Tony Finch writes:
On Mon, 18 Jan 2010, Arnt Gulbrandsen wrote:
Yeah. But I can't remember talking to anyone who really cared about allowing cleartext imap inside the firewall.

I'm not sure exactly what you mean here, but I have counter examples for two possible interpretations.

I meant that I can't remember speaking to anyone who REALLY WANTED to allow unencrypted IMAP inside the firewall. Sorry about the lack of clarity.

If you mean that no one in your experience is worried by unencrypted access from local IP addresses, then we certainly are especially for wireless users.

Yes. I have also heard mutterings about ethernet jacks and ARP attacks, although that may be more paranoia than realism.

If you mean that no one in your experience enables unencrypted access from local IP addresses,

(On the contrary, people do, and I think it makes sense. A low-value feature is worth using if it's also low-cost, right?)

then I believe it's fairly common for universities to do so to avoid having to reconfigure thousands of desktop clients. It took us about a year to completely disable unencrypted access - we wanted to avoid huge spikes in support load.

Yes.

With the right software it's fairly easy to restrict unencrypted logins to local wired networks.

Timo's mail made me think of a different approach: Immediately expire a password if a server receives that password in clear text. Bang bang. (Let me guess: The words "support spike" entered your mind now.)

Arnt
_______________________________________________
yam mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/yam

Reply via email to