[vchkpw] security issue

2010-12-22 Thread ckubu
Hi,

Mailsetup: qmail + vpopmail 5.5.27 + dovecot

Over the years, we didn't store cleatext versions of passwords. Some time ago, 
we wanted to change that setup and since that time, we used vpopmail compiled 
without option --disable-clear-passwd, but know with 
option --enable-learn-passwords . step by step, we wanted to get user's 
passwords (we discussed that issue here on the list about 2 years ago). The 
reason was, we wanted to change our mailsetup (postfix+dovecot). But that did 
not work, means, cleartext version of password wasn't stored.

All other was working fine and so i didn't change anything. This was a big 
mistake, because since that time, all vpopmail mailboxes could be accessed 
with an empty passwordstring, at least, if the clients were using cram or 
digest authentication.

I know about the misconfigured vpopmail, but i think this behavor isn't as 
expected. In the documentation of the option --disable-clear-passwd is 
explaned, that this option causes vpopmail to store cleartext version of 
passwords in _addition_ to their encrypted versions, and so i think, the 
described behavior is at least a security leak.

regards
Christoph

!DSPAM:4d11dbb332714993054289!



Re: [vchkpw] security issue

2010-12-22 Thread Matt Brookings
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/22/2010 05:06 AM, ckubu wrote:
 Hi,
 
 Mailsetup: qmail + vpopmail 5.5.27 + dovecot

I assume you mean vpopmail 5.4.27.

 Over the years, we didn't store cleatext versions of passwords. Some time 
 ago, 
 we wanted to change that setup and since that time, we used vpopmail compiled 
 without option --disable-clear-passwd, but know with 
 option --enable-learn-passwords . step by step, we wanted to get user's 
 passwords (we discussed that issue here on the list about 2 years ago). The 
 reason was, we wanted to change our mailsetup (postfix+dovecot). But that did 
 not work, means, cleartext version of password wasn't stored.
 
 All other was working fine and so i didn't change anything. This was a big 
 mistake, because since that time, all vpopmail mailboxes could be accessed 
 with an empty passwordstring, at least, if the clients were using cram or 
 digest authentication.
 
 I know about the misconfigured vpopmail, but i think this behavor isn't as 
 expected. In the documentation of the option --disable-clear-passwd is 
 explaned, that this option causes vpopmail to store cleartext version of 
 passwords in _addition_ to their encrypted versions, and so i think, the 
 described behavior is at least a security leak.

This should be fixed in the latest stable in the 5.4 tree.  Try
upgrading to 5.4.32.
- -- 
/*
Matt Brookings m...@inter7.com   GnuPG Key FAE0672C
Software developer Systems technician
Inter7 Internet Technologies, Inc. (815)776-9465
*/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk0SDzgACgkQIwet2/rgZywOkwCfQAZzYjcOe80K9EV7Ipbxdnwl
VTQAoIgK65QoAlFCURgEJSQ/WEfHgBER
=NaZs
-END PGP SIGNATURE-


Re: [vchkpw] security issue

2010-12-22 Thread Joshua Megerman

 Hi,

 Mailsetup: qmail + vpopmail 5.5.27 + dovecot

 Over the years, we didn't store cleatext versions of passwords. Some time
 ago,
 we wanted to change that setup and since that time, we used vpopmail
 compiled
 without option --disable-clear-passwd, but know with
 option --enable-learn-passwords . step by step, we wanted to get user's
 passwords (we discussed that issue here on the list about 2 years ago).
 The
 reason was, we wanted to change our mailsetup (postfix+dovecot). But that
 did
 not work, means, cleartext version of password wasn't stored.

 All other was working fine and so i didn't change anything. This was a big
 mistake, because since that time, all vpopmail mailboxes could be accessed
 with an empty passwordstring, at least, if the clients were using cram or
 digest authentication.

 I know about the misconfigured vpopmail, but i think this behavor isn't as
 expected. In the documentation of the option --disable-clear-passwd is
 explaned, that this option causes vpopmail to store cleartext version of
 passwords in _addition_ to their encrypted versions, and so i think, the
 described behavior is at least a security leak.

Your words are confusing, as either you have typos or logical opposites of
what you mean.  I think you're saying that you enabled the storage of
cleartext passwords after the fact, but forgot to turn on learing of
passwords, and as a result everyone had an empty cleartext password
stored, allowing access to the mailboxes with an empty password using cram
or digest authentication.

While this may look like a security leak, I would argue that this is
simply the expected result of misconfiguring your system in a manner that
causes security holes.  The same can be said for just about any software
that uses logins - if you don't configure it correctly (and monitor it to
make sure it's still working properly), you're going to open yourself up
to unnecessary risks.

I've worked with someone who had to do the whole we want to capture
plaintext passwords after the fact thing, and they set up a very specific
plan in advance and followed it to the letter in order to minimize the
risk - specifically:

1) Recompile vpopmail w/ clear-text passwords and learning enabled.
2) Put it in place and test to make sure that passwords were being captured.
3) Keep it in place only as long as absolutely necessary - in this case, I
think they did it for a month, but it might have been less than that - and
monitor that passwords are being captured so it can be cut short if
everyone has one.
4) Recompile vpopmail WITHOUT learning enabled, put it in place, and force
everyone whose password was not learned to change their password - in this
case by changing it for them and having them call in when they can't
connect (since they hand't connected within the alloted time, it wasn't
likely a big deal).

It sounds like you did step 1, half of step 2, and didn't look at it again
until 2 years later.  You can't fault the software for working the way you
told it to and you assuming it was doing something different.  Perhaps the
documentation needs to be revised to spell out what not to do if you want
to keep your system secure, but I don't think that's the same as the
software is insecure.

And as to storing both encrypted and plaintext versions of the password, I
can see that there's no NEED to keep the encrypted version if you have the
plaintext one, but then you'd have to have 2 totally separate password
checking routines for non-cram/digest authentication, depending on which
version of the password is stored, and that seems unnecessary to me. 
Besides, there's actually a little bit of extra security in the fact that
you're never comparing just a plain text password to a plain text password
- there's always some sort of encryption algorithm involved before the
comparison...

Josh

Joshua Megerman
SJGames MIB #5273 - OGRE AI Testing Division
You can't win; You can't break even; You can't even quit the game.
  - Layman's translation of the Laws of Thermodynamics
vpopm...@honorablemenschen.com


!DSPAM:4d12170f32711772715885!



Re: [vchkpw] security issue

2010-12-22 Thread RemoMattei
I would like to add my 2 cents here. As far as I remember if the client will login with imap there will be no password learning and it will stay empty. I remember I had similar case so I have advice my client to connect with pop (I use qmail pop since it's secure and it never gave me problems) and that allowed vpopmail to learn the password for the new or users that login the first time. 


Ciao,
Remo

!DSPAM:4d1238b132718890449684!