Allow to prevent weak ciphers when using "useTLS" -------------------------------------------------
Key: JAMES-385 URL: http://issues.apache.org/jira/browse/JAMES-385 Project: James Type: Bug Versions: 2.2.0 Environment: Linux, jdk 1.4 Reporter: Ralf Hauser Priority: Critical http://james.apache.org/usingTLS_2_1.html and http://wiki.apache.org/james/UsingSSL explain how to setup a pop3s etc. describe how to secure a client connection to James. openssl s_client -connect pops.mydom.com:995 -cipher EXPORT illustrates that this is possible with james. One might argue that a decent client will never ask the server to negotiate a weak cipher. But an attacker (man-in-the-middle) could remove stronger ciphers from the client's offered cipher list, and then break the weak cipher and e.g. obtain the user password to later hijack the account. Please amend the documentation how prevent this from happening by forcing james to only negotiate sessions with 128+ bit session key strength -- This message is automatically generated by JIRA. - If you think it was sent incorrectly contact one of the administrators: http://issues.apache.org/jira/secure/Administrators.jspa - For more information on JIRA, see: http://www.atlassian.com/software/jira --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]