Jerry wrote:
On Thu, 25 Feb 2010 16:40:13 -0500
Bowie Bailey <bowie_bai...@buc.com> articulated:

Abide by what edict?  Email marked as containing a virus is simply
rejected.  If a spammer or bot wishes to send out viruses from my
network, they'll have to bypass my MTA to do it, which is more
difficult since very few machines on my network have permission to
send out via port 25.

You should be using SMTP Authentication, irregardless of what port is
being accessed which would stop virtually all unauthorized
transmissions. If you don't know how to do that, ask or Google it. I am
really interested in how a Spammer is getting access to your network to
begin with. It sounds like your network is anything but secure.

So it's not possible for some innocent, clueless user to give up their password to a phishing scam? It's not possible for a new virus not detected by anyone's AV yet to capture a user's password as they enter it?

Some popular mail clients *still* have poor or incomplete support for TLS and SMTP AUTH... and that's the *current* version of said clients. (I think Outlook finally supports TLS/AUTH on port 587 as of the last version or two; it didn't for quite a long time.) We still have to allow IPs within our ARIN-assigned IP space to relay through our server for these customers.

If I cared to dig, I could probably come up with a list as long as my arm of user accounts whose password has been compromised through no fault of *our* security, but due to social engineering attacks or malicious software that slipped in somewhere long enough to capture a password or two.

Hav you ever tried to handhold a (very) seniour citizen who's a complete computer newbie, and has a hearing problem, though setting up an email account, over the phone? Have you ever had to *troubleshoot* an email problem with someone like that?

I'll admit the setup side is much less of a problem in most corporate environments... at least, those with their own in-house IT staff. Many smaller businesses don't *have* an IT staff; they have someone they call periodically (often after something has been wrong for days to weeks).... often the support staff at the ISP is their first call. But *exactly* the same social-engineering and password-capture attacks work on corporate PCs and accounts as on ISP accounts.

-kgd
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to