Package: dovecot
Version: 1:1.2.15-3
Severity: important
Tags: security

Hi,

After installing dovecot it comes with insecure SSL ciphers enabled by
Luckily I saw that SSLv2 is now default disabled, but even with SSLv3
and TLSv1 dovecot enables 40 bit ciphers:

EXP-EDH-RSA-DES-CBC-SHA 40 bits
EXP-RC4-MD5 40 bits
EXP-DES-CBC-SHA 40 bits
EXP-RC2-CBC-MD5 40 bits

40 bits is easily crackable and such ciphers are a problem not only
for users that have misconfigured clients and think they might be
secure, but because the negotiation happens (obviously) before the
SSL connection is established an attacker could influence it and
manipulate it into a lower encryption.

The following seems to be an acceptable set of ciphers while still
allowing mainstream clients to connect:

ssl_cipher_list = HIGH:MEDIUM:!ADH:+TLSv1:!SSLv2:+SSLv3


Cheers,
Thijs


-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=nl_NL.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to