Avaya

Modular Messaging Help

 Getting Started 
 Installation 
 Administration 
 Maintenance 
 Reference 
 
Home > Administration > Administering system features > Administering Email (Internet Messaging) > Email (Internet Messaging) security issues

Email (Internet Messaging) security issues

Using Email (Internet Messaging) and desktop email clients with Modular Messaging (or any other email server) presents certain security issues. Your company is responsible for any damages that could arise as a result of the use of Email (Internet Messaging) or desktop email clients. However, you can administer your server to minimize these risks.

To minimize security risks, consider the following:

Warning!
Toll fraud is the theft of long distance service. When toll fraud occurs, your company is responsible for charges. Call the Avaya's Customer Care Center at 1-800-643-2353 for more information about how to prevent toll fraud.

Disabling POP3 and IMAP4 access

If you enable POP3 and IMAP4 on the system, hackers could possibly determine a subscriber's login name and password, and then access the subscriber's messages or commit toll fraud through the subscriber's mailbox. Use Internet Messaging only behind a corporate firewall and restrict external Internet access to the POP3 and IMAP4 designated ports.

If your company is concerned about subscriber login security, consider the following alternatives:

  • Use SSL versions of the POP3, IMAP4, and SMTP interfaces by administering the appropriate ports on the Administer System Attributes and Ports page. Administrators must instruct subscribers to configure their e-mail clients to use SSL.
  • Exclusively use email clients that support the POP3 APOP or IMAP4 CRAM-MD5 (encrypted password) login mechanisms.
  • Deploy secure socket layer (SSL) for POP3 and IMAP 4 by using an external SSL accelerator.

Protecting against viruses

The ease with which messages can be broadcast and transmitted over the Internet simplifies the distribution of computer viruses. Enact a policy to ensure that subscribers check incoming messages and files for viruses.

Another precaution, especially important if this is your company's first email deployment, is a system-wide virus scanning application. The applications scan all incoming mail for viruses and intercept infected mail and files before they get to the subscriber.

Spoofing or sending email under a false name

Although the originator of messages received from Modular Messaging subscribers is authenticated, Internet email addresses are not typically validated for identity. As a result, the identity of the message sender is not guaranteed. Warn your subscribers not to respond to messages from unverified sources, especially if the message contains requests for private information or any form of payment. The name of the machine that delivered a message to the local server can be checked by reading the message's header information.

Note: A subscriber using a POP3 or IMAP4 email client in conjunction with their Modular Messaging mailbox may or may not use this mailbox as their 'from' identity when sending messages. If the subscriber does use this mailbox and uses Modular Messaging as their outgoing email gateway, they must also configure their client to provide authentication when sending messages. Messages from subscribers are also accepted (without authentication) from mail servers administered as trusted servers. This configuration allows use of external email list servers, which generally do not relay authentication information, as well as centralized corporate email gateways.

Disabling LDAP access

if you enable a non-SSL LDAP port on the Administer System Attributes and Ports page, it might be possible for someone to obtain each subscriber's email address and then either directly send spam to your subscribers or sell these address to other spammers. Allow non-SSL LDAP access only if your subscribers will be using it in conjunction with email client applications for "by name" addressing or if you are using subscriber management products such as Mailbox Manager or Avaya's ProVision software. If LDAP access is enabled, use SSL or restrict external access to the LDAP port. For more information about enabling LDAP access, see Administering LDAP.

See Modular Messaging and security for more information.

Top of page