Penetration Testing mailing list archives
Re: sniffing plaintext protocols
From: "itsec.info" <itsec.info () gmail com>
Date: Fri, 11 Aug 2006 18:19:38 +0200
On Friday 11 August 2006 07:34, Tonnerre Lombard wrote:
While this discussion doesn't quite seem to match the list subject, I have something to say here.
It is welcome when the topic evolves!
On Thu, 2006-08-10 at 10:27 -0700, Gary E. Miller wrote:Most modern pop3 and imap clients and servers support TLS. That protentially gives you a certificate protected channel between the client and server. A nice setup is dovecot server and thunderbird client using all TLS.This doesn't protect your mail at all if one of the mail servers underway demands to receive the mail unencrypted, which a lot of mail servers still do these days.
Hopefully these emails can not be de-crypted on the fly.
Even worse, this gives anyone with the desire to crack your local TLS certificate for pop3s/imaps a huge opportunity for a known plaintext attack.
I do not get this point.
The only real way to secure the contents (not the sender and receipient!) of your mail is to use PGP encryption on it. If you want to hide the metadata (who sent mail to who and about what) as well, you'll have to go for mixes, but they're pretty uneasy to get right...
Well pgp does address another area compared to TLS or pop3s. On the other hand I agree to combine both! -- Regards, Mike ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: sniffing plaintext protocols itsec.info (Aug 01)
- Re: sniffing plaintext protocols Dotzero (Aug 09)
- Message not available
- Re: sniffing plaintext protocols Dotzero (Aug 10)
- Re: sniffing plaintext protocols Gary E. Miller (Aug 10)
- Re: sniffing plaintext protocols Tonnerre Lombard (Aug 11)
- Re: sniffing plaintext protocols itsec.info (Aug 11)
- Re: sniffing plaintext protocols Joachim Schipper (Aug 11)
- Re: sniffing plaintext protocols Tonnerre Lombard (Aug 15)
- Re: sniffing plaintext protocols killy (Aug 18)
- Message not available
- Re: sniffing plaintext protocols Dotzero (Aug 09)
- <Possible follow-ups>
- Re: sniffing plaintext protocols Shreyas Zare (Aug 09)
- Re: sniffing plaintext protocols dfullert (Aug 10)
- Re: sniffing plaintext protocols Shreyas Zare (Aug 10)