>> You haven't provided enough details.
>>
>> Do you use SSL encrypted HTTP connection? Is connection encrypted in
>> browser? What security algorithm are supported by browser?
>>
> Ok, I used https and a certificate was installed.  However, do I need
> https even if SquirrelMail is using the OpenSSL module?  And when I ran
> configtest.php, I came across the following message:
> ERROR: You have enabled TLS encryption in the config, but the server does
> not report STARTTLS capability. TLS is probably not supported.

SquirrelMail uses PHP OpenSSL extension in secure IMAP and SMTP
connections. PHP OpenSSL extension does not secure http traffic coming to
your server.

In webmail interfaces user and password information is transfered in two
places:

1. Using HTTP protocol from browser to webserver.

In order to secure it, you need SSL enabled webserver. If webserver uses
strong encryption, you might have to update browser or crypto libraries on
client machine. older OSes and Netscape browser versions haven't included
strong crypto due to USA export regulations.

2. Using IMAP protocol from webserver to imap server.

Authentication can be secured with STARTTLS, CRAM-MD5, IMAPS and some
other authentication protocols. STARTTLS allows to start TLS encryption in
existing plain text connection. SquirrelMail does not support STARTTLS.
CRAM-MD5 uses special challenge/response protocol (rfc 2195). SquirrelMail
supports it, but you must store plaintext password on imap server in order
to use it. IMAPS is IMAP service secured by SSL layer. In order to use it
you must change IMAP port _and_ Secure IMAP settings in SquirrelMail IMAP
configuration. Currently these settings don't depend on each other. You
can create invalid configuration with IMAP port set to 143 and Secure IMAP
enabled.

Please note that when IMAP server is on the same host as web server, you
are trying to secure local connection. Password is not transfered over
insecure network. If some badguy is sniffing local interface, you should
take your compromised server offline. Only admin user can sniff local
interface.


Other possible security issues - authenticated smtp and pop-before-smtp
connections, database connections in db based setup,
http/ftp/ldap/poppass/sql connections in change password and vacation
plugins, authenticated ldap address book connections, pop3 connections in
mail_fetch plugin, other network connections initiated by third party
plugins.


Think. Draw a diagram that shows all webmail components and find the ones
that are vulnerable.

--
Tomas


-------------------------------------------------------
SF.Net email is sponsored by:
Tame your development challenges with Apache's Geronimo App Server. Download
it for free - -and be entered to win a 42" plasma tv or your very own
Sony(tm)PSP.  Click here to play: http://sourceforge.net/geronimo.php
--
squirrelmail-users mailing list
Posting Guidelines: 
http://squirrelmail.org/wiki/wiki.php?MailingListPostingGuidelines
List Address: squirrelmail-users@lists.sourceforge.net
List Archives: 
http://news.gmane.org/thread.php?group=gmane.mail.squirrelmail.user
List Archives:  http://sourceforge.net/mailarchive/forum.php?forum_id=2995
List Info: https://lists.sourceforge.net/lists/listinfo/squirrelmail-users

Reply via email to