On Fri, 26 Feb 2010 07:21:03 -0800 Dennis Peterson <denni...@inetnw.com> articulated:
> On 2/26/10 8:59 AM, Jerry wrote: > > On Fri, 26 Feb 2010 12:14:50 +1300 > > Steve Holdoway<st...@greengecko.co.nz> articulated: > > > >> You what? In the last case I had a problem, it was a networked pc > >> infected with a trojan spewing spam out. Just *how* does SMTP Auth > >> stop this? > >> > >> Your lack of knowledge is matched only by your inability to spell > >> ( no irregardless is *not* a word ), or to put your clock right. > > > > http://www.merriam-webster.com/dictionary/irregardless > > > > Wow, you could not take the time to even look up a word. What is > > your job description again? It wouldn't be "troll" would it? > > > > By the way, what is this 'clock' statement in reference to? > > > > In addition, many ISPs have instituted SMTP authentication, even > > SSL/TLS is an attempt to thwart the transmission of malicious > > material. Have you even considered utilizing such a mechanism, or > > do you simply proscribe anything you fail to comprehend and dismiss > > them as acts of mysticism and thaumaturgy? > > SMTP auth and SSL/TLS have nothing to do with message content or > preventing distribution of malware. I think your role as email > messaging expert is new to you. SMTP authentication can be useful if a nefarious individual sets up an account on your network and then attempts to transmit malicious documents. It is certainly not foolproof, but it does help. Unfortunately, too many individuals set up their MUAs to automatically transmit their identification; ie., user-name and password automatically rather then enter it manually. That has the unfortunate side effect of allowing anyone with access to their terminal the ability to transmit material. It also makes life easier for 'bots'. I mentioned SSL/TLS only because I always set up my systems with SMTP authentication and SSL/TLS. The system logs show several individuals attempting to transmit without authenticating. They are blocked of course. Someone mentioned only authenticating from outside their network. That is a receipt for disaster, IMHO. -- Jerry ges...@yahoo.com |::::======= |::::======= |=========== |=========== | Conquering Russia should be done steppe by steppe. _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml