I've never heard about secure pop3, I will check that, thanks.

Daniel Cen�culo


                                                                                       
                                          
                    Alvin Oga                                                          
                                          
                    <[EMAIL PROTECTED]        To:     Ron DuFresne 
<[EMAIL PROTECTED]>                             
                    lting.com>                         cc:     
[EMAIL PROTECTED], [EMAIL PROTECTED]         
                                                       Subject:     Re: pop3           
                                          
                    06-02-2002 05:52                                                   
                                          
                                                                                       
                                          
                                                                                       
                                          





hi ya

as ron says.... make sure you have a pop user name
and a different user shell account
     - and make 100% sure the passwds is different on both of umm

better still to use secure pop3 and/or secure imap
or https for web-based email agents

c ya
alvin
http://www.Linux-Sec.net/Mail  -- see secure pop3


On Tue, 5 Feb 2002, Ron DuFresne wrote:
>
> On Wed, 6 Feb 2002 [EMAIL PROTECTED] wrote:
>
> >
> > Thanks Darryl,
> >
> > so, may I sugest webmail access ? Is it possible to encript that
traffic
> > wiht some https ? How can I advice secure email download without using
VPNs
> > ? Is it necessaire to use digital certificates (I think it may be used
but
> > I've never done) or is there other forms ?
> >
....

> >
> > Hi Daniel,
> >
> > POP3 authentication and message content is not encrypted in any way, so
> > any third party in the data path between the server and the client can
> > read both the emails and the account username/passwords.
> >
> > To decide whether that's OK or not, you have to consider what risk this
> > involves for your company.
> >
> > Someone sniffing the POP3 traffic will be able to:
> >
> > 1.   Read all the email. Is there any data there that you or your
company
> > would not want an unauthorised third party to read?
> >
> > 2.   Capture the POP3 usernames and passwords. What can they do with
> > these? eg. If the CEO checks his mail, you (or anyone else) will be
able
> > to get his username and password. Is that a worry?
> >
> > If your company is happy with these things, then they should be
> > confident about allowing POP3 access.
> >
> >
> > If the mail server is on the internal network, it means that when
> > someone breaks into it from the internet, they are on your internal
> > network and can do whatever they want. If they're on the DMZ, they
> > should be at least partly contained. The level of containment depends
on
> > your firewall rules, and on what else is on the DMZ that they could get
> > to.
> >
>
> This is not totally correct, it depends upon how much access to the
server
> supplying the pop3 accounts one has to.  If one creates the user accounts
> so they only have access to remotely read their e-mails <i.e. give a
> shell of /dev/null>, unless they can also exploit the pop3 deamon, the
> game of sniffed usernames and passowrds  limits others to only reading
> e-mails of those sniffed accounts.  How exploitable the pop3 deamon is on
> a particular OS is another subject altogether, they have had issues on
the
> past if I recall.  Basically, it depends upon how much you trust others'
> setup of their routers and switches, and perhaps the ISP's your users are
> going to read from.  It's those points that are going to be the primary
> sniffing vectors between two sites.
>




_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to