At 9:32 PM -0400 9/14/05, Stefan Jeglinski imposed structure on a stream of electrons, yielding:
I just assumed that all e-mail clients could do this since Eudora could, and SIMS can. I since found that a) the protocol was basically invented at Qualcomm, and that b) few (none?) other pop clients support it.

And c) it is so grossly insecure that support for it should be disabled in anything capable of it.

Please expand. I saw reference to a DOS attack that was patched, but otherwise, why claim that it is so grossly insecure when normal e-mail is so grossly insecure anyway?

Note that passwords in the clear for email have become fairly uncommon. Even SIMS supports CRAM-MD5 authentication for SMTP and APOP for POP3.

Is there something *beyond* sending passwords in clear text that makes poppassd so insecure?

1. It uses a TCP port which, while assigned to a totally different protocol, is in fact only used on the open Internet for this protocol. This makes sniffing the protocol very highly efficient.

2. It provides a sniffer instant knowledge of how to use a sniffed password to take over an account completely, i.e. how to change the password himself.



--
Bill Cole [EMAIL PROTECTED]


#############################################################
This message is sent to you because you are subscribed to
 the mailing list <[email protected]>.
To unsubscribe, E-mail to: <[EMAIL PROTECTED]>
To switch to the DIGEST mode, E-mail to <[EMAIL PROTECTED]>
To switch to the INDEX mode, E-mail to <[EMAIL PROTECTED]>
Send administrative queries to  <[EMAIL PROTECTED]>

Reply via email to