Re: Firewall and NAT

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am Mi, den 03.11.2004 schrieb Ow Mun Heng um 2:05:

> The other concern with this and the method of using MSAs is
>       * It does not have any milters/filters in place. what's stopping
>         spam/malware etc from coming in through that path?

If you don't explicitly bind the milters to the MTA only, they are used
with the MSA too.

>       * How much do you trust authenticating users? When malware gets
>         sent (unknown to the orginator) does it send through the users
>         MUA (eg: if users are using Outlook(R)

In which way is that specific for using the MSA? If you have a worm on a
Windows[tm] machine being able to use the auth data saved within the
mail program, then it does not matter whether you use the MTA or the
MSA. As server administrator you can hardly handle such cases. Only if
you have a close eye on the logs and you observer suspicious sendings.

> I believe that sendmail is right to instruct that the MSA only be used
> on internal systems. (and if there's a choice, only for the sending
> system and not to accept from other connections on the LAN). I guess it
> also depends, how much you trust systems within your LAN or otherwise

If you don't open the default MSA - means without authentication
enforcement -, then I wouldn't see the problem you see.

Alexander


-- 
Alexander Dalloz | Enger, Germany | new address - new key: 0xB366A773
legal statement: http://www.uni-x.org/legal.html
Fedora GNU/Linux Core 2 (Tettnang) on Athlon kernel 2.6.8-1.521smp 
Serendipity 02:31:27 up 14 days, 10 users, load average: 0.20, 0.32,
0.28 

Attachment: signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux