#3916: Mutt 1.8: TOFU host certificate not working
-----------------------+----------------------
  Reporter:  kratem32  |      Owner:  mutt-dev
      Type:  defect    |     Status:  new
  Priority:  major     |  Milestone:  1.8
 Component:  crypto    |    Version:
Resolution:            |   Keywords:  tofu
-----------------------+----------------------
Changes (by gahr2):

 * priority:  minor => major
 * type:  enhancement => defect


Comment:

 Replying to [comment:10 m-a]:
 > I don't see it as a bug either, but rather a missing special feature.  I
 acknowledge there is a point in providing **some** way for users to
 restrict what they want to trust, by cutting chains, but I wonder if we
 need to expose it through mutt's user interface.  Ultimately users claim
 to improve security by avoiding rogue or dodgy CAs, but I question that
 TOFU is any better.  If you see a certificate change, is that because (a)
 an eavesdropping has started, (b) an eavesdropping has ended, or (c)
 someone just reissued the host's certificate - which will be rather
 frequent if it's a Let's Encrypt certificate, or behind certain load
 balancing setups.  This looks like self-inflicted pain somewhat.  If we
 add something to the UI, it should be a "skip trusting this certificate".

 I totally agree with you. The new way of handling certificate chains is
 sound, it's the expected behaviour for most, and the improved security in
 the use case exposed by kratem32 is at least questionable. Though, having
 an option to select which subchain to accept would be nice.

--
Ticket URL: <https://dev.mutt.org/trac/ticket/3916#comment:12>
Mutt <http://www.mutt.org/>
The Mutt mail user agent

Reply via email to