Hi,
our latest external PCI scan found SSL-enabled Postfix SMTP servers
(2.7.0 running on Ubuntu 10.04 LTS) vulnerable to SSL CRIME attacks
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929>.
I've ported Apache httpd patch
<https://issues.apache.org/bugzilla/show_bug.cgi?id=53219> to Postfix
2.10. Please can you have a look at it?
Kind regards,
Andreas
--- postfix-2.10.0/src/tls/tls_server.c 2012-05-17 19:15:13.000000000 +0200
+++ postfix-2.10.0-nosslcomp/src/tls/tls_server.c 2013-05-13 17:09:53.591194385 +0200
@@ -393,6 +393,16 @@
SSL_CTX_set_verify_depth(server_ctx, props->verifydepth + 1);
/*
+ * Mitigate CRIME attacks (CVE-2012-4929)
+ */
+#ifdef SSL_OP_NO_COMPRESSION
+ /* OpenSSL >= 1.0 only */
+ SSL_CTX_set_options(server_ctx, SSL_OP_NO_COMPRESSION);
+#elif OPENSSL_VERSION_NUMBER >= 0x00908000L
+ sk_SSL_COMP_zero(SSL_COMP_get_compression_methods());
+#endif
+
+ /*
* Protocol work-arounds, OpenSSL version dependent.
*/
off |= tls_bug_bits();