> Im curious as to how they are able to do this?  What kind of  
> authentication backend to you have configured?  How are spammers able  
> to use your install for spam if they dont have a user account to do so?
>   

The transfer logs on our campus SSO and webmail servers, and the Horde 
preferences database show that they're using compromised accounts.  Real 
user accounts.  How the accounts are getting compromised and those 
passwords in the hands of international spammers is another questions.

Liam
-- 
IMP mailing list - Join the hunt: http://horde.org/bounties/#imp
Frequently Asked Questions: http://horde.org/faq/
To unsubscribe, mail: [EMAIL PROTECTED]

Reply via email to