Jo Rhett wrote:
On Jun 20, 2008, at 11:49 AM, John Hardin wrote:
10.x is (supposedly) not routable on the public internet. If you see 10.x (or other RFC-1918) traffic coming in from the world, your ISP is broken.


You don't run packet sniffers on your hosts much, do you? ;-)

Does your ISP filter egress packets on your interface? No, neither does mine ;-) (and in this case I control the border routing so I know it for sure)

Most competent ISPs will filter customer interfaces to prevent bogons, and some will filter public peering ports for bogons, but even with both of those a surprising number of 10.x packets make their way to our hosts.

belt-and-suspenders: Even if it's unlikely for a 10.x packet to reach the host, why should I trust it?
Just because a packet can get theredoesn't mean they can deliver mail. (by the way, IMO you're *insane* for not having a something in place that filters such things. A simple PIX firewall at your border with "ip verify reverse-path" enabled would do the job nicely. On a budget simple ACLs in your border routing would do. Step up to at least 1980's grade network security. seriously.)


SMTP travels over TCP. TCP requires a three way handshake. In order to successfully open a connection to a TCP port, you need to know what initial sequence number (ISN) the other side chose. Normally, a client gets that in the SYN-ACK packet generated by the server. However, In the case of a bogon, the "client" will never get that packet back, so they're going to have to guess the ISN. This is called a "blind spoofing attack". Provided your OS is sufficiently good about choosing random ISN's, ie: most modern OSes, even Windows of XP and newer heritage, pulling off a blind spoofing attack is actually rather difficult to do in the real world.

If blind spoofing attacks were actually practical, you'd also be seeing a *lot* of connections with forged source IPs on your mailserver. It's equally difficult. When's the last time you got a message and didn't trust the IP your MTA reported as being the actual host delivering the mail? Spammers would aggressively use this technology to hide the IPs of their infected hosts if they could.

So go ahead and belt-and-suspenders, but do realize that if they can establish a connection from a 10.* that you don't route back to, they can establish a connection using *ANY* IP address of their choosing. Inside, outside, microsoft, google, any IP address is fair game. Were I a spammer, my first target would be to forge mail as coming from the mailservers of large companies with bondedsender and high-ranking DNSWL listings.

I've not seen such mass IP forgery going on. Have you? Of course not, because it pretty much can't be done.











Reply via email to