rfc2595.TLS_with_IMAP-POP3_and_ACAP.txt 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843
  1. Network Working Group C. Newman
  2. Request for Comments: 2595 Innosoft
  3. Category: Standards Track June 1999
  4. Using TLS with IMAP, POP3 and ACAP
  5. Status of this Memo
  6. This document specifies an Internet standards track protocol for the
  7. Internet community, and requests discussion and suggestions for
  8. improvements. Please refer to the current edition of the "Internet
  9. Official Protocol Standards" (STD 1) for the standardization state
  10. and status of this protocol. Distribution of this memo is unlimited.
  11. Copyright Notice
  12. Copyright (C) The Internet Society (1999). All Rights Reserved.
  13. 1. Motivation
  14. The TLS protocol (formerly known as SSL) provides a way to secure an
  15. application protocol from tampering and eavesdropping. The option of
  16. using such security is desirable for IMAP, POP and ACAP due to common
  17. connection eavesdropping and hijacking attacks [AUTH]. Although
  18. advanced SASL authentication mechanisms can provide a lightweight
  19. version of this service, TLS is complimentary to simple
  20. authentication-only SASL mechanisms or deployed clear-text password
  21. login commands.
  22. Many sites have a high investment in authentication infrastructure
  23. (e.g., a large database of a one-way-function applied to user
  24. passwords), so a privacy layer which is not tightly bound to user
  25. authentication can protect against network eavesdropping attacks
  26. without requiring a new authentication infrastructure and/or forcing
  27. all users to change their password. Recognizing that such sites will
  28. desire simple password authentication in combination with TLS
  29. encryption, this specification defines the PLAIN SASL mechanism for
  30. use with protocols which lack a simple password authentication
  31. command such as ACAP and SMTP. (Note there is a separate RFC for the
  32. STARTTLS command in SMTP [SMTPTLS].)
  33. There is a strong desire in the IETF to eliminate the transmission of
  34. clear-text passwords over unencrypted channels. While SASL can be
  35. used for this purpose, TLS provides an additional tool with different
  36. deployability characteristics. A server supporting both TLS with
  37. Newman Standards Track [Page 1]
  38. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  39. simple passwords and a challenge/response SASL mechanism is likely to
  40. interoperate with a wide variety of clients without resorting to
  41. unencrypted clear-text passwords.
  42. The STARTTLS command rectifies a number of the problems with using a
  43. separate port for a "secure" protocol variant. Some of these are
  44. mentioned in section 7.
  45. 1.1. Conventions Used in this Document
  46. The key words "REQUIRED", "MUST", "MUST NOT", "SHOULD", "SHOULD NOT",
  47. "MAY", and "OPTIONAL" in this document are to be interpreted as
  48. described in "Key words for use in RFCs to Indicate Requirement
  49. Levels" [KEYWORDS].
  50. Terms related to authentication are defined in "On Internet
  51. Authentication" [AUTH].
  52. Formal syntax is defined using ABNF [ABNF].
  53. In examples, "C:" and "S:" indicate lines sent by the client and
  54. server respectively.
  55. 2. Basic Interoperability and Security Requirements
  56. The following requirements apply to all implementations of the
  57. STARTTLS extension for IMAP, POP3 and ACAP.
  58. 2.1. Cipher Suite Requirements
  59. Implementation of the TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA [TLS] cipher
  60. suite is REQUIRED. This is important as it assures that any two
  61. compliant implementations can be configured to interoperate.
  62. All other cipher suites are OPTIONAL.
  63. 2.2. Privacy Operational Mode Security Requirements
  64. Both clients and servers SHOULD have a privacy operational mode which
  65. refuses authentication unless successful activation of an encryption
  66. layer (such as that provided by TLS) occurs prior to or at the time
  67. of authentication and which will terminate the connection if that
  68. encryption layer is deactivated. Implementations are encouraged to
  69. have flexability with respect to the minimal encryption strength or
  70. cipher suites permitted. A minimalist approach to this
  71. recommendation would be an operational mode where the
  72. TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA cipher suite is mandatory prior to
  73. permitting authentication.
  74. Newman Standards Track [Page 2]
  75. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  76. Clients MAY have an operational mode which uses encryption only when
  77. it is advertised by the server, but authentication continues
  78. regardless. For backwards compatibility, servers SHOULD have an
  79. operational mode where only the authentication mechanisms required by
  80. the relevant base protocol specification are needed to successfully
  81. authenticate.
