On 24/4/2011 5:09 πμ, Evan Platt wrote:

Enforce a better password policy - our work password policy is minimum


My 2c:

Check your server logs to see if someone found some password(s) by brute-force (you'll see multiple failed logins).

   * If yes, enforce a strict password policy as suggested and use e.g.
     fail2ban to stop brute-force attacks.
   * If not, some of your users either use your system to spam or they
     have leaked (intentionally or unintentionally) their login info to
     some spammer. A strict (but fair) policy is to ban accounts that
     spam (because if someone's account is spamming, the user concerned
     is held liable), until at least the user concerned demonstrates
     that he/she has undergone a thorough check of their systems (used
     to send mail) for viruses/malware and that they adhere to network
     (incl. mail) acceptable use policy (which must exist and be
     observed).

In any case, any user/organization offering public webmail and/or SASL-authenticated remote smtp login, MUST use strict password policies AND enforce brute-force blocks (using fail2ban and/or other similar custom or standard scripts / plugins etc.).

In each case the problem is to find HOW they gained access to your system, and you MUST find the cause, to be able to effectively manage your server(s).

Cheers,
Nick


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to