Patch: forcing SSL before auth
Bron Gondwana
brong at fastmail.fm
Sun Aug 9 07:21:45 EDT 2015
On Sun, Aug 9, 2015, at 20:18, Carlos Velasco wrote:
> Hi,
>
> Right now, "allowplaintext" option disallow using a plain authentication if session is not protected by TLS.
> However, this setting still allows a client to make MD5 or SHA1 auth without session being protected by TLS. This can lead to not data confidentiality when using not plain auth.
> There are several admins now requesting to force TLS for all sessions, and although this can be done using "allowplaintext" and removing all mechs but Plain, it would be right to be able to provide another layer of security and use TLS+SHA1 or so...
>
> Attached is a patch with a new imapd.conf option:
> forcetlsauth: 0 | 1. Default 0
> If enabled all authentications require a TLS session negotiated before.
I'm happy with that. We go a step further at FastMail and require SSL always (port 993). See arguments here:
> Patch also "hides" AUTH and other authentication commands that are not allowed before TLS, in Capabilites commands.
> Patched in imapd, pop3d, nntpd, httpd.
>
> This patch does not break cyradm functionality at all, however I attach another patch for the cyradm perl part to allow "--cafile" option (got tired of certificate validation warnings) and also fixed a minor bug when requesting capabilities to server without the callback.
>
> Please, consider committing this to mainstream.
>
> Regards,
> Carlos Velasco
>
> Email had 2 attachments:
> + cyrus-imapd-2.5.4-forcetlsauth.patch
> 7k (text/x-patch)
> + cyrus-imapd-2.5.4-cyradmtls1.patch
> 2k (text/x-patch)
--
Bron Gondwana
brong at fastmail.fm
More information about the Cyrus-devel
mailing list