Package: starttls
Version: 0.10-3
Severity: critical
starttls package should IMHO be removed from Debian repositories, as it
looks like a security joke:
- it does not allow passing trust anchors to be used to verify the
remote peer: are users expected to see the issue by themselves and not
use it?
- usage advertises a --verify option to set the verificaion level (no
details on accepted values): in all cases, it is not considered in the
code and SSL_VERIFY_NONE is used instead.
- The man page does not describe the options the program accept and does
not warn the user about the lack of checks.
AFAICT, starttls provides a good example of how OpenSSL API should *not*
be used! Its use should only be limited to testing purposes and a *huge*
disclaimer on its limitations should be put somewhere.
Comments welcome.
Cheers,
a+
ps: [EMAIL PROTECTED] is in CC, because previous list of issues is
still valid against CVS version of starttls.
pps: Gnus ML is in CC as some people might be using it (for years?).
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]