On Wed, Mar 26, 2008 at 11:01 PM, Robert Burrell Donkin
<[EMAIL PROTECTED]> wrote:
> wondering what measures are wise to take to secure IMAP when running live over
>  the internet. IMAP is an old fashioned protocol and is insecure by
>  design. i'd like to try running JAMES IMAP live @ ApacheCon EU from a
>  server in the UK but i want to think about security first. i have a
>  few questions but would appreciate it if people jump in with general
>  advice even if it's not covered by the questions.
>
>  IMAP is not a secure protocol. running securely means deviating from
>  the specification. AIUI JAMES ships with standard configurations which
>  are specification compliant.

being unsecure puts the integrity of the server and the user's data at
risk. so it is no good to be spec compliant whenever security is
converned.

>
>  it seems a little foolish to allow an untrusted client to try
>  arbitrary input against the complexity of the fully featured parser
>  before logging in. perhaps a secure encoder could be used before the
>  client has logged on.

right. in the best case, only a reduced range of inputs is considered
by the server during handshake. this is what I tried in Apache Vysper.
this should not reduce spec compliance.

>  seems foolish to allow an untrusted client to create a socket and then
>  have the server retain the connection without logging in for at least
>  30 minutes before timing it out.

right. if the server can detect obvious cases of brute force attacks,
he should close the connection.
this should not reduce spec compliance, either.

>  seems foolish to allow an untrusted client unlimited chances to login
>  over the same TLS session
>
>  may want to be able to increase the difficulty of dictionary attacks
>  by blocking connections from IPs which fail to login too many times.
>  similarly, may want to block too many simultaneous connections from
>  untrusted clients from the same IP which haven't been logged in.

right. sounds reasonable. is this against IMAP spec?

>  opinions?

did you already read of http://tools.ietf.org/html/rfc2595 ,
especially section 3.2? maybe this helps a bit to reduce exposure of
plain text passwords during login.

  Bernd

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to