Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5076FB43.80800@redhat.com>
Date: Thu, 11 Oct 2012 11:00:51 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Vincent Danen <vdanen@...hat.com>
Subject: Re: CVE request: sSMTP doesn't validate server certificates

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/11/2012 09:43 AM, Vincent Danen wrote:
> * [2012-10-10 11:59:13 +0200] Laurent Bigonville wrote:
> 
>> Hi,
>> 
>> It seems that sSMTP is not checking the server certificate when 
>> connecting. This is quite annoying as one of the main ssmtp
>> purpose is to be used on satellite systems that could be
>> connected to untrusted networks.
>> 
>> This has been reported (with a proposed patch) to the Debian BTS
>> (see [0])
>> 
>> Could you please allocate a CVE number for this?
>> 
>> Cheers
>> 
>> Laurent Bigonville
>> 
>> [0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662960
> 
> I'm not sure it deserves one.
> 
> If you look at the TLS file in the source tarball, it indicates
> that checking server certificates is not implemented and is
> something to add in the future:
> 
> TODO: * Check server certificate for changes and notify about it. *
> Diffrent Certificate and Key file?
> 
> Since sSMTP clearly indicates that this feature is missing and 
> unsupported, then it was designed to _not_ do certificate
> checking. Regardless of how good or bad that is, it was a design
> choice (to leave it for a later date), and it's also clearly
> documented.
> 
> To me, that doesn't seem like a security flaw (as in sSMTP was
> designed to check certificates and didn't or didn't do a good job
> of it).

Agreed, it's documented as a missing capability, so adding this counts
as security hardening, not a security fix. No CVE assigned.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=bPeF
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.