Package: starttls
Version: 0.10-3
Severity: critical

starttls package should IMHO be removed from Debian repositories, as it
looks like a security joke:

- it does not allow passing trust anchors to be used to verify the
  remote peer: are users expected to see the issue by themselves and not
  use it?
- usage advertises a --verify option to set the verificaion level (no
  details on accepted values): in all cases, it is not considered in the
  code and SSL_VERIFY_NONE is used instead.
- The man page does not describe the options the program accept and does
  not warn the user about the lack of checks.

AFAICT, starttls provides a good example of how OpenSSL API should *not*
be used! Its use should only be limited to testing purposes and a *huge*
disclaimer on its limitations should be put somewhere.

Comments welcome.

Cheers,

a+

ps: [EMAIL PROTECTED] is in CC, because previous list of issues is
    still valid against CVS version of starttls.
pps: Gnus ML is in CC as some people might be using it (for years?).



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to