Date: Wed, 27 Nov 2002 08:58:38 -0800 (PST)
   From: Mark Crispin <[EMAIL PROTECTED]>
[...]
   Server implementations which allow unencrypted plaintext logins are now
   non-compliant; and to make UW imapd be compliant I had to change it so that
   plaintext logins are not allowed in unencrypted sessions.

The document says nothing of the sort.

Specifically, here's the text:

           Note: a server implementation MUST implement a
           configuration in which it does NOT permit any plaintext
           password mechanisms, unless either the STARTTLS command
           has been negotiated or some other mechanism that
           protects the session from password snooping has been
           provided.  Server sites SHOULD NOT use any configuration
           which permits a plaintext password mechanism without
           such a protection mechanism against password snooping.
           Client and server implementations SHOULD implement
           additional [SASL] mechanisms which do not use plaintext
           passwords, such the GSSAPI mechanism described in [SASL]
           and/or the [DIGEST-MD5] mechanism.

Note that all it says is that you must implement "a configuration". It
also allows "some other mechanism that protects the session". It's up
to you whether or not a loopback adapter is sufficinet to protect the
session.

Larry


Reply via email to