Graeme Robinson wrote:
>
> Scott wrote:
> >You may be behind a firewall, but as a high percentage of
> attacks originate from >within it is still insecure.
>
> Then you have physical security problem and should call in
> the police, not a network security problem - to repeat, the
> e-smith server will not route packets to or from it's
> internal range so it's not possible for someone outside your
> network to 'sniff' internal addresses to pick up these
> internally routed clear text passwords.
I think you missed my point. A large percentage of network attacks originate behind the firewall. Physical security is only part of the problem, and it is true that if you haven't phsically secured you servers then you are open to a plethora of breaches. However, even a physically secure server is open to non-physical attack from the local network. This is such a problem that some companies go so far as to place a firewall between their workstations and their servers!
So, my point was that passing clear text passwords is unsafe, even if it is done on the local network with a firewall protecting you from any external networks.
Here's an example for you. A company encouraged it's employees to use PWS to create personal home pages. These were to be "get to know me" sites, project information sites, upcoming events, etc. All very innocuous and useful sounding things. One person hit upon the idea of creating a "project info" site that required users to register. So he created the form, asked for username and password, and lo and behold was granted instant access to a large number of user's network and email accounts. Including some of the top executives of the company.
Some may argue that allowing employees to create sites is a bad idea. Others will point out that it is a bad idea to use the same username/password for all accounts. However, the reality is that these things happen. Some even argue that because of such security failures, your system is at far greater risk from internal attack than from anything else.
> >And, if you are collecting mail from POP3 accounts
> >outside the firewall, then
> >you are still passing passwords in the clear over the
> >public Internet.
>
> To repeat, you shouldn't enable remote collection by pop.
> It's possible to do so in the manager but disabled by default
> in e-smith for the reason that it's insecure.
Again, not my point. I was referring to clients on the local network and behind the firewall, that are collecting mail from POP3 accounts that reside outside the firewall. If you have a Yahoo! account and are getting you messages via POP3 using Email Client X, then your account info is passing across the public Internet in clear text. This has nothing to do with allowing users to collect their mail from e-smith via POP3. Ditto if you are using FTP to upload your personal web pages to some free server. And so on.
As I pointed out before, as most users do not maintain secure usernames and passwords and typically use the same ones for all accounts, then capturing any account info, whether gleaned from the local network or from the public Internet, whether due to POP3 mail collection or SMTP authentication or logging into a web site, will typically reveal the keys to the kingdom -- or at least that user's corner of the kingdom.