LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-31-2009, 05:01 PM   #1
JacekZ
Member
 
Registered: Sep 2005
Location: Notts, England
Distribution: Debian 10
Posts: 71

Rep: Reputation: 15
ssl authentication type in Evolution


I wasn't sure whether to post this to newbie or security. Opted for the latter.

In the Evolution email account editor, you have the option to set up a secure connection using SSL Encryption. You also have the separate option to set up various authentication types.

Can anyone explain how these two relate to one another? For example, if I set up SSL with "password authentication" (which sounds a lot like plain text to me - as opposed to say the option for CRAM-MD5), do I defeat the secure setup?

My isp does provide ssl access to email but without support and they don't say anything in their documentation about what kind of authentication to use. The Evolution check facility suggests CRAM-MD5 may be available. If I try that I get a certificate notice which looks like a lot of gibberish to me - guess from the context it is OK but who knows..

(I've hunted the internet for a while trying to understand this point, including Evolution FAQs, without success.)

Thanks
Jacek
 
Old 02-01-2009, 03:34 PM   #2
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
If the session is encrypted with SSL/TLS then any data you send is encrypted during that session. That means it's "safe" to use a plaintext password when the session is encrypted.

A separate question is whether the SSL/TLS connection is really negotiated with your ISP, or whether someone is attempting to hijack the session by using their own certificate. Unfortunately "gibberish" is a completely worthless description, so no one will have any idea what certificate is being presented. Next time, try writing the "gibberish" down so that you can ask someone to look at it for you.
 
Old 02-07-2009, 09:30 AM   #3
JacekZ
Member
 
Registered: Sep 2005
Location: Notts, England
Distribution: Debian 10
Posts: 71

Original Poster
Rep: Reputation: 15
Chort,
Thanks for the info. I've now grabbed the text from the certificate confirmation dialog:

Quote:
Issuer: OU=Equifax Secure Certificate Authority,O=Equifax,C=US
Subject: CN=mail.ukservers.net,OU=Domain Control Validated - QuickSSL Premium(R),OU=See www.geotrust.com/resources/cps (c)07,OU=GT94989377,O=mail.ukservers.net,C=GB
Fingerprint: d6:1a:eb:3e:1b:6d:50:e7:81:c7:ed:71:45:71:dc:b1
Signature: BAD
It occurred to me that if I didn't accept it, I wouldn't be able to use ssl connection and have to use the unencrypted type, so presumably saying yes was no more risk. I'm sure if this was unsound reasoning you'll tell me! ..but it does seem to work after the event - in that I can access my emails, so presume it was OK after all.

Jacek
 
Old 02-07-2009, 01:19 PM   #4
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Quote:
Originally Posted by JacekZ View Post
It occurred to me that if I didn't accept it, I wouldn't be able to use ssl connection and have to use the unencrypted type, so presumably saying yes was no more risk.
That's not exactly true. If the certificate validation is failing because someone is conducting a man-in-the-middle attack, you're a lot worse off accepting it, because then you will falsely believe your data is safe when in fact someone else is reading it.

Here's the site the certificate was issued to:
Code:
Subject: CN=mail.ukservers.net
Is that the hostname you have typed in your mail client for the mail server? If you have a different hostname entered, it's going to fail validation.

If the hostname matches, then probably your client doesn't trust the Geotrust CA. You would have to find the list of trusted issuers that your mail client is using and add the right CA root. I believe this is the one that signed that cert: https://www.geotrust.com/resources/r..._Authority.cer . The strange thing is Geotrust's page says that CA is for non-QuickSSL certs, but as you can see the cert you're getting appears to be a QuickSSL cert... odd.

The Geotrust CA page can be found here: https://www.geotrust.com/resources/root-certificates/
 
Old 02-08-2009, 01:16 PM   #5
JacekZ
Member
 
Registered: Sep 2005
Location: Notts, England
Distribution: Debian 10
Posts: 71

Original Poster
Rep: Reputation: 15
Chort,
Mailserver address is correct. As for the rest it rather goes over my level of understanding. Adding the CA root to my client will presumably make it accept the certificate, but won't make it valid. So we're still guessing - I guess.. Or as I said, there's probably a lot about security that I don't understand.
Thanks
Jacek
 
Old 02-09-2009, 12:25 PM   #6
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Quote:
Originally Posted by JacekZ View Post
Chort,
Mailserver address is correct. As for the rest it rather goes over my level of understanding. Adding the CA root to my client will presumably make it accept the certificate, but won't make it valid. So we're still guessing - I guess.. Or as I said, there's probably a lot about security that I don't understand.
Thanks
Jacek
Adding the root CA will make the certificate valid if the only complaint was that it is signed by an "untrusted" root. In that respect, the only difference between a "valid" and "invalid" certificate is whether you trust the root CA. There are other aspects that will make a certificate invalid regardless of whether you trust the root (the date is out of range, the hostname doesn't match, etc).
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Apache ssl and client certificate authentication leno681 Linux - Server 0 09-10-2008 08:11 AM
Some sort of Authentication (ssl, what ever) between apache servers helptonewbie Linux - Server 4 02-19-2008 10:33 AM
Evolution and SSL connection dwyman Linux - Networking 1 04-22-2005 09:10 AM
how to download via SSL after I type my password nothing happens johnnydangerous Fedora 1 03-14-2005 02:38 PM
Exception type SSL.Error donk3 Linux - Security 2 08-28-2003 09:24 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:49 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration