pop 110/995, imap 143/993 ?
Peter
peter at pajamian.dhs.org
Wed Aug 23 04:44:12 EEST 2017
On 23/08/17 11:13, Joseph Tam wrote:
> You don't need plaintext to use CRAM-MD5: there's no problem have *both*
> CRAM-MD5 and SSL (it's overkill, but works). And mail data is worth
> protecting too.
The problem is, as I already pointed out, that using CRAM-MD5 or any
other form of challenge-response password mechanism requires that the
password be stored on the server in plain text. Furthermore just the
advertisement of CRAM-MD5 in a response advertises to an attacker that
you do indeed store the passwords as plain text. I would much rather
store the password as a hash on the server and only offer up the PLAIN
and LOGIN types on an encrypted connection.
> No argument here about using end-to-end encryption, but protecting mail
> data and metadata is important too. Don't forget also, it's not just
> about the privacy (reading) of mail data, but it's also important to
> guarantee the authenticity of mail data from tampering.
Right, the most common means of doing that is to properly authenticate
to the submission server and check TLS validity, then the submission
server DKIM signs the message. Of course, this implies trust of the
submission server.
> By the way, if we assume a hostile network where MITM is possible, then
> even closing STARTTLS ports will not guarantee confidential transport:
> the MITM attacker can merely open up a fake plaintext-only service port,
> then proxy that to the target server. The client must deny non-secured
> transport to be fully protected.
Yes, exactly! If the client accepts a non-secure connection then it
doesn't matter what the server does. It's the client that must be
vigilant here.
That said, a client that is configured to port 465 would require a
config change in order to accept a plaintext connection, but then so
would a client that is configured to port 587 and mandatory encryption.
Peter
More information about the dovecot
mailing list