On Fri, Jul 19, 2002 at 02:40:16PM -0400, Owen, Greg wrote:
| > I saw this behavior in Norton AV 2000. After searching their
| > web site, I found the information saying that they just plain
| > don't support SSL encrypted email. You have to pick, auto-scan
| > AV, or encrypted session.
|
| I ran into this bug (yes, I'll call it a bug) in Norton a few
| months ago. I can only say that there is a special circle in hell
| reserved for companies which _silently_ disable security measures in
| order to let their product carry out a procedure (especially a redundant
| procedure).
|
| While we're on STARTTLS issues, another security issue people
| should be aware of is that mail clients (I've seen this on OE, but I'm
| betting it is pretty common) only use SSL for encryption, not
| authentication. In other words, if you just happen to be in a hotel
| with one of those ethernet devices, and the hotel ISP happens to
| silently redirect port 25 to their own SMTP relay, and their SMTP relay
| supports STARTTLS with a valid certificate, then your mail client will
| very happily transmit your SMTP AUTH credentials to their server,
| thinking it is your own that it is talking to. This one bit me at SANS
| Orlando 2002 (Thank you, Marriot...)
So if the Marriot can do this, why can't Norton?
It seems to be the perfect solution; encrypt to the AV product, which
is doing a MITM attack, and then from the AV product to your mail
server.
Which of course will make figuring out what the cert on the far end is
*even trickier*, but hey, its a small price to pay for
anti-eavesdropping.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume