Bug#514578: libgnutls26: similar gnutls26 problem with mutt+msmtp after recent update

Daniel Kahn Gillmor dkg at fifthhorseman.net
Tue Feb 10 23:04:44 UTC 2009


On 02/10/2009 05:25 PM, Chess Griffin wrote:
> Here is the output of gnutls-cli to mail.mxes.net on port 993, which is
> Tuffmail's SSL/TLS IMAP server:
> 
> 
> Resolving 'mail.mxes.net'...
> Connecting to '216.86.168.198:993'...
> - Certificate type: X.509
>  - Got a certificate list of 1 certificates.
> 
>  - Certificate[0] info:

This mailserver is using a certificate that is signed with MD5:

0 dkg at pip:/tmp$ cat tmp.pem
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
0 dkg at pip:/tmp$ certtool -i <tmp.pem | grep Signature\ Algo
	Signature Algorithm: RSA-MD5
0 dkg at pip:/tmp$

MD5 is has been deprecated according to the gnutls documentation for a
couple years, but was only recently properly deprecated in the code.

It is deprecated for security reasons:

  http://www.win.tue.nl/hashclash/rogue-ca/

RapidSSL has been willing to freely re-issue all of its older MD5
certificates using SHA1 from what i've seen.  I suggest that you contact
your system administrators and advise them that they are using a
certificate that requires trust in a known-weak digest algorithm to
verify.  Since it was issued by RapidSSL, you may wish to point them to
their FAQ on the subject:

https://knowledge.rapidssl.com/support/ssl-certificate-support/index?page=content&id=AD125

We hope to ship lenny with MD5 fully deprecated in GnuTLS so that
GnuTLS-reliant apps are not subject to forged intermediate certificate
authorities or other attacks based on a weak digest algorithm.

Thanks for reporting this,

	--dkg

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 890 bytes
Desc: OpenPGP digital signature
Url : http://lists.alioth.debian.org/pipermail/pkg-gnutls-maint/attachments/20090210/786e132d/attachment.pgp 


More information about the Pkg-gnutls-maint mailing list