Re: Automatic encryption of stored messages

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 28/04/10 14:38 -0300, Reinaldo de Carvalho wrote:
If the hacker owned the server he can
- use "tcpdump -s 0 -A | grep --line-buffered -e LOGIN -e USER -e
PASS" to get password in next user authentication.
- read TLS private key file and look traffic with tcpdump.
- read TLS private key from memory.
- switch imapd daemon to a version that save user/password on a file.

That's easier than it sounds (in imapd.conf):

sasl_auto_transition: 1
sasl_auxprop_plugin: sasldb

which would place all shared secrets in the clear, into /etc/sasldb2

or even worse, set sasl_auxprop_plugin to ldapdb or sql and configure it to
store the shared secrets somewhere over the network. No need to bother with
decrypting the TLS traffic.

--
Dan White

[Index of Archives]     [Info Cyrus]     [Squirrel Mail]     [Linux Media]     [Yosemite News]     [gtk]     [KDE]     [Gimp on Windows]     [Steve's Art]

  Powered by Linux