My client uses Lotus Notes.

Rgds,
Daniel Cen�culo



                                                                                       
                                   
                    Darryl Luff                                                        
                                   
                    <[EMAIL PROTECTED]        To:     Ron DuFresne 
<[EMAIL PROTECTED]>                             
                    u>                          cc:     
[EMAIL PROTECTED], [EMAIL PROTECTED]         
                    Sent by:                    Subject:     Re: pop3                  
                                   
                    firewalls-admin@list                                               
                                   
                    s.gnac.net                                                         
                                   
                                                                                       
                                   
                                                                                       
                                   
                    06-02-2002 05:37                                                   
                                   
                                                                                       
                                   
                                                                                       
                                   




Ron DuFresne wrote:
...
> This is not totally correct, it depends upon how much access to the
server
> supplying the pop3 accounts one has to.  If one creates the user accounts
> so they only have access to remotely read their e-mails <i.e. give a
> shell of /dev/null>, unless they can also exploit the pop3 deamon, the
> game of sniffed usernames and passowrds  limits others to only reading
> e-mails of those sniffed accounts.  How exploitable the pop3 deamon is on

I was thinking more of the situation where the POP3 server is actually
something like an exchange server, authenticating users against a
corporate account database (NT domain or whatever). This seems to be a
pretty common configuration. And in that case the sniffed POP3
username/password is actually the user's corporate login
username/password.

> a particular OS is another subject altogether, they have had issues on
the
> past if I recall.  Basically, it depends upon how much you trust others'
> setup of their routers and switches, and perhaps the ISP's your users are
> going to read from.  It's those points that are going to be the primary
> sniffing vectors between two sites.
>

And internal users or admins playing around. Whether they have malicious
intentions or not, people seem to enjoy getting access to their mate's
(or boss's) passwords. Especially in a small site where the server is on
a user segment.


Darryl Luff
CDM Security Group
[EMAIL PROTECTED]
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls



_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to