  82. 2.3. Clear-Text Password Requirements
  83. Clients and servers which implement STARTTLS MUST be configurable to
  84. refuse all clear-text login commands or mechanisms (including both
  85. standards-track and nonstandard mechanisms) unless an encryption
  86. layer of adequate strength is active. Servers which allow
  87. unencrypted clear-text logins SHOULD be configurable to refuse
  88. clear-text logins both for the entire server, and on a per-user
  89. basis.
  90. 2.4. Server Identity Check
  91. During the TLS negotiation, the client MUST check its understanding
  92. of the server hostname against the server's identity as presented in
  93. the server Certificate message, in order to prevent man-in-the-middle
  94. attacks. Matching is performed according to these rules:
  95. - The client MUST use the server hostname it used to open the
  96. connection as the value to compare against the server name as
  97. expressed in the server certificate. The client MUST NOT use any
  98. form of the server hostname derived from an insecure remote source
  99. (e.g., insecure DNS lookup). CNAME canonicalization is not done.
  100. - If a subjectAltName extension of type dNSName is present in the
  101. certificate, it SHOULD be used as the source of the server's
  102. identity.
  103. - Matching is case-insensitive.
  104. - A "*" wildcard character MAY be used as the left-most name
  105. component in the certificate. For example, *.example.com would
  106. match a.example.com, foo.example.com, etc. but would not match
  107. example.com.
  108. - If the certificate contains multiple names (e.g. more than one
  109. dNSName field), then a match with any one of the fields is
  110. considered acceptable.
  111. If the match fails, the client SHOULD either ask for explicit user
  112. confirmation, or terminate the connection and indicate the server's
  113. identity is suspect.
  114. Newman Standards Track [Page 3]
  115. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  116. 2.5. TLS Security Policy Check
  117. Both the client and server MUST check the result of the STARTTLS
  118. command and subsequent TLS negotiation to see whether acceptable
  119. authentication or privacy was achieved. Ignoring this step
  120. completely invalidates using TLS for security. The decision about
  121. whether acceptable authentication or privacy was achieved is made
  122. locally, is implementation-dependent, and is beyond the scope of this
  123. document.
  124. 3. IMAP STARTTLS extension
  125. When the TLS extension is present in IMAP, "STARTTLS" is listed as a
  126. capability in response to the CAPABILITY command. This extension
  127. adds a single command, "STARTTLS" to the IMAP protocol which is used
  128. to begin a TLS negotiation.
  129. 3.1. STARTTLS Command
  130. Arguments: none
  131. Responses: no specific responses for this command
  132. Result: OK - begin TLS negotiation
  133. BAD - command unknown or arguments invalid
  134. A TLS negotiation begins immediately after the CRLF at the end of
  135. the tagged OK response from the server. Once a client issues a
  136. STARTTLS command, it MUST NOT issue further commands until a
  137. server response is seen and the TLS negotiation is complete.
  138. The STARTTLS command is only valid in non-authenticated state.
  139. The server remains in non-authenticated state, even if client
  140. credentials are supplied during the TLS negotiation. The SASL
  141. [SASL] EXTERNAL mechanism MAY be used to authenticate once TLS
  142. client credentials are successfully exchanged, but servers
  143. supporting the STARTTLS command are not required to support the
  144. EXTERNAL mechanism.
  145. Once TLS has been started, the client MUST discard cached
  146. information about server capabilities and SHOULD re-issue the
  147. CAPABILITY command. This is necessary to protect against
  148. man-in-the-middle attacks which alter the capabilities list prior
  149. to STARTTLS. The server MAY advertise different capabilities
  150. after STARTTLS.
  151. The formal syntax for IMAP is amended as follows:
  152. Newman Standards Track [Page 4]
  153. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  154. command_any =/ "STARTTLS"
  155. Example: C: a001 CAPABILITY
  156. S: * CAPABILITY IMAP4rev1 STARTTLS LOGINDISABLED
  157. S: a001 OK CAPABILITY completed
  158. C: a002 STARTTLS
  159. S: a002 OK Begin TLS negotiation now
  160. <TLS negotiation, further commands are under TLS layer>
  161. C: a003 CAPABILITY
  162. S: * CAPABILITY IMAP4rev1 AUTH=EXTERNAL
  163. S: a003 OK CAPABILITY completed
  164. C: a004 LOGIN joe password
  165. S: a004 OK LOGIN completed
  166. 3.2. IMAP LOGINDISABLED capability
  167. The current IMAP protocol specification (RFC 2060) requires the
  168. implementation of the LOGIN command which uses clear-text passwords.
  169. Many sites may choose to disable this command unless encryption is
  170. active for security reasons. An IMAP server MAY advertise that the
  171. LOGIN command is disabled by including the LOGINDISABLED capability
  172. in the capability response. Such a server will respond with a tagged
  173. "NO" response to any attempt to use the LOGIN command.
  174. An IMAP server which implements STARTTLS MUST implement support for
  175. the LOGINDISABLED capability on unencrypted connections.
  176. An IMAP client which complies with this specification MUST NOT issue
  177. the LOGIN command if this capability is present.
  178. This capability is useful to prevent clients compliant with this
  179. specification from sending an unencrypted password in an environment
  180. subject to passive attacks. It has no impact on an environment
  181. subject to active attacks as a man-in-the-middle attacker can remove
  182. this capability. Therefore this does not relieve clients of the need
  183. to follow the privacy mode recommendation in section 2.2.
  184. Servers advertising this capability will fail to interoperate with
  185. many existing compliant IMAP clients and will be unable to prevent
  186. those clients from disclosing the user's password.
  187. 4. POP3 STARTTLS extension
  188. The POP3 STARTTLS extension adds the STLS command to POP3 servers.
  189. If this is implemented, the POP3 extension mechanism [POP3EXT] MUST
  190. also be implemented to avoid the need for client probing of multiple
  191. commands. The capability name "STLS" indicates this command is
  192. present and permitted in the current state.
  193. Newman Standards Track [Page 5]
  194. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  195. STLS
  196. Arguments: none
  197. Restrictions:
  198. Only permitted in AUTHORIZATION state.
  199. Discussion:
  200. A TLS negotiation begins immediately after the CRLF at the
  201. end of the +OK response from the server. A -ERR response
  202. MAY result if a security layer is already active. Once a
  203. client issues a STLS command, it MUST NOT issue further
  204. commands until a server response is seen and the TLS
  205. negotiation is complete.
  206. The STLS command is only permitted in AUTHORIZATION state
  207. and the server remains in AUTHORIZATION state, even if
  208. client credentials are supplied during the TLS negotiation.
  209. The AUTH command [POP-AUTH] with the EXTERNAL mechanism
  210. [SASL] MAY be used to authenticate once TLS client
  211. credentials are successfully exchanged, but servers
  212. supporting the STLS command are not required to support the
  213. EXTERNAL mechanism.
  214. Once TLS has been started, the client MUST discard cached
  215. information about server capabilities and SHOULD re-issue
  216. the CAPA command. This is necessary to protect against
  217. man-in-the-middle attacks which alter the capabilities list
  218. prior to STLS. The server MAY advertise different
  219. capabilities after STLS.
  220. Possible Responses:
  221. +OK -ERR
  222. Examples:
  223. C: STLS
  224. S: +OK Begin TLS negotiation
  225. <TLS negotiation, further commands are under TLS layer>
  226. ...
  227. C: STLS
  228. S: -ERR Command not permitted when TLS active
  229. Newman Standards Track [Page 6]
  230. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  231. 5. ACAP STARTTLS extension
  232. When the TLS extension is present in ACAP, "STARTTLS" is listed as a
  233. capability in the ACAP greeting. No arguments to this capability are
  234. defined at this time. This extension adds a single command,
  235. "STARTTLS" to the ACAP protocol which is used to begin a TLS
  236. negotiation.
  237. 5.1. STARTTLS Command
  238. Arguments: none
  239. Responses: no specific responses for this command
  240. Result: OK - begin TLS negotiation
  241. BAD - command unknown or arguments invalid
  242. A TLS negotiation begins immediately after the CRLF at the end of
  243. the tagged OK response from the server. Once a client issues a
  244. STARTTLS command, it MUST NOT issue further commands until a
  245. server response is seen and the TLS negotiation is complete.
  246. The STARTTLS command is only valid in non-authenticated state.
  247. The server remains in non-authenticated state, even if client
  248. credentials are supplied during the TLS negotiation. The SASL
  249. [SASL] EXTERNAL mechanism MAY be used to authenticate once TLS
  250. client credentials are successfully exchanged, but servers
  251. supporting the STARTTLS command are not required to support the
  252. EXTERNAL mechanism.
  253. After the TLS layer is established, the server MUST re-issue an
  254. untagged ACAP greeting. This is necessary to protect against
  255. man-in-the-middle attacks which alter the capabilities list prior
  256. to STARTTLS. The client MUST discard cached capability
  257. information and replace it with the information from the new ACAP
  258. greeting. The server MAY advertise different capabilities after
  259. STARTTLS.
  260. The formal syntax for ACAP is amended as follows:
  261. command_any =/ "STARTTLS"
  262. Example: S: * ACAP (SASL "CRAM-MD5") (STARTTLS)
  263. C: a002 STARTTLS
  264. S: a002 OK "Begin TLS negotiation now"
  265. <TLS negotiation, further commands are under TLS layer>
  266. S: * ACAP (SASL "CRAM-MD5" "PLAIN" "EXTERNAL")
  267. Newman Standards Track [Page 7]
  268. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  269. 6. PLAIN SASL mechanism
  270. Clear-text passwords are simple, interoperate with almost all
  271. existing operating system authentication databases, and are useful
  272. for a smooth transition to a more secure password-based
  273. authentication mechanism. The drawback is that they are unacceptable
  274. for use over an unencrypted network connection.
  275. This defines the "PLAIN" SASL mechanism for use with ACAP and other
  276. protocols with no clear-text login command. The PLAIN SASL mechanism
  277. MUST NOT be advertised or used unless a strong encryption layer (such
  278. as the provided by TLS) is active or backwards compatibility dictates
  279. otherwise.
  280. The mechanism consists of a single message from the client to the
  281. server. The client sends the authorization identity (identity to
  282. login as), followed by a US-ASCII NUL character, followed by the
  283. authentication identity (identity whose password will be used),
  284. followed by a US-ASCII NUL character, followed by the clear-text
  285. password. The client may leave the authorization identity empty to
  286. indicate that it is the same as the authentication identity.
  287. The server will verify the authentication identity and password with
  288. the system authentication database and verify that the authentication
  289. credentials permit the client to login as the authorization identity.
  290. If both steps succeed, the user is logged in.
  291. The server MAY also use the password to initialize any new
  292. authentication database, such as one suitable for CRAM-MD5
  293. [CRAM-MD5].
  294. Non-US-ASCII characters are permitted as long as they are represented
  295. in UTF-8 [UTF-8]. Use of non-visible characters or characters which
  296. a user may be unable to enter on some keyboards is discouraged.
  297. The formal grammar for the client message using Augmented BNF [ABNF]
  298. follows.
  299. message = [authorize-id] NUL authenticate-id NUL password
  300. authenticate-id = 1*UTF8-SAFE ; MUST accept up to 255 octets
  301. authorize-id = 1*UTF8-SAFE ; MUST accept up to 255 octets
  302. password = 1*UTF8-SAFE ; MUST accept up to 255 octets
  303. NUL = %x00
  304. UTF8-SAFE = %x01-09 / %x0B-0C / %x0E-7F / UTF8-2 /
  305. UTF8-3 / UTF8-4 / UTF8-5 / UTF8-6
  306. UTF8-1 = %x80-BF
  307. UTF8-2 = %xC0-DF UTF8-1
  308. UTF8-3 = %xE0-EF 2UTF8-1
  309. Newman Standards Track [Page 8]
  310. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  311. UTF8-4 = %xF0-F7 3UTF8-1
  312. UTF8-5 = %xF8-FB 4UTF8-1
  313. UTF8-6 = %xFC-FD 5UTF8-1
  314. Here is an example of how this might be used to initialize a CRAM-MD5
  315. authentication database for ACAP:
  316. Example: S: * ACAP (SASL "CRAM-MD5") (STARTTLS)
  317. C: a001 AUTHENTICATE "CRAM-MD5"
  318. S: + "<1896.697170952@postoffice.reston.mci.net>"
  319. C: "tim b913a602c7eda7a495b4e6e7334d3890"
  320. S: a001 NO (TRANSITION-NEEDED)
  321. "Please change your password, or use TLS to login"
  322. C: a002 STARTTLS
  323. S: a002 OK "Begin TLS negotiation now"
  324. <TLS negotiation, further commands are under TLS layer>
  325. S: * ACAP (SASL "CRAM-MD5" "PLAIN" "EXTERNAL")
  326. C: a003 AUTHENTICATE "PLAIN" {21+}
  327. C: <NUL>tim<NUL>tanstaaftanstaaf
  328. S: a003 OK CRAM-MD5 password initialized
  329. Note: In this example, <NUL> represents a single ASCII NUL octet.
  330. 7. imaps and pop3s ports
  331. Separate "imaps" and "pop3s" ports were registered for use with SSL.
  332. Use of these ports is discouraged in favor of the STARTTLS or STLS
  333. commands.
  334. A number of problems have been observed with separate ports for
  335. "secure" variants of protocols. This is an attempt to enumerate some
  336. of those problems.
  337. - Separate ports lead to a separate URL scheme which intrudes into
  338. the user interface in inappropriate ways. For example, many web
  339. pages use language like "click here if your browser supports SSL."
  340. This is a decision the browser is often more capable of making than
  341. the user.
  342. - Separate ports imply a model of either "secure" or "not secure."
  343. This can be misleading in a number of ways. First, the "secure"
  344. port may not in fact be acceptably secure as an export-crippled
  345. cipher suite might be in use. This can mislead users into a false
  346. sense of security. Second, the normal port might in fact be
  347. secured by using a SASL mechanism which includes a security layer.
  348. Thus the separate port distinction makes the complex topic of
  349. security policy even more confusing. One common result of this
  350. confusion is that firewall administrators are often misled into
  351. Newman Standards Track [Page 9]
  352. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  353. permitting the "secure" port and blocking the standard port. This
  354. could be a poor choice given the common use of SSL with a 40-bit
  355. key encryption layer and plain-text password authentication is less
  356. secure than strong SASL mechanisms such as GSSAPI with Kerberos 5.
  357. - Use of separate ports for SSL has caused clients to implement only
  358. two security policies: use SSL or don't use SSL. The desirable
  359. security policy "use TLS when available" would be cumbersome with
  360. the separate port model, but is simple with STARTTLS.
  361. - Port numbers are a limited resource. While they are not yet in
  362. short supply, it is unwise to set a precedent that could double (or
  363. worse) the speed of their consumption.
  364. 8. IANA Considerations
  365. This constitutes registration of the "STARTTLS" and "LOGINDISABLED"
  366. IMAP capabilities as required by section 7.2.1 of RFC 2060 [IMAP].
  367. The registration for the POP3 "STLS" capability follows:
  368. CAPA tag: STLS
  369. Arguments: none
  370. Added commands: STLS
  371. Standard commands affected: May enable USER/PASS as a side-effect.
  372. CAPA command SHOULD be re-issued after successful completion.
  373. Announced states/Valid states: AUTHORIZATION state only.
  374. Specification reference: this memo
  375. The registration for the ACAP "STARTTLS" capability follows:
  376. Capability name: STARTTLS
  377. Capability keyword: STARTTLS
  378. Capability arguments: none
  379. Published Specification(s): this memo
  380. Person and email address for further information:
  381. see author's address section below
  382. The registration for the PLAIN SASL mechanism follows:
  383. SASL mechanism name: PLAIN
  384. Security Considerations: See section 9 of this memo
  385. Published specification: this memo
  386. Person & email address to contact for further information:
  387. see author's address section below
  388. Intended usage: COMMON
  389. Author/Change controller: see author's address section below
  390. Newman Standards Track [Page 10]
  391. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  392. 9. Security Considerations
  393. TLS only provides protection for data sent over a network connection.
  394. Messages transferred over IMAP or POP3 are still available to server
  395. administrators and usually subject to eavesdropping, tampering and
  396. forgery when transmitted through SMTP or NNTP. TLS is no substitute
  397. for an end-to-end message security mechanism using MIME security
  398. multiparts [MIME-SEC].
  399. A man-in-the-middle attacker can remove STARTTLS from the capability
  400. list or generate a failure response to the STARTTLS command. In
  401. order to detect such an attack, clients SHOULD warn the user when
  402. session privacy is not active and/or be configurable to refuse to
  403. proceed without an acceptable level of security.
  404. A man-in-the-middle attacker can always cause a down-negotiation to
  405. the weakest authentication mechanism or cipher suite available. For
  406. this reason, implementations SHOULD be configurable to refuse weak
  407. mechanisms or cipher suites.
  408. Any protocol interactions prior to the TLS handshake are performed in
  409. the clear and can be modified by a man-in-the-middle attacker. For
  410. this reason, clients MUST discard cached information about server
  411. capabilities advertised prior to the start of the TLS handshake.
  412. Clients are encouraged to clearly indicate when the level of
  413. encryption active is known to be vulnerable to attack using modern
  414. hardware (such as encryption keys with 56 bits of entropy or less).
  415. The LOGINDISABLED IMAP capability (discussed in section 3.2) only
  416. reduces the potential for passive attacks, it provides no protection
  417. against active attacks. The responsibility remains with the client
  418. to avoid sending a password over a vulnerable channel.
  419. The PLAIN mechanism relies on the TLS encryption layer for security.
  420. When used without TLS, it is vulnerable to a common network
  421. eavesdropping attack. Therefore PLAIN MUST NOT be advertised or used
  422. unless a suitable TLS encryption layer is active or backwards
  423. compatibility dictates otherwise.