<<< Date Index >>>     <<< Thread Index >>>

Re[2]: APOP vulnerability



Dear Gaëtan LEURENT,

--Tuesday, April 3, 2007, 8:18:04 PM, you wrote to 3APA3A@xxxxxxxxxxxxxxxx:


GL> I meant practical in the sense that it does work in practice (it's not
GL> an attack needing 2^80 computations or something like that), but I don't
GL> know what are the practical implications of the attack :-)
GL> (to begin with, I don't know if many people are using APOP).

A  number  of  POP3  servers support APOP, but most of them require some
special configuration. And it seems like Mozilla attempts to use APOP if
APOP  banner  is  present  in  server  reply  and  no secure protocol is
configured.  So  yes,  it's  used,  but  mostly  as  an  alternative  to
cleartext.  Based  on  last  115000  sessions  statistics for ISP's mail
server with CRAM-MD5, APOP and NTLM support, ~7000 mailboxes:

  Cleartext: 96,3%
  APOP:      2,1%
  CRAM-MD5:  1%
  NTLM:      0.6%



-- 
~/ZARAZA http://securityvulns.com/