On Mon, May 13, 2013 at 05:53:09PM +0200, Andreas Schiermeier wrote:

> our latest external PCI scan found SSL-enabled Postfix SMTP servers
> (2.7.0 running on Ubuntu 10.04 LTS) vulnerable to SSL CRIME attacks
> <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929>.

Don't listen to brainless auditors wielding checklists.  The CRIME
attack does not apply to SMTP, because unlike SMTP, there is no
javascript in SMTP clients that makes them send thousands of
email messages with chosen plaintext compressed together in
the same packet with SASL credentials or other sensitive data.

The auditor completely failed to take the context into account.

> I've ported Apache httpd patch
> <https://issues.apache.org/bugzilla/show_bug.cgi?id=53219> to Postfix
> 2.10. Please can you have a look at it?

Postfix 2.11 will include the ability to disable compression and
session tickets if enabled by default in the OpenSSL library.  You
should disable compression if it uses too much CPU, and laugh at
any claims that SMTP needs "CRIME-prevention".  You may disable
session tickets if they cause breakage with your favourite NetBSD
5.1 MTA.

The patch is unlikely to get adopted as a non-configurable work-around
for a non-problem.

-- 
        Viktor.

Reply via email to