ietf
[Top] [All Lists]

RE: mail sandbox wall authority, inward and outbound

2000-05-12 12:10:02
Since you don't know the environment, I won't bother to respond to
vunerability.

Ok.  How can console(_dot_)user(_at_)home(_dot_)com know if the attached 
executible file is
safe or not?  I can understand in my own context.  I don't have a hope to
understand in someone else's context.

Jim

-----Original Message-----
From: James P. Salsman [mailto:bovik(_at_)best(_dot_)com]
Sent: Friday, May 12, 2000 11:08 AM
To: JIM(_at_)pc(_dot_)sj(_dot_)nec(_dot_)com
Cc: ietf(_at_)ietf(_dot_)org
Subject: RE: mail sandbox wall authority, inward and outbound


From: Jim Busse <JIM(_at_)pc(_dot_)sj(_dot_)nec(_dot_)com>
Date: Fri, 12 May 2000 10:11:36 -0700

I get 240 emails/day.

about 15% have executable attachments, because that's the way developers
use
mail, we attach self-expanding zip files.

My organization has about 100 people that fall into this category.

First off, not only would you all save space if you stopped 
exchanging self-extracting (executable) archives, but your 
organization would be far less vulnerable.  Use the ordinary 
zip files instead.
 
I find it unacceptable that you are asking some console operator to
1.  Determine if my zip files are legitimate....

By "console operator", I mean you, the user, or whoever is 
sitting at your keyboard when your mail is being read.

Cheers,
James