Your message dated Sat, 20 Mar 2021 21:02:08 +0000
with message-id <[email protected]>
and subject line Bug#985243: fixed in exim4 4.92-8+deb10u5
has caused the Debian Bug report #985243,
regarding exim4: incorrectly accepts certificates for CNAME targets
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
985243: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985243
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: exim4
Version: 4.92-8+deb10u4
Severity: important
Tags: fixed-upstream, security
Control: fixed -1 4.94-15
Dear Maintainer,
When Exim is configured to verify certificates against hostnames and hostname
resolution yields a CNAME, then Exim will verify the certificate against the
canonical name rather than the original hostname.
An attacker with control over the network (e.g. a rogue public wifi) can forge
CNAME records to point to a hostname under their control. They can then
obtain a legitimate certificate for the host under their control, which Exim
will accept as valid for the host it intended to connect to.
The attacker can thus
- obtain cleartext of credentials the victim needs to connect to e.g. a
smarthost
- read and manipulate mail text
Note that by default, Exim does opportunistic SSL for most connection,
allowing fallback to unencrypted connections. For such connection there is no
expectation of any protection anyway, so this flaw is of little importance.
However, when exim is configured to deliver mail to a smarthost, such as when
setting dc_eximconfig_configtype='smarthost' or 'satellite', it make sense to
also configure it to require encryption and successful certificate
verification for the connection to the smarthost. Such configurations are
also likely to use credentials to authenticate against the smarthost, which
the attack described above can reveal.
This affects exim4 4.92-8+deb10u4 from Debian 10 (buster). Upstream patched
this some time ago already, and the patch already has made it into Debian 11
(bullseye), e.g. exim4 4.94-15.
The upstream patch is this one, I believe:
----------------------------------------------------------------------
0851a3bbf4667081d47f5d85b6b3a5cb33cbdba6
Author: Jeremy Harris <[email protected]>
AuthorDate: Thu Jun 11 20:21:38 2020 +0100
Commit: Jeremy Harris <[email protected]>
CommitDate: Thu Jun 11 20:30:18 2020 +0100
TLS: use RFC 6125 rules for certifucate name checks when CNAMES are present.
Bug 2594
----------------------------------------------------------------------
This was initially reported 2020-09-04 to [email protected].
Regards,
Jorrit Fahlke.
-- Package-specific info:
Exim version 4.92 #5 built 13-May-2020 16:01:31
Copyright (c) University of Cambridge, 1995 - 2018
(c) The Exim Maintainers and contributors in ACKNOWLEDGMENTS file, 2007 - 2018
Berkeley DB: Berkeley DB 5.3.28: (September 9, 2013)
Support for: crypteq iconv() IPv6 GnuTLS move_frozen_messages DANE DKIM DNSSEC
Event OCSP PRDR SOCKS TCP_Fast_Open
Lookups (built-in): lsearch wildlsearch nwildlsearch iplsearch cdb dbm dbmjz
dbmnz dnsdb dsearch nis nis0 passwd
Authenticators: cram_md5 plaintext
Routers: accept dnslookup ipliteral manualroute queryprogram redirect
Transports: appendfile/maildir/mailstore autoreply lmtp pipe smtp
Fixed never_users: 0
Configure owner: 0:0
Size of off_t: 8
Configuration file search path is
/etc/exim4/exim4.conf:/var/lib/exim4/config.autogenerated
Configuration file is /var/lib/exim4/config.autogenerated
# /etc/exim4/update-exim4.conf.conf
#
# Edit this file and /etc/mailname by hand and execute update-exim4.conf
# yourself or use 'dpkg-reconfigure exim4-config'
#
# Please note that this is _not_ a dpkg-conffile and that automatic changes
# to this file might happen. The code handling this will honor your local
# changes, so this is usually fine, but will break local schemes that mess
# around with multiple versions of the file.
#
# update-exim4.conf uses this file to determine variable values to generate
# exim configuration macros for the configuration file.
#
# Most settings found in here do have corresponding questions in the
# Debconf configuration, but not all of them.
#
# This is a Debian specific file
dc_eximconfig_configtype='smarthost'
dc_other_hostnames='censored'
dc_local_interfaces='127.0.0.1 ; ::1 ; 192.168.28.1'
dc_readhost='censored'
dc_relay_domains=''
dc_minimaldns='false'
dc_relay_nets='192.168.28.2'
dc_smarthost='127.0.0.1::26'
CFILEMODE='644'
dc_use_split_config='true'
dc_hide_mailname='false'
dc_mailname_in_oh='true'
dc_localdelivery='mail_spool'
mailname:censored
# /etc/default/exim4
EX4DEF_VERSION=''
# 'combined' - one daemon running queue and listening on SMTP port
# 'no' - no daemon running the queue
# 'separate' - two separate daemons
# 'ppp' - only run queue with /etc/ppp/ip-up.d/exim4.
# 'nodaemon' - no daemon is started at all.
# 'queueonly' - only a queue running daemon is started, no SMTP listener.
# setting this to 'no' will also disable queueruns from /etc/ppp/ip-up.d/exim4
QUEUERUNNER='combined'
# how often should we run the queue
QUEUEINTERVAL='30m'
# options common to quez-runner and listening daemon
COMMONOPTIONS=''
