x
This website is using cookies. We use cookies to ensure that we give you the best experience on our website. More info. That's Fine
HPC:Factor Logo 
 
Latest Forum Activity

I dunk for bananas Page Icon Posted 2022-08-10 7:58 PM
#
Avatar image of I dunk for bananas
H/PC Elite

Posts:
702
Location:
Europe
Status:
Is it generally safe to send and check my emails with say, nPOPuk on a CE 5 device? I'm worried about my credentials being intercepted somehow or other security issues, does anyone know the reality of the situation?
 Top of the page
C:Amie Page Icon Posted 2022-08-10 8:06 PM
#
Avatar image of C:Amie
Administrator
H/PC Oracle

Posts:
17,985
Location:
United Kingdom
Status:
If you are using SSL/TLS and are receiving/sending mail, then yes, perfectly.

If you are not, then that is not a security issue or limitation of nPOPuk. That's just you sending your password in clear text. Yes, technically it is possible for the ISP or anyone monitoring traffic to the ISP to discover your password if you are not using SSL/TLS. How likely that is... probably not, but you can never say never.

The best example of where it can go wrong is probably if you use it over public/free wifi or on a connection where someone has omnipresent control to monitor traffic flows - say a work network or at a friends house where they have a router that has been compromised or the router has plain been hacked to log traffic.
 Top of the page
I dunk for bananas Page Icon Posted 2022-08-10 8:14 PM
#
Avatar image of I dunk for bananas
H/PC Elite

Posts:
702
Location:
Europe
Status:
I appreciate the reply. I was worried using such an old CE version for such a purpose could be unsafe. Especially since there's a large amount of expired certificates on the devices. Would that have any influence..?
 Top of the page
C:Amie Page Icon Posted 2022-08-11 10:41 AM
#
Avatar image of C:Amie
Administrator
H/PC Oracle

Posts:
17,985
Location:
United Kingdom
Status:
While I have not checked the source code, I suspect that nPOPuk organises its own roots - otherwise the app would never work on any device for anyone and we'd hear a lot more complaints.
 Top of the page
Jake Page Icon Posted 2022-08-11 5:30 PM
#
Avatar image of Jake
Moderator
H/PC Vanguard

Posts:
2,828
Location:
Choking on the stench of ambition in Washington DC
Status:
I know that the npopuk/google certificates no longer work in HPC2000. Form hpcfactor, I pm-ed the wondrous developer, but that was a couple of years ago and it's still in my Outbox.

Jake
 Top of the page
torch Page Icon Posted 2022-08-11 6:38 PM
#
Avatar image of torch
Subscribers
H/PC Guru

Posts:
5,731
Location:
United States 
Status:
I’m not sure if it’ll help but I’m willing to contribute a donation for their time but obviously if it’s a lot of work / other things going on, I totally respect that.
 Top of the page
C:Amie Page Icon Posted 2022-08-12 8:52 PM
#
Avatar image of C:Amie
Administrator
H/PC Oracle

Posts:
17,985
Location:
United Kingdom
Status:
I had a look at the source code. It isn't a root certificates issue.

Quite simply nPOPuk doesn't validate the certificates. The callback function auto approves any certificate as valid
 
// Dummy SSL Certificate checker - we're not interested if Server cert. is valid! 
int CALLBACK SSLValidateCertHook(DWORD dwType, LPVOID pvArg, DWORD dwChainLen, LPBLOB pCertChain, DWORD dwFlags)
{
return SSL_ERR_OKAY;
}
#endif


It uses openSSL 1.0.2m, which Google purports to support SHA2, so it isn't that.
Chances are that Google just requires OAuth and no longer allows basic auth. Most providers are heading that way. Google can issue application passwords though to bypass it.
 Top of the page
I dunk for bananas Page Icon Posted 2022-08-13 12:52 PM
#
Avatar image of I dunk for bananas
H/PC Elite

Posts:
702
Location:
Europe
Status:
Quote
C:Amie - 2022-08-12 8:52 PM

I had a look at the source code. It isn't a root certificates issue.

Quite simply nPOPuk doesn't validate the certificates. The callback function auto approves any certificate as valid
 
// Dummy SSL Certificate checker - we're not interested if Server cert. is valid! 
int CALLBACK SSLValidateCertHook(DWORD dwType, LPVOID pvArg, DWORD dwChainLen, LPBLOB pCertChain, DWORD dwFlags)
{
return SSL_ERR_OKAY;
}
#endif




Is that a security risk..?
 Top of the page
C:Amie Page Icon Posted 2022-08-13 2:35 PM
#
Avatar image of C:Amie
Administrator
H/PC Oracle

Posts:
17,985
Location:
United Kingdom
Status:
Yes. It allows anyone to present any public key certificate - self signed or otherwise. That would allow for the impersonation of the server (I can create a certificate for mail.google.com and it'll accept it) and it prohibits the possibility for revocation of compromised private keys.

Presumably it does honour certificate expiration; although I did not check.
 Top of the page
stingraze Page Icon Posted 2022-08-14 2:06 AM
#
Avatar image of stingraze
Subscribers
H/PC Vanguard

Posts:
3,679
Location:
Japan
Status:
Quote
C:Amie - 2022-08-13 5:52 AM
It uses openSSL 1.0.2m, which Google purports to support SHA2, so it isn't that.

There is a CVE for OpenSSL 1.02 to 1.02y. (CVE-2021-3712)

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712

Not sure if this will affect nPOPuk, but might be worth checking out.

Edited by stingraze 2022-08-14 2:13 AM
 Top of the page
C:Amie Page Icon Posted 2022-08-14 8:08 AM
#
Avatar image of C:Amie
Administrator
H/PC Oracle

Posts:
17,985
Location:
United Kingdom
Status:
Yup, as it is running 1.0.2m, it is impacted. Would need a recompile and a version bump.
 Top of the page
Jump to forum:
Seconds to generate: 0.156 - Cached queries : 68 - Executed queries : 9