On 7/24/2012 6:24 PM, mouss wrote:

> anvil is not an anti-spam solution. it's measure against "clients gone
> crazy".

Precisely.  And that's how I advised the OP to us it:  Plug the artery
until surgery can be performed.  Surgery in this case being disabling
the account and setting a strong password.

> fighting outbound spam is a serious challenge.

Of course it is, harder for some org types and easier for others.  ISPs
have the toughest battle here, obviously.  Many/most corps and SOHOs not
so tough.

>> [skip]
>> You'd think humans beings would be smart enough to follow directions and
>> use strong passwords, AV software, etc, and not fall for phishing scams.
>>  Your adversary in this war isn't the spammers, it's not the technology,
>> but your users.
> 
> oh come on! the "users" excuse is wa too old. if your software accepts
> weak passwords, then the problem is with the software, not the user. AV?
> oh no, I don't want any on my unix boxen. phising? well, it's far from
> being a simple thing.

It's not an excuse, but a fact.  I'm surprised you'd argue this mouss.
;)  Success requires a multi-pronged approach, and all of the above are
required.  over 99% of users have Windows not *nix desktops, so the AV
requirement is a given.  And even with software that enforces strong
passwords, many users fall prey to phish and give up the password.
Which is why the only way to win this hacked account spam is user
education.  Now, whether that's a pipe dream or achievable will be
debated forever.

> when OS, pki & browser vendors will ignore their business for the
> "happiness of the universe", things might get better in an Alice
> wonderfull world. do you really believe it?

As long as human beings are allowed to submit mail to their provider for
relay, and those humans control their machines doing the submitting,
it's ultimately up to those users to secure their logon information.
The ISP can't control the user PC or the user.  It can only attempt to
educate.  As myself and others have stated many times, there is no
technical solution to this side of the spam problem, as there is no
technical solution to the MX recipient side of the spam problem.  One
can only mitigate and fix, which...

Is why I recommended using anvil for the mitigation part.  It's quick,
it's integrated, it's low overhead vs a policy daemon.  But yes, it
requires some custom scripting to match up the auth user name for
account disabling.

> I disagree. those who put the responsibility of their failure on others
> (call em users or whataver) should get another job.

More accounts are compromised via phishing than brute force attacks.
Are you calling this a failure on the part of the technical staff at
$ISP?  Are you saying technical means readily exist to stop phishing?

-- 
Stan

Reply via email to