On 28/04/10 14:38 -0300, Reinaldo de Carvalho wrote:
If the hacker owned the server he can
- use "tcpdump -s 0 -A | grep --line-buffered -e LOGIN -e USER -e
PASS" to get password in next user authentication.
- read TLS private key file and look traffic with tcpdump.
- read TLS private key from memory.
- switch imapd daemon to a version that save user/password on a file.

That's easier than it sounds (in imapd.conf):

sasl_auto_transition: 1
sasl_auxprop_plugin: sasldb

which would place all shared secrets in the clear, into /etc/sasldb2

or even worse, set sasl_auxprop_plugin to ldapdb or sql and configure it to
store the shared secrets somewhere over the network. No need to bother with
decrypting the TLS traffic.

--
Dan White

Reply via email to