# more options for the daemon/process running the queue (applies to the one
# started in /etc/ppp/ip-up.d/exim4, too.
QUEUERUNNEROPTIONS=''
# special flags given to exim directly after the -q. See exim(8)
QFLAGS=''
# Options for the SMTP listener daemon. By default, it is listening on
# port 25 only. To listen on more ports, it is recommended to use
# -oX 25:587:10025 -oP /var/run/exim4/exim.pid
SMTPLISTENEROPTIONS=''
-- System Information:
Debian Release: 10.8
APT prefers stable
APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'stable-debug'),
(1, 'testing-debug'), (1, 'experimental-debug'), (1, 'experimental'), (1,
'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 5.10.0-0.bpo.3-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8),
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages exim4 depends on:
ii debconf [debconf-2.0] 1.5.71
ii exim4-base 4.92-8+deb10u4
ii exim4-daemon-light 4.92-8+deb10u4
exim4 recommends no packages.
exim4 suggests no packages.
-- debconf information:
exim4/drec:
--
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: exim4
Source-Version: 4.92-8+deb10u5
Done: Andreas Metzler <[email protected]>
We believe that the bug you reported is fixed in the latest version of
exim4, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andreas Metzler <[email protected]> (supplier of updated exim4 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 18 Mar 2021 09:10:15 +0100
Source: exim4
Architecture: source
Version: 4.92-8+deb10u5
Distribution: buster
Urgency: medium
Maintainer: Exim4 Maintainers <[email protected]>
Changed-By: Andreas Metzler <[email protected]>
Closes: 985243 985244 985344
Changes:
exim4 (4.92-8+deb10u5) buster; urgency=medium
.
* Fix use of concurrent TLS connections under GnuTLS:
80_01-GnuTLS-fix-hanging-callout-connections.patch
80_02-GnuTLS-tls_write-wait-after-uncorking-the-session.patch
80_03-GnuTLS-Do-not-care-about-corked-data-when-uncorking.patch
(Thanks, Heiko Schlittermann for the backport)
* Pull 82_TLS-use-RFC-6125-rules-for-certifucate-name-checks-w.patch from
upstream git (already included in 4.94), on TLS connections to a CNAME
verify the certificate against the original CNAME instead of against
the A record. Closes: #985243
* In README.Debian explicitly document the limitation/extent of server
certificate checking (authenticity not enforced) in the default
configuration (Thanks, Jö Fahlke). This Closes: #985244 (improved
documentation and Closes: #985344 (Yes, without required cert
checking MitM attacks are possible, but for a stable update documenting
this is the best compromise.)
Checksums-Sha1:
3b0bc153ca931581651a9392c0d401d9a18228f7 2855 exim4_4.92-8+deb10u5.dsc
84b419e8a237dea9225203a50dc1707439442060 478264
exim4_4.92-8+deb10u5.debian.tar.xz
Checksums-Sha256:
d57de47e2c87798f95b1bde4b38c5ab2279bcccce6b9da778b1ae5392a41d6fd 2855
exim4_4.92-8+deb10u5.dsc
ee57e28b6321b3a0ffff205654ed54391a58811725e662cb1ab3e0f505cec225 478264
exim4_4.92-8+deb10u5.debian.tar.xz
Files:
0a61313356aa055cd3e4258b2aad60ce 2855 mail standard exim4_4.92-8+deb10u5.dsc
488cbffc8ca214135e367bdbee8e9296 478264 mail standard
exim4_4.92-8+deb10u5.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE0uCSA5741Jbt9PpepU8BhUOCFIQFAmBTRwIACgkQpU8BhUOC
FIS6OQ//XSrhgVgpWFjK4GHnf9O/B81kA+oa6u1vm8Rg01VmsWkBC1d028UjAN6l
oigslMGc/YZ604wAkx+keWbho77G1ugFAmzCKH7Tu880Z4OrC+nspH3KQVKI9LFf
fzINvG47TgM6SaijyOBFlMTm2mJLV+3m5A8bLJYPrG1RU3JKyM8LXgzZwcR7f3IJ
I/8NLbng373inttXddD+YNSroAwPTE0TNyZY6CrVqGNCZgdc0Li4nsesj6DLWf9S
ZmuonejJIPBtrsJUMEVfr2srrGqTONCMgR10/k+E3D4FyKREC8BnKQs5ndute8ZB
iv+j4BgxAhxetMtaepViNeC2ee4o/4cNSd2rs3y8WurgFFsVvvoGxgh+EamSuYAQ
BzLj4mLQELoMZ4AsR5Vx8PCG4a2wo21O8Fky8YVlbsULN8tw3JJwwN5OtZjMxHSm
i5lP6KLzuWK6YuAlNkJ77EKLCAqL3/0pZw9J4b5X0rn1+jeX74+KPx4Nu2OyKoDH
mj1dlkOvs1rbAN9bMjFh1ipZvD1EyPKQa+AxDwi0wU8fBc8+DXfmixG1QquE8sgO
/wMTEwRIzmG50PC6qFDeAWHNw8QsTNOeliEZeqtuQmCWOW9/HXe5DrD9EuPsqko6
kEALDn7uqmilVBjlGcX1fwDSqngKUXRgYXxzI0nnpa5xK15Ekik=
=WRAi
-----END PGP SIGNATURE-----
--- End Message ---