhuxAuthor Commented:
https://community.mimecast.com/docs/DOC-1419

Refer to above link: there are indications in the link that allude to IP addr spoofing:

Create an Anti-Spoofing Policy to Allow "Spoofing Based on IP"

5.Enter the list of hostnames to apply the bypass to in the Hostnames box. Confirmation is issued
   that the "IP address used by the sending server matches the hostname specified"
   ie for the protection to be effective, it needs both IP address plus hostname to match
0
 
John HurstBusiness Consultant (Owner)Commented:
I looked quickly and will look again when I have time. If your firewall is otherwise properly locked down, open a port for one IP address only (not everyone) is not likely to cause harm.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now