[60940] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: To send or not to send 'virus in email' notifications?

daemon@ATHENA.MIT.EDU (Matthew Kaufman)
Wed Aug 20 10:47:48 2003

From: "Matthew Kaufman" <matthew@eeph.com>
To: "'Joe Maimon'" <jmaimon@ttec.com>, <nanog@merit.edu>
Date: Wed, 20 Aug 2003 07:41:16 -0700
In-Reply-To: <3F4384D8.7060400@ttec.com>
Errors-To: owner-nanog-outgoing@merit.edu


Absolutely not.

SoBig.F, like many others, forges the sender address. That means that =
your
notifications:
  1) Don't make it back to the person with the infection
  2) Simply add more clutter to the mailbox of the person whose address =
was
used (in addition to all the bounce messages)

In the enterprise, this is a great argument for scanning outbound email =
with
positive identification of whose outbound mail you're scanning.

Matthew Kaufman
matthew@eeph.com=20

> -----Original Message-----
> From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On=20
> Behalf Of Joe Maimon
> Sent: Wednesday, August 20, 2003 7:25 AM
> To: nanog@merit.edu
> Subject: To send or not to send 'virus in email' notifications?
>=20
>=20
>=20
> Considering the amount of email traffic generated by responding to=20
> forged  virus laden email from culprits like sobig should email virus=20
> scanning systems be configured to send notifications back to=20
> sender or not?
>=20
>=20
>=20
>=20


home help back first fref pref prev next nref lref last post