Re: [Asrg] Re: Asrg Digest, DNSBL BCP v.2.0
2007-03-04 13:21:04
On 4-Mar-07, at 2:18 PM, <gep2(_at_)terabites(_dot_)com> <gep2(_at_)terabites(_dot_)com>
wrote:
Simple question... *WHY WAS THE ROUTER/GATEWAY NOT BLOCKING PORT
25 TO/FROM ALL MACHINES EXCEPT AUTHORIZED INTERNAL MTAS* ??? If your
client had taken that one simple step, none of this would've happened.
Several issues there.
First, they have at least three or four internal machines (out of
only about 15) running mail servers. (These servers were basically
used as a speed buffer/queue for outgoing mail only).
Jeez - how much email does this 15 person company send??? A
reasonable mail server can handle a million mails an hour - just how
much "speed" do they need?
Third, the primary machine involved with their infection was in
fact one of the machines running not just a mail server, but a
critical app which does legitimately send E-mails as a key part of
its job.
So lets get this straight - the mail server was being used as a
desktop machine? I see no other way it could have been infected with
a spam trojan than someone happened to be using it as a desktop.
I'm sorry this happened to the company you administer, but clearly it
has taught you some really important lessons about corporate network
security that you can apply to future contracts. Frankly you should
probably be glad they got CBL listed.
Matt.
______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg
|
|