Evolution uses weak encryption for SSL/TLS
Bug #82515 reported by
Fridtjof Busse
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Evolution |
Fix Released
|
Medium
|
|||
evolution (Ubuntu) |
Fix Released
|
Low
|
Ubuntu Desktop Bugs |
Bug Description
Binary package hint: evolution
Evolution in feisty uses weak encryption when s(ending mail via SSL/TLS.
E.g., the server supports AES 256 bit, but Evolution uses the probably weakest encryption available:
(using SSLv3 with cipher RC4-MD5 (128/128 bits))
All other MUAs I checked use AES-256 correctly. I consider this a serious bug, as RC4-MD5 is definitly not a good idea.
Manually connecting via 'openssl s_client' to the server I used for testing shows:
SSL-Session:
Protocol : TLSv1
Cipher : DHE-RSA-AES256-SHA
So it definitly works.
Related branches
Changed in evolution: | |
status: | Unknown → Unconfirmed |
Changed in evolution: | |
status: | New → In Progress |
Changed in evolution: | |
status: | Confirmed → Fix Committed |
Changed in evolution: | |
status: | In Progress → Fix Released |
Changed in evolution: | |
importance: | Unknown → Medium |
To post a comment you must log in.
Confirmed. Evolution does not even propose EAS as a valid ciphersuite when connecting. The following is the output of a ssldump from a Evolution connection to GMAIL at port 995:
3 1 0.1265 (0.1265) C>S SSLv2 compatible client hello CK_RC4_ EXPORT40 CK_RC2_ EXPORT40 WITH_RC4_ 128_MD5 WITH_3DES_ EDE_CBC_ SHA WITH_DES_ CBC_SHA EXPORT1024_ WITH_RC4_ 56_SHA EXPORT1024_ WITH_DES_ CBC_SHA EXPORT_ WITH_RC4_ 40_MD5 EXPORT_ WITH_RC2_ CBC_40_ MD5
Version 3.0
cipher suites
SSL2_CK_RC4
SSL2_CK_RC2
SSL2_CK_3DES
SSL2_CK_DES
SSL2_
SSL2_
SSL_RSA_
Unknown value 0xfeff
SSL_RSA_
Unknown value 0xfefe
SSL_RSA_
SSL_RSA_
SSL_RSA_
SSL_RSA_
SSL_RSA_
2 2 0.2113 (0.0665) S>C Handshake
I do not know what ciphersuites are represented by 0xfeff and 0xfefe, since they are (theoretically) reserved and private, respectively.