On Sun, Jun 21, 2020 at 01:37:53PM +0200, Vincent Lefevre wrote:
On 2020-06-20 14:49:56 -0700, Kevin J. McCarthy wrote:
I've committed a fix: 
<https://gitlab.com/muttmua/mutt/-/commit/dc909119b3433a84290f0095c0f43a23b98b3748>
but won't be able to make a release for 2-3 days.  Packagers may wish to
apply the patch.  Users encountering the problem should set $ssl_starttls to
"ask-yes", "ask-no", or "no" (with caution) for the time being.

Doesn't this need to unset $ssl_force_tls too?

That's true - thank you. In this case $ssl_startls defaults to 'yes', so it's more likely to cause a problem. But you are right I should have mentioned $ssl_force_tls also.

BTW, I don't think that testing $ssl_starttls here is useful, as I've
just said in bug 246

 https://gitlab.com/muttmua/mutt/-/issues/246

Its value alone will not prevent a MITM attack, and this test may
annoy users who do not need TLS because the connection is already
encapsulated in an encrypted connection.

Sorry, I don't understand this comment.  The fix checks for $tunnel, and
won't check for either in that case.

The intent of the patch was to prevent a possible MITM in default configuration. Yes, there are other MITMs that aren't mitigated by $ssl_starttls, but this one can be done. The user is free to turn off $ssl_starttls in an account-hook if they know their unencrypted PREAUTH is desired.

--
Kevin J. McCarthy
GPG Fingerprint: 8975 A9B3 3AA3 7910 385C  5308 ADEF 7684 8031 6BDA

Attachment: signature.asc
Description: PGP signature

Reply via email to