Hi!

On Tue, 7 Oct 2014 14:45:24 -0400, grarpamp wrote:
> On Tue, Oct 7, 2014 at 1:28 PM, Ángel González <an...@16bits.net>
> wrote:
> > CustaiCo wrote:
> >> Because of how cleanly seperated the network code is from the rest
> >> of the application, I'm fairly sure that there should be no leaks,
> >> unless the ssl library decides to open it's own connections for no
> >> reason.
> >
> > Like doing an OCSP check?
> >
> > (although neither openssl nor gnutls seem to do that automatically
> > nowadays)
> 
> Exactly like that, it's worth looking for, ie: can the user's TLS
> config or TLS compile default turn on OCSP

Currently you can use --tls-crl-file, and you have to update the CRL
file via some external mechanism. Though I doubt that anybody does
that.

Note that if you want automatic revocation checking via OCSP, you have
to be very careful not to reveal information about which servers you
contact at which time. (As far as I know, the certificate you want to
check is sent to the server. And OCSP may not even use encryption
itself, so all information you reveal is public.)

Martin

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
msmtp-users mailing list
msmtp-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/msmtp-users

Reply via email to