Avaya

Modular Messaging Help

 Getting Started 
 Administration 
 Maintenance 
 Reference 
 
Home > MSS Administration > Email (Internet Messaging) > Email (Internet Messaging) security issues

Email (Internet Messaging) security issues

Using Email (Internet Messaging) and desktop email clients with the Avaya™ S3400 Message Server (or any other email server) presents certain security issues. Your company is responsible for any damages that could arise as a result of the use of Email (Internet Messaging) or desktop email clients. However, you can administer your server to minimize these risks.

To minimize security risks, consider the following:

Warning!
Toll fraud is the theft of long distance service. When toll fraud occurs, your company is responsible for charges. Call the Avaya's Customer Care Center at 1-800-643-2353 for more information about how to prevent toll fraud.

Disabling POP3 and IMAP4 access

On the General Options and Settings page, if the POP3 and IMAP4 enabled fields are set to Yes, hackers could determine a subscriber's login name and password, and then access the subscriber's messages or commit toll fraud through the subscriber's mailbox. Use Internet Messaging only behind a corporate firewall and restrict external Internet access to the POP3 & IMAP 4 designated ports.

If your company is concerned with subscriber login security, consider the following alternatives:

  • Disable the POP3 and IMAP4 interfaces by selecting No on the General Options and Settings page.
  • Exclusively use email clients such as Qualcomm's Eudora client that support the POP3 APOP or IMAP4 CRAM-MD5 (encrypted password) login mechanisms.
  • Deploy secure socket layer (SSL) for POP3 and IMAP 4 by using an external SSL accelerator. Current products on the market include SSL100 Accelerator by Avaya.

Protecting against viruses

The ease with which messages can be broadcast and transmitted over the Internet simplifies the distribution of computer viruses. Enact a policy to ensure that subscribers check incoming messages and files for viruses.

Another precaution, especially important if this is your company's first email deployment, is a system-wide virus scanning application. The applications scan all incoming mail for viruses and intercept infected mail and files before they get to the subscriber. Current examples include:

  • Interscan Virus Wall by Trend Micro
  • Webshield products by McAfee
  • Antivirus for Gateways by Norton
  • eSafe Gateway by Aladdin

Spoofing or sending email under a false name

Although the originator of messages received from subscribers of the S3400 is authenticated, Internet email addresses are typically not validated for identity. As a result, the identity of the message sender is not guaranteed. Warn your subscribers not to respond to messages from unverified sources, especially if the message contains requests for private information or any form of payment. The name of the machine that delivered a message to the local server can be checked by reading the message's header information.

Note: A subscriber using a POP3 or IMAP4 email client in conjunction with their S3400 mailbox may or may not use this mailbox as their 'from' identity when sending messages. If the subscriber does use this mailbox and uses the S3400 as their outgoing email gateway, they must also configure their client to provide authentication when sending messages. Messages from subscribers are also accepted (without authentication) from mail servers administered as trusted servers. This configuration allows use of external email list servers, which generally do not relay authentication information, as well as centralized corporate email gateways.

Disabling LDAP access

On the General Options and Settings web-based administration page, if the LDAP enabled field is set to Yes, spammers could obtain each subscriber's email address and then either directly send spam to your subscribers or sell these address to other spammers. Allow LDAP access only if your subscribers will be using it in conjunction with email client applications for "by name" addressing or if you are using subscriber management products such as Mailbox Manager or Avaya's ProVision software. If LDAP access is enabled, restrict external access to the LDAP port. For more information about enabling LDAP access, see LDAP directory.

 

Top of page