Hi all,
I've been using E.F.A. for some time now and I still have some working ESVA setups running at a few sites.
If I recall correctly, a major security breach in the cgi that allowed to release messages marked as spam (I'm talking about ESVA) forced us to close all http/https connections from the exterior and allow them only from within the network (or via vpn). From a security point-of-view it's nice, but it's a huge pain in the @ss to the user side.
I was wondering if those issues have been solved in EFA or if allowing https from the outside is still a huge concern (I say huge because it's always a concern).
thanks in advance.
Tiago Marques
release-msg.cgi security
Re: release-msg.cgi security
That issue with the broken cgi in esva has been fixed, we use a token system and use input validation to make sure this won't happen again.
Version eFa 5.x now available!
-
- Posts: 2
- Joined: 01 Jul 2014 16:24
Re: release-msg.cgi security
ah great to know.
thanks for the great work with EFA.
TM
thanks for the great work with EFA.
TM
- shawniverson
- Posts: 3783
- Joined: 13 Jan 2014 23:30
- Location: Indianapolis, Indiana USA
- Contact:
Re: release-msg.cgi security
Also, EFA supports Trusted Networks for additional security (off by default).