pop 110/995, imap 143/993 ?
Sebastian Arcus
s.arcus at open-t.co.uk
Tue Aug 22 10:29:01 EEST 2017
On 22/08/17 01:56, Peter wrote:
>>> Lest anyone think STARTTLS MITM doesn't happen,
>>>
>>> https://threatpost.com/eff-calls-out-isps-modifying-starttls-encryption-commands/109325/3/
>
> Right, the attack does happen, but it can be prevented by properly
> configuring the server and client.
>
>>> Not only for security, I prefer port 993/995 as it's just plain
>>> simpler to initiate SSL from the get-go rather than to do some
>>> handshaking that gets you to the same point.
>
> Simpler from a protocol perspective, yes, but not from a configuration
> perspective. A separate port requires more firewall configuration,
> requires listening on more one port if you need to accept both plain
> text and encrypted connections and requires that port to be allocated by
> IANA.
Seriously? So one more port to allow through the firewall is somehow
more complex than making sure the server and/or the client is configured
to refuse falling back to plaintext communication - and testing various
clients and server flavours to make absolutely sure that they do what
they are supposed to be doing and don't fall for a MITM attack? At least
with plain SSL/TLS ports, you know for sure that if you are connected,
it is definitely encrypted.
</snip>
>
>> It would
>> appear that STARTTLS is significantly more vulnerable to MITM attacks
>> than plain SSL/TLS for all the above protocols. Is the slight extra
>> convenience of opportunistic encryption really worth the substantial
>> loss in security?
>
> I would not say significantly. If the client is configured to require
> encryption and to validate the resulting cert from the server then any
> MITM vulnerability of STARTTLS is fully mitigated. A MITM attack is
> only an issue if the client is configured for opportunistic encryption.
> Note that the server side should be configured to require encryption on
> as well, but the important thing is that the client requires it.
Yes - and you have a lot of "if's" above - and that is exactly what
makes it more vulnerable in practice - where you have to make absolutely
sure that your particular version of your particular software definitely
behaves like that - while with plain SSL/TLS it just works and there is
no checking needed or "if's". In real life, that makes STARTTLS less secure.
More information about the dovecot
mailing list