On 9 March 2011 16:41, Tim<tim-security at sentinelchicken.org <https://lists.grok.org.uk/mailman/listinfo/full-disclosure>> wrote: It also turns out that I didn't test this issue enough. As I didn't test with both gnutls and openssl. I only tested with gnutls. Mutt actually works as I would expect with imaps, smtps and smtp -- with starttls connection when using openssl. mutt appears to be _broken_ when using gnutls for imaps, smtps and smtp -- with starttls. (on mutt 1.5.20).
Hi,I've tested this behaviour using both - gnutls and openssl - and it seems like the only difference is that there is an error printed using openssl: "Certificate host check failed: certificate owner does not match hostname imap.myhost.web".
In both cases a user can accept the certificate, but there is no warning about certificate's hostname mishmash using gnutls, which is a vulnerability.
I just wanted to sum up the issue, do I understand it correctly? Honza <javascript:void(0);>
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/