Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Reindl Harald
Am 10.04.2014 02:28, schrieb Tim Groeneveld:
> - Original Message -
>>
>> the same for the class of not that critical passwords, generated
>> with random algorithms and because that stored in password safes
>> which *may* be compromised but better than "shitpwd-year-moth-123"
>>
>> so stop this polemic, there is no asbolute right solution in case
>> of credentials and before a user chosses "fuckingadmin123" i prefer
>> passwords like "!Y*c*k*m*b*S!*"
>>
> 
> I think now is a good time to point you to http://xkcd.com/936/
> 
> I would prefer "SuitableChooseNewspaper57" over "!Y*c*k*m*b*S!*"
> because I know that the first is definitely less likely to be
> stored on the back of a keyboard, or in a Word document
> named "Passwords.doc".
> 
> Plus, Suitable Choose Newspaper 57? Easy to say over the phone
> if someone ever needs my password

you missed that bit:

>>> 09.04.2014 19:54, schrieb Reindl Harald:
 i have faced users in real life with where punsihed by
 change their passwords each month

maybe *now* that you can't use "SuitableChooseNewspaper57"
as well as "SuitableChooseNewspaper58" the next month where
such policies are applied or anything else you remember you
understand what i mean and the next time read the whole thread
before you reply to pieces out of context



signature.asc
Description: OpenPGP digital signature


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Robert Schetterer
Am 09.04.2014 22:38, schrieb Reindl Harald:
> it is not a matter of "jedi power", it's a matter of how likely
> it is that your password maybe get stolen and how many really
> secure passwords a human kan keep in his mind compared with
> change them again and again forcing to store the password on
> a place where it is more likely to get compromised

agreed
you never will fix the problem sitting behind the keyboard with code


Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Tim Groeneveld


- Original Message -
> 
> the same for the class of not that critical passwords, generated
> with random algorithms and because that stored in password safes
> which *may* be compromised but better than "shitpwd-year-moth-123"
> 
> so stop this polemic, there is no asbolute right solution in case
> of credentials and before a user chosses "fuckingadmin123" i prefer
> passwords like "!Y*c*k*m*b*S!*"
> 

I think now is a good time to point you to http://xkcd.com/936/

I would prefer "SuitableChooseNewspaper57" over "!Y*c*k*m*b*S!*"
because I know that the first is definitely less likely to be
stored on the back of a keyboard, or in a Word document
named "Passwords.doc".

Plus, Suitable Choose Newspaper 57? Easy to say over the phone
if someone ever needs my password.


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Reindl Harald


Am 09.04.2014 22:06, schrieb Robert Schetterer:
> Am 09.04.2014 19:54, schrieb Reindl Harald:
>> i have faced users in real life with where punsihed by
>> change their passwords each month and the result was
>> that not a single of them was secure or not stored
>> somewhere while the same person would have choosed
>> something like below otherwise
> 
> yes its common and old security practice to force password changes at
> some terms in many software products, looks like many coders agreed that
> this is a good idea, but for sure they had not your universal jedi power

that's polemic

it is not a matter of "jedi power", it's a matter of how likely
it is that your password maybe get stolen and how many really
secure passwords a human kan keep in his mind compared with
change them again and again forcing to store the password on
a place where it is more likely to get compromised

if the password i am using for critical infrastructure leaves
my hands it would be a nightmare - a braindump is unliekly, get
whatever store containing it compromised is more likely

the same for the class of not that critical passwords, generated
with random algorithms and because that stored in password safes
which *may* be compromised but better than "shitpwd-year-moth-123"

so stop this polemic, there is no asbolute right solution in case
of credentials and before a user chosses "fuckingadmin123" i prefer
passwords like "!Y*c*k*m*b*S!*"



signature.asc
Description: OpenPGP digital signature


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Robert Schetterer
Am 09.04.2014 20:13, schrieb Charles Marcus:
> On 4/9/2014 1:03 PM, Robert Schetterer  wrote:
>> Am 09.04.2014 18:42, schrieb Charles Marcus:
>>> >What are the ramifications of changing this on a production server? Any
>>> >possible problems/gotchas? user impact?
>> in my understanding change ssl key and crts , do all needed ssl updates
>> keep performance mode, if unsure change all passwords too
> 
> ???
> 
> I was asking about the ramifications of switching from high performance
> mode to high security mode.
> 
> Not the ramifications of the security compromise.
> 

i switched to performance mode when pop3 logins rised up to more then
1000 per minute, i did not see any significant rise or low of ram
switching between modes, but i have no data for massive imap logins,
dovecot in general is not very memory hungry, for exact compare data you
might wait for Timo to answer, or do some measure by yourself


Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Robert Schetterer
Am 09.04.2014 19:54, schrieb Reindl Harald:

> 
> i have faced users in real life with where punsihed by
> change their passwords each month and the result was
> that not a single of them was secure or not stored
> somewhere while the same person would have choosed
> something like below otherwise

yes its common and old security practice to force password changes at
some terms in many software products, looks like many coders agreed that
this is a good idea, but for sure they had not your universal jedi power







Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Charles Marcus

On 4/9/2014 1:03 PM, Robert Schetterer  wrote:

Am 09.04.2014 18:42, schrieb Charles Marcus:

>What are the ramifications of changing this on a production server? Any
>possible problems/gotchas? user impact?

in my understanding change ssl key and crts , do all needed ssl updates
keep performance mode, if unsure change all passwords too


???

I was asking about the ramifications of switching from high performance 
mode to high security mode.


Not the ramifications of the security compromise.

--

Best regards,

Charles


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Jake Alley
It's an interesting issue.  In my experience "stale" passwords are rarely used 
to compromise systems.  However, passwords tend to end up on sticky notes and 
even worse, in email databases regardless.  As far as compromised email 
passwords, they seem to mostly come from infected clients and insecure public 
logins as far as I can tell.  A server can control the later, but not the 
former.

I know of a major accounting software that forces Admin users to change their 
passwords every few months under certain circumstances.  Those passwords always 
end up in emails to fellow users, so in that case forcing people to change 
seems to be definitely counterproductive.

IMV the moral of the story is that you can't crypt your way into a 100% secure 
world.  You need other forms of checks & reconciliations that are disjoint from 
purely cryptographic infrastructure.  For instance ask Mt. Gox and Bitcoin if 
they agree in hindsight, and Heartbleed is a very good example of this concept.

Thanks,

Jake


On 4/9/2014 10:27 AM, Reindl Harald wrote:

"change passwords from time to time is always clever" is a strawmans
argument with no context to the issue, forcing people to change their
passwords all the time for no good reasons leads mostly to completly
insecured passwords to remember them easier or have them on a sticky
on the screen or under the keyboard the word "counterproductive" describes that 
policies perfectly


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Reindl Harald


Am 09.04.2014 19:31, schrieb Robert Schetterer:
> Am 09.04.2014 19:27, schrieb Reindl Harald:
>> the word "counterproductive" describes that policies perfectly
> 
> this is simply nonsense, go have a beer

don't strip quotes

i have faced users in real life with where punsihed by
change their passwords each month and the result was
that not a single of them was secure or not stored
somewhere while the same person would have choosed
something like below otherwise

!mH*IM*c!

derived from "my home is my castle"
the first and last char lowercase, the others uppercase
! at the begin and end
* after each char between

easy to remember, not in rainbow tables
*that* is real security because you don't need to note it
while it is built with chars nobody else can guess and
the user easily rememeber

anything else is nonsense cooked only with a technical point of view



signature.asc
Description: OpenPGP digital signature


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Robert Schetterer
Am 09.04.2014 19:27, schrieb Reindl Harald:
> the word "counterproductive" describes that policies perfectly

this is simply nonsense, go have a beer


Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Reindl Harald
Am 09.04.2014 19:18, schrieb Robert Schetterer:
> Am 09.04.2014 19:10, schrieb Reindl Harald:
>>
>> Am 09.04.2014 19:03, schrieb Robert Schetterer:
>>> Am 09.04.2014 18:42, schrieb Charles Marcus:
 What are the ramifications of changing this on a production server? Any
 possible problems/gotchas? user impact?
>>>
>>> in my understanding change ssl key and crts , do all needed ssl updates
>>> keep performance mode, if unsure change all passwords too
>>
>> passwords too, in security mode only keys would have been
>> affected and since this is a attack which no single
>> indication that it ever happened on a machine there
>> is no likely or unlikely
> 
> there should no issue if you havent used vulnerable openssl version
> i.e ubuntu lucid has 0.9.x which is not reported vulnerable
> anyway ,change passwords from time to time is always clever

if you you don't have used a vulnerable openssl you are not affected
at all - if you used than private keys and certs are not your only
problem, there are enough articles in the meantime explaining why

"change passwords from time to time is always clever" is a strawmans
argument with no context to the issue, forcing people to change their
passwords all the time for no good reasons leads mostly to completly
insecured passwords to remember them easier or have them on a sticky
on the screen or under the keyboard

the word "counterproductive" describes that policies perfectly



signature.asc
Description: OpenPGP digital signature


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Robert Schetterer
Am 09.04.2014 19:10, schrieb Reindl Harald:
> 
> Am 09.04.2014 19:03, schrieb Robert Schetterer:
>> Am 09.04.2014 18:42, schrieb Charles Marcus:
>>> What are the ramifications of changing this on a production server? Any
>>> possible problems/gotchas? user impact?
>>
>> in my understanding change ssl key and crts , do all needed ssl updates
>> keep performance mode, if unsure change all passwords too
> 
> passwords too, in security mode only keys would have been
> affected and since this is a attack which no single
> indication that it ever happened on a machine there
> is no likely or unlikely

there should no issue if you havent used vulnerable openssl version
i.e ubuntu lucid has 0.9.x which is not reported vulnerable
anyway ,change passwords from time to time is always clever

> 
> 
> 



Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Reindl Harald

Am 09.04.2014 19:03, schrieb Robert Schetterer:
> Am 09.04.2014 18:42, schrieb Charles Marcus:
>> What are the ramifications of changing this on a production server? Any
>> possible problems/gotchas? user impact?
> 
> in my understanding change ssl key and crts , do all needed ssl updates
> keep performance mode, if unsure change all passwords too

passwords too, in security mode only keys would have been
affected and since this is a attack which no single
indication that it ever happened on a machine there
is no likely or unlikely





signature.asc
Description: OpenPGP digital signature


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Robert Schetterer
Am 09.04.2014 18:42, schrieb Charles Marcus:
> What are the ramifications of changing this on a production server? Any
> possible problems/gotchas? user impact?

in my understanding change ssl key and crts , do all needed ssl updates
keep performance mode, if unsure change all passwords too

Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Charles Marcus

On 4/9/2014 5:45 AM, Timo Sirainen  wrote:

By default Dovecot's login processes run in the "high security mode" where each IMAP/POP3 
connection runs in its own process. This was done especially to avoid security bugs in OpenSSL from 
leaking users' passwords. So unless you have switched to the "high performance mode", 
users' passwords or other sensitive data couldn't have been 
leaked.http://wiki2.dovecot.org/LoginProcess


Hi Timo,

Hmmm... ours is set to high performance mode, but, I didn't set it up, 
you did...


Now I'm wondering why you did this... ?

What are the ramifications of changing this on a production server? Any 
possible problems/gotchas? user impact?


Thanks,

--

Best regards,

Charles


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-09 Thread Timo Sirainen
On 8.4.2014, at 20.00, John Rowe  wrote:

> Do we know if dovecot is vulnerable to the heartbleed SSL problem?

It may be possible that the attacker was able to get the SSL private key(s), 
although this depends on the OS and its memory allocation patterns. If you use 
only a single SSL cert I think it might be possible that it doesn't leak with 
Dovecot, but it's definitely not a good idea to trust that. I haven't anyway 
looked closely enough into this to verify, I'm just guessing based on the 
information in 
http://blog.existentialize.com/diagnosis-of-the-openssl-heartbleed-bug.html

By default Dovecot's login processes run in the "high security mode" where each 
IMAP/POP3 connection runs in its own process. This was done especially to avoid 
security bugs in OpenSSL from leaking users' passwords. So unless you have 
switched to the "high performance mode", users' passwords or other sensitive 
data couldn't have been leaked. http://wiki2.dovecot.org/LoginProcess

Would be nice if it was possible to hide the SSL private keys to separate 
processes as well, but that would probably require changes to OpenSSL itself.

(BTW. I've been too busy recently to even have time to read any mails in 
Dovecot list. I'll try to go through at least most of it before making the next 
Dovecot release. And hopefully by summer I've more time again.)


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-08 Thread Jakob Curdes


Be aware that your private key might already have leaked without any 
notice. So your best bet is to withdraw your certificates and renew 
all keys/certificates on the affected machines.
Yes, I suppose by now everybody has read the general hints on 
heartbleed.com ; it might even be that previous traffic can be 
decrypted. You need to change private keys, certificates, etc, all that 
is used by openssl to identify the communication partner.


JC


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-08 Thread Reindl Harald


Am 08.04.2014 21:38, schrieb lst_ho...@kwsoft.de:
> Zitat von Jakob Curdes :
> 
>> Am 08.04.2014 19:00, schrieb John Rowe:
>>> Do we know if dovecot is vulnerable to the heartbleed SSL problem?
>>>
>>> I'm running dovecot-2.0.9 and openssl-1.01, the latter being
>>> intrinsically vulnerable. An on-line tool says that my machine is not
>>> affected on port 993 but it would be nice to know for sure if we were
>>> vulnerable for a while. (Naturally I've blocked it anyway!).
>>>
>> Usually all programs are linked dynamically to the library, so the 
>> vulnerability depends on the library only. If
>> you updated the library today and restarted the service (!!) then it is very 
>> likely that your mail installation
>> is not vulnerable any more. Otherwise it is very likely to be vulnerable, 
>> regardless what tests say.
>> JC
> 
> Be aware that your private key might already have leaked without any notice. 
> So your best bet is to withdraw your
> certificates and renew all keys/certificates on the affected machines.

correct, that was my whole-day job from 10:00 AM to 16:00 PM for 10 certificates
followed by openvpn-keys, better safe than sorry
luckily some wildcard certs in the meantime instead a ton single ones



signature.asc
Description: OpenPGP digital signature


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-08 Thread lst_hoe02


Zitat von Jakob Curdes :


Am 08.04.2014 19:00, schrieb John Rowe:

Do we know if dovecot is vulnerable to the heartbleed SSL problem?

I'm running dovecot-2.0.9 and openssl-1.01, the latter being
intrinsically vulnerable. An on-line tool says that my machine is not
affected on port 993 but it would be nice to know for sure if we were
vulnerable for a while. (Naturally I've blocked it anyway!).

Usually all programs are linked dynamically to the library, so the  
vulnerability depends on the library only. If you updated the  
library today and restarted the service (!!) then it is very likely  
that your mail installation is not vulnerable any more. Otherwise it  
is very likely to be vulnerable, regardless what tests say.

JC


Be aware that your private key might already have leaked without any  
notice. So your best bet is to withdraw your certificates and renew  
all keys/certificates on the affected machines.


Regards

Andreas




smime.p7s
Description: S/MIME Cryptographic Signature


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-08 Thread Jakob Curdes


Am 08.04.2014 19:00, schrieb John Rowe:

Do we know if dovecot is vulnerable to the heartbleed SSL problem?

I'm running dovecot-2.0.9 and openssl-1.01, the latter being
intrinsically vulnerable. An on-line tool says that my machine is not
affected on port 993 but it would be nice to know for sure if we were
vulnerable for a while. (Naturally I've blocked it anyway!).

Usually all programs are linked dynamically to the library, so the 
vulnerability depends on the library only. If you updated the library 
today and restarted the service (!!) then it is very likely that your 
mail installation is not vulnerable any more. Otherwise it is very 
likely to be vulnerable, regardless what tests say.

JC


Re: [Dovecot] Heartbleed openssl vulnerability?

2014-04-08 Thread Patrick Ben Koetter
* John Rowe :
> Do we know if dovecot is vulnerable to the heartbleed SSL problem?

ANY application using the affected OpenSSL versions is vulnerable. That
includes dovecot.

> I'm running dovecot-2.0.9 and openssl-1.01, the latter being
> intrinsically vulnerable. An on-line tool says that my machine is not
> affected on port 993 but it would be nice to know for sure if we were
> vulnerable for a while. (Naturally I've blocked it anyway!).
> 
> Thanks
> 
> John

-- 
[*] sys4 AG
 
https://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München
 
Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein