HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.74 Manipulation of alias files and distribution lists

T 5.74 Manipulation of alias files and distribution lists

To avoid having to re-enter frequently required e-mail addresses, pseudonyms can be assigned to these addresses, or distribution lists can be prepared to allow convenient selection of a large group of recipients. Unauthorised modification to such pseudonyms and distribution lists can result in a failure to forward e-mail to the required recipient, or transfer of the e-mail to an unauthorised recipient. Particularly vulnerable in this case are centrally maintained pseudonym files and address books.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 1999
home