On Sun, Aug 9, 2015, at 20:18, Carlos Velasco wrote:
> Hi,
> 
> Right now, "allowplaintext" option disallow using a plain authentication if 
> session is not protected by TLS.
> However, this setting still allows a client to make MD5 or SHA1 auth without 
> session being protected by TLS. This can lead to not data confidentiality 
> when using not plain auth.
> There are several admins now requesting to force TLS for all sessions, and 
> although this can be done using "allowplaintext" and removing all mechs but 
> Plain, it would be right to be able to provide another layer of security and 
> use TLS+SHA1 or so...
> 
> Attached is a patch with a new imapd.conf option:
> forcetlsauth: 0 | 1. Default 0
> If enabled all authentications require a TLS session negotiated before.

I'm happy with that.  We go a step further at FastMail and require SSL always 
(port 993).  See arguments here:

(sorry about the previous post - my laptop's horrible mouse/touchpad thing is 
finicky, and clicked the button for me as I switched windows to grab the link)

https://www.fastmail.com/help/technical/ssltlsstarttls.html

> Patch also "hides" AUTH and other authentication commands that are not 
> allowed before TLS, in Capabilites commands.
> Patched in imapd, pop3d, nntpd, httpd.

Good plan.

> This patch does not break cyradm functionality at all, however I attach 
> another patch for the cyradm perl part to allow "--cafile" option (got tired 
> of certificate validation warnings) and also fixed a minor bug when 
> requesting capabilities to server without the callback.

Sounds good to me.  Leena - any comments as the expert on cyradm these days? :)

> Please, consider committing this to mainstream.

I'll have a read through - but I have no objection in principle to these 
patches.

Thanks for submitting them!

Cheers,

Bron.

-- 
  Bron Gondwana
  br...@fastmail.fm

Reply via email to