-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC6331: Moving CRAM-MD5, DIGEST-MD5 and LOGIN to Historic #58
Comments
Is this a request to deprecate (or remove) CRAM-MD5 support? |
I think we´ve done this with PR #76. |
After a little bit of research and a few mails with @Neustradamus, we both agree that the authentication methods CRAM-MD5, DIGEST-MD5, LOGIN and PLAIN are not secure enough to use it in the future. In PR #76, i´ve done a few changes to inform the users about the security issue using this authentication methods. The question is, what are the next useful steps? The suggestion of @Neustradamus was, to remove CRAM-MD5, DIGEST-MD5 and LOGIN. Only PLAIN should stay in the Class, because there are Mailservers out there wich only supports PLAIN as authentication method. I am not sure about that, because i don´t want to make this library useless for some users wich Mailservers do not support more secure authentication methods. My idea was, to make this authentications methods only useable if a TLS connection is established. Because the credentials were transfered through a more secure connection layer. Than the authentication method should not be a security issue. Or am I wrong in my assumption? @till @jparise what do you think about that? do you know any security or encryption experts who can give a suggestion about that? |
Because this is a client (not server) library, I think it's useful to continue offering support for these methods but also help end users make informed decisions about their security. |
@jparise i agree. What do you think about my suggestion to make them only available with TLS? Do you think this would remove the security gap, using this unsecure methods? I am not a deep security expert. Do you know an security encryption experts? |
I think I'd apply the same reasoning: leave them available but caution users not to use them in insecure ways. I would support removing them entirely in a new major version. |
The 1.11.0 release has done an important progress, DIGEST-MD5 is DEPRECATED: And several SCRAM supports have been added (not -PLUS variants at this time): |
20 November 2008: CRAM-MD5 to Historic:
29 June 2017: CRAM-MD5 to Historic:
July 2011: RFC6331: Moving DIGEST-MD5 to Historic:
I add same about SCRAM-MD5.
There are now:
Soon:
The text was updated successfully, but these errors were encountered: