Updated: 5/3/06; 3:47:49 PM.
Ted's Radio Weblog
Mission: Interoperable. Competition breeds Innovation. Monopolies breed stagnation. Working Well with Others is Good.
        

Thursday, April 27, 2006

Microsoft Watch from Mary Jo Foley asks "Is Microsoft Engaging in 'Borderline Extortion' with Security Disclosures?" "We have to admit, zero-day Internet Explorer vulnerabilities just don't shock us any more. But the harsh words of security researcher Michal Zalewski, regarding Microsoft's policies for dealing with vulnerabilities, did make us stand up and take notice."

In very related news, eWEEK.com is reporting Microsoft Rocked by New IE Zero-Day Flaw Warning. "Microsoft is scrambling to address the public disclosure of a new zero-day vulnerability that could put Web surfers at risk of code execution attacks."
10:02:50 AM    comment []


For years, I've endorsed the idea that using a simple low-level protocol was far easier to troubleshoot and maintain than the high-level, proprietary and hidden-from-view COM interfaces that were all the rage in the Windows world, hence, "SMTP Good, MAPI Bad."

Laura and I support a vertical-niche application in use around the country. Each of the installations runs Visual FoxPro 7 as a LAN-based application and sends faxes via email using MaxEmail, rather than supporting their own in-house faxing system. On a regular basis, one of our clients will change email providers, so the settings for email are stored in a separate file for easy update.

"Easy," though, is a relative term. More email providers are requiring authentication before allowing outgoing emails, a reasonable precaution against spam. However, each installation of SMTP AUTH we have run up against has a slightly different variation on how authentication is done, and invariably, email stops until we analyze, debug and modify our code to support the new variation.

I've used the free BLAT command-line tool with it's -debug switch to allow me to witness the actual conversation that takes place between email client and server to determine the details of where the conversation is breaking down and how to fix it. Open Source rocks! BLAT rocks!

In this last case, the new email provider's SMTP AUTH required a user name ("bob") and not an email address ("bob@example.com") as the user name. The previous SMTP AUTH interfaces were comfortable with the same name for email address and user name. Laura tweaked the code and we got the client back up and running.

UPDATE: Thanks to Alex Feldstein for the pointer. In fact, we too are using Rick Strahl's wwIPStuff, now renamed West Wind Client Tools as the machanism within the application to send SMTP mails. We've just used the standalone BLAT for its great low-level debugging facilities and ease of use from the commandline to figure out what to tell wwIPStuff to do.
9:15:35 AM    comment []


© Copyright 2006 Ted Roche.   

Creative Commons License This work is licensed under a Creative Commons License.

  

 

April 2006
Sun Mon Tue Wed Thu Fri Sat
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30            
Mar   May


Click here to visit the Radio UserLand website.

Subscribe to "Ted's Radio Weblog" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
Blogroll
miniXmlCoffeeMug.gif miniXmlButton.gif Byte
Gillmor's Blog