lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <AANLkTikzN3Vk32gqyF32CxRmnBHSr_KD_r+0Hb64jz5Q@mail.gmail.com>
Date: Wed, 16 Mar 2011 23:11:40 +1100
From: dave b <db.pub.mail@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Mutt: failure to check server certificate in
 SMTP TLS connection

On 9 March 2011 16:41, Tim <tim-security@...tinelchicken.org> wrote:
>> As port 587 is for port for TLS/STARTTLS and port 465 is for ssl if I
>> am not mistaken.
>>
>> Please do point out if I have gotten this completely incorrect.
>
>
> Nope, you're right, it looks like I got the two mixed up.
> Good catch on the lack of certificate validation.

It also turns out that I didn't test this issue enough. As I didn't
test with both gnutls and openssl. I only tested with gnutls. Mutt
actually works as I would expect with imaps, smtps and smtp -- with
starttls connection when using openssl. mutt appears to  be _broken_
when using gnutls for imaps, smtps and smtp -- with starttls. (on mutt 1.5.20).

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