Re: Automatic encryption of stored messages

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Apr 28, 2010 at 2:52 PM, Dan White <dwhite@xxxxxxx> wrote:
> On 28/04/10 14:38 -0300, Reinaldo de Carvalho wrote:
>>
>> If the hacker owned the server he can
>> - use "tcpdump -s 0 -A | grep --line-buffered -e LOGIN -e USER -e
>> PASS" to get password in next user authentication.
>> - read TLS private key file and look traffic with tcpdump.
>> - read TLS private key from memory.
>> - switch imapd daemon to a version that save user/password on a file.
>
> That's easier than it sounds (in imapd.conf):
>
> sasl_auto_transition: 1
> sasl_auxprop_plugin: sasldb
>
> which would place all shared secrets in the clear, into /etc/sasldb2
>
> or even worse, set sasl_auxprop_plugin to ldapdb or sql and configure it to
> store the shared secrets somewhere over the network. No need to bother with
> decrypting the TLS traffic.
>

Creativity has no limit :)


-- 
Reinaldo de Carvalho
http://korreio.sf.net
http://python-cyrus.sf.net

"Don't try to adapt the software to the way you work, but rather
yourself to the way the software works" (myself)


[Index of Archives]     [Info Cyrus]     [Squirrel Mail]     [Linux Media]     [Yosemite News]     [gtk]     [KDE]     [Gimp on Windows]     [Steve's Art]

  Powered by Linux