> Tony, My NEC has suggested that I send a message to all nodes in the
> AVIATION echo who are still being attacked, to USE SESSION PASSWORDS
> with ALL links in and out of their system. THis will STOP (Drasticly
> curtail anyway) them getting bales more of the rammed messages.
Wish I could agree, Elvis, but it looks as though we have one mailer out here
that doesn't properly segregate *packets* received without session password
into a safe directory that the unpacker software won't see/use. Net104's hub
system certainly is protected by session passwords. Intermail apparantly has
some real problems.
Problem: The inbound archive files received without session password are
parked safely away as they should be, but not the packets. We have found a
workaround to that, but can only apologize for discovering that the mailer we
have been using (and is in reasonably common use elsewhere, unfortunately)
works poorly. If we'd left well enough alone and still been using eSoft
TIMS/FLAME to handle our mail processing here, we wouldn't have had this
problem. It takes nearly no effort at all to create a bulletproof system
with this software. Unfortunately, a prior administration insisted on
changing over to other software (and more hardware) to do the same job we'd
been doing reliably here for years on a single machine, primarily because
they didn't want to take the time to understand what had been inherited.
--- FLAME v1.1
---------------
* Origin: The Dinosaur Board [Niwot, CO] (1:104/114)
|