Rod,

I have never heard of an authentication scheme that fails a protocol and then tries something more secure instead. The only claim for the server being involved is that it allows people to mistakenly use a less secure means by misconfiguration.

On our server where we host a very wide variety of users on a wide variety of domains, I found the following results for today's SMTP AUTH traffic:

   94.97% - Used AUTH LOGIN
    5.03% - Used CRAM-MD5

I'm guessing that Thunderbird defaults to CRAM-MD5, while most everything else defaults to AUTH LOGIN.

I have never seen a compliance company/auditor that doesn't say things that are ridiculously alarmist _at best_. Although CYA is generally practiced by those on the other side of things, that doesn't mean that just because some automated tool said something that you must follow their lead.

If you have a single group of E-mail users it might be possible to upgrade to IMail 9.21 to get this, but if this server handles multiple domains and/or companies/groups, then it is not realistic to expect that CRAM-MD5 is something that you want to force down their throats.

Some auditors would consider any non-VPN off-network access to a mail server to be a security risk (and in some cases rightfully so), but I don't see how this PCI thing is any more than minor point. I'm also quite sure that this test pretty much assumes that you are using Exchange/Groupwise/Notes as opposed to an open standards E-mail server.

Matt




Rod Dorman wrote:
On Wednesday, June 25, 2008, 14:52:08, Matt wrote:
You can't require it with your version.  You need to upgrade and then
hack the registry if you want to do this:
    http://support.ipswitch.com/kb/IM-20071231-JH01.htm

The real issue however is when an E-mail client sends in plain-text. Just because you accept plain-text authentication doesn't mean that anyone is using it. If they use it, it isn't your server leaking this data, it is the E-mail client.

True  but from the POV of the compliance auditor the account credentials
were leaked because the server told the client that plain text was OK to
use.

These compliance companies sometimes assume things like that everyone is
using Exchange and not a standards-compliant E-mail server.

I  don't think they really care if its Exchange or not, they simply want
him to
  "Disable the plaintext authentication methods on your SMTP server ..."

Your link above corrects the issue.

Then  its  simply  a  matter of telling all your users that if they want
your  server  to  relay  their mail to external servers they must use an
e-mail client that can do secure authentication.

Reply via email to