08-06-2019 06:18 AM
A vendor stated we need to add these IP's to our ESA whitelist:
199.255.192.0/22, 199.127.232.0/22, 54.240.0.0/18, 69.169.224.0/20
Upon looking them up, it seems its all of Amazon AWS!
See we are having issues with their product who is to make emails look like they come from us. We have a text based rule that is only viewable if you SSH into the ESA which basically states if our domain name.com or domain name.org is in the email from and its not in RELAYLIST or WHITELIST, then move to Spoofed quarantine. This really helps cut down on phishing emails that are made to look like they come from us. Because if so perfectly crafted, even Exchange or Outlook will match the address and tie in the Active Directory picture on file and display it in Outlook, making it look pretty legit.
I'm afraid to add these HUGE IP ranges to whitelist because my thought is, what if a bad guy sets up shop in Amazon AWS and uses their server for bad? With cloud based services these days why would bad guys set up shop on their own ISP's in their mothers basement? Of course they are going to use servers that are elsewhere in the world and probably stolen bank account information to pay for it. Even if caught and terminated, the few hours days or weeks it goes un-noticed means these bad guys still have plenty of opportunity to harvest or infect users.
What is your thought to this? Is Amazon AWS prety safe, or is my cautious thinking right?
08-06-2019 06:48 AM
08-06-2019 07:39 AM
08-07-2019 10:35 AM - edited 08-07-2019 10:39 AM
Before you posted ppreenja, under HAT I created a new AMAZONAWS sender group and added those IP ranges in. I made the SenderBase reputation score from 0 to 10. The mail flow policy I created was TLSREQUIRED which basically REQUIRES TLS (drop if it doesn't). My thought was I figured if the sender used TLS and it had a 0 to 10 SBRS score, it should help somewhat from bad guys who don't thoroughly pay attention to all of the details spinning up spam or phishing email servers in AWS.
This seemed to work. But then today even though it seemed that email was working fine... two vendors inquired via Skype for Business about email bounce backs (Our organization rejected the message). Looking through some message logs it seemed like every email was being detected and applied to the AMAZONAWS sender group, even if the IP address DID NOT MATCH the 4 CIDR IP addresses. The HAT overview screen was in this order:
1 CISCO_CRES TLSREQUIRED
2 RELAYLIST RELAYED
3 WHITELIST TRUSTED
4 BLACKLIST BLOCKED
5 SUSPECTLIST THROTTLED
6 AMAZONAWS TLSREQUIRED
7 ACCEPT-TLS ACCEPTED
8 UNKNOWNLIST ACCEPTED
ALL ACCEPTED
So this time I tried reordering it like so:
1 CISCO_CRES TLSREQUIRED
2 RELAYLIST RELAYED
3 WHITELIST TRUSTED
4 BLACKLIST BLOCKED
5 SUSPECTLIST THROTTLED
6 ACCEPT-TLS ACCEPTED
7 UNKNOWNLIST ACCEPTED
8 AMAZONAWS TLSREQUIRED
ALL ACCEPTED
I sent a test email from my gmail account and in the message logs it detected it as ACCEPT-TLS sender group. I also had a vendor resend me an email that was "rejected by our organization" and it now came through this time (they are not using Amazon AWS either). Now I don't have an Amazon AWS email system I can test to see if that is detected properly, but does anyone know what is going on? Will my reordering work?
Yes ppreenja, you have a full understanding of our rule.
Here is the text based filter we have when I SSH to the ESA and view it: (since this is a publicly accessible forum I changed our actual domain name in here to simply domain.)
1 Y Y Anti-Spoofing Anti-Spoofing: if sendergroup != "RELAYLIST|WHITELIST|AMAZONAWS" { if (header("from") == "(?i)@domain\\.com") OR ((mail-from == "(?i)@domain\\.com") OR ((header("from") == "(?i)@domain\\.org") OR (mail-from == "(?i)@domain\\.org"))) { quarantine("Spoofed"); } }
08-08-2019 07:30 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide