From: Rob M. <rob...@gm...> - 2007-08-23 09:50:57
|
On 8/23/07, Matthias Andree <mat...@gm...> wrote: > > Yes, older openssl s_client versions don't support as many protocols. Even 0.9.8e, the most recent, appears to be less than 100% - it won't talk TLS to my domain host's IMAP/POP servers (but fetchmail will). <---SNIP---> > Generally, there are two approaches of trusting the server's > certificate: > > 1. The canonical and recommended one: verify the recognized > Certification Authority's signature on the server certificate (that > works for major CAs as their certificates are usually shipped with > the OS or available as add-on, for instance, in FreeBSD's ca-roots > port). /etc/ssl/certs contains certificates of CAs we trust > (recognize) and is thus the configuration directory for the "trusted > CAs". > > That is the usual way of doing things, and reasonable sites using > self-signed certificates provide their root CA certificates for > download with a web browser and usually offer a phone number you can > call to verify the fingerprint. > At least that's how my former and current universities and the DFN > (at a very coarse look, they provide the Internet backbone to German > Universities) do that. Sadly, not all do. I'll need to check, but I'm pretty sure one of my current mail hosts uses a self signed certificate and no way of downloading the CA certificate. > 2. The less durable one: verify the server's certificate instead. > > The recommendation of downloading the certificate and stuffing it > into /etc/ssl/certs however is just a very cumbersome alternative of > specifying the sslfingerprint which fetchmail already prints at -v > verbose level. Let's not tell users to use openssl s_client to > download certificates, but let's just point them to the > sslfingerprint option and tell them that they need a recent fetchmail. > > The only technical difference is we're using a hash of the > certificate and are currently relying on MD5, but I'm not aware that > attacks are publicly known to generate a message with a specific hash > in a reasonable amount of time. I'm not aware of any easy way of generating a matching MD5, with valid content, easily. I suppose this raises a feature request then - when a certificate fails to verify fetchmail should email the user specified in the poll command (or the postmaster if multiple users are listed) to tell them. > The wording above is perhaps not as clear as it could be if I revised > this text several times, but let's just see where it's unclear and > revise the critical parts. (And if that's going to evolve into a "SSL > certificate management for fetchmail" section, that's exactly what I'm > aiming at :-)) I don't have any problems understanding it, but then I have a reasonable understanding of how SSL works :) I'll come back to it later and have another read to see if I can spot anything the average user of fetchmail may not understand. -- Please keep list traffic on the list. Rob MacGregor Whoever fights monsters should see to it that in the process he doesn't become a monster. Friedrich Nietzsche |