Thunderbird has a MITM vulnerability with its otherwise rather groovy auto-configuration feature. The problem is that it makes requests via HTTP to retrieve the auto configuration information. This allows a black hat (e.g. the NSA) to modify the results sent to the client, and the client has no way to verify the results have not been tampered with. This could even allow the black hat to act as a proxy for quite some time and the client may never know. This vulnerability is not something that can just be patched without breaking most auto-configuration. I have what I think is a solution to the problem, but I think it needs further review - and it needs someone who actually has the right contacts in the software and hosting worlds to get it implemented. That's not me, I don't really like most people and the feeling tends to be mutual. Anti-social issues aside, I do think this needs to be fixed. https://librelamp.com/FooBird#security has what I think would be the easiest solution while keeping the ability to auto-configure stuff.
On Sat, 2015-08-22 at 08:05 -0700, Alice Wonder wrote:> Thunderbird has a MITM vulnerability with its otherwise rather groovy > auto-configuration feature.> https://librelamp.com/FooBird#security > > has what I think would be the easiest solution while keeping the > ability to auto-configure stuff.As for LibreSSL et al, perhaps you could mention all your concerns on Fedora ? Its the place where, it often seems, everything in Centos originates from. You will benefit from your own mailing list/web forum. Your attitude and concerns are not unique. -- Best regards, Paul. England, EU. England's place is in the European Union.
On 08/23/2015 07:25 AM, Always Learning wrote:> > On Sat, 2015-08-22 at 08:05 -0700, Alice Wonder wrote: > >> Thunderbird has a MITM vulnerability with its otherwise rather groovy >> auto-configuration feature. > >> https://librelamp.com/FooBird#security >> >> has what I think would be the easiest solution while keeping the >> ability to auto-configure stuff. > > As for LibreSSL et al, perhaps you could mention all your concerns on > Fedora ? Its the place where, it often seems, everything in Centos > originates from. > > You will benefit from your own mailing list/web forum. Your attitude and > concerns are not unique. > >I stopped using Fedora because as soon as it was stable it was end of life and I was forced to install a new bleeding edge unstable version. I do not like bleeding edge for most things, I use mate in CentOS because GNOME 3 is not to my liking, for example, and makes me feel like I am fighting the desktop instead of using the desktop. I do not know if LibreSSL will ever be part of Fedora or CentOS because FIPS support is not one of the goals of the projects, but FIPS didn't protect anyone from the several OpenSSL vulnerabilities that led to LibreSSL so FIPS is not a concern of mine, but it is a requirement for some places so I suspect it will be difficult for it to enter the Red Hat ecosystem. RHEL packages need to build against OpenSSL to have FIPS and so Fedora packages will continue to build against OpenSSL. Politics sucks.
Leonard den Ottolander
2015-Aug-24 11:07 UTC
[CentOS] [security] Thunderbird vulnerable to MITM
Hello, On Sat, 2015-08-22 at 08:05 -0700, Alice Wonder wrote:> Thunderbird has a MITM vulnerability with its otherwise rather groovy > auto-configuration feature. > > The problem is that it makes requests via HTTP to retrieve the auto > configuration information. > > This allows a black hat (e.g. the NSA) to modify the results sent to the > client, and the client has no way to verify the results have not been > tampered with.Thank you for pointing out this vulnerability. However, https://lists.mozilla.org/listinfo/dev-apps-thunderbird seems like a more appropriate place to discuss your concerns. I doubt Red Hat will address this issue without upstream involvement and I'm sure CentOS will not. Regards, Leonard. -- mount -t life -o ro /dev/dna /genetic/research
On 08/24/2015 04:07 AM, Leonard den Ottolander wrote:> Hello, > > On Sat, 2015-08-22 at 08:05 -0700, Alice Wonder wrote: >> Thunderbird has a MITM vulnerability with its otherwise rather groovy >> auto-configuration feature. >> >> The problem is that it makes requests via HTTP to retrieve the auto >> configuration information. >> >> This allows a black hat (e.g. the NSA) to modify the results sent to the >> client, and the client has no way to verify the results have not been >> tampered with. > > Thank you for pointing out this vulnerability. However, > https://lists.mozilla.org/listinfo/dev-apps-thunderbird seems like a > more appropriate place to discuss your concerns. I doubt Red Hat will > address this issue without upstream involvement and I'm sure CentOS will > not. > > Regards, > Leonard. >Done, thank you. And I found the following two bugzilla IDs : https://bugzilla.mozilla.org/show_bug.cgi?id=664633 (2011) https://bugzilla.mozilla.org/show_bug.cgi?id=971347 (2014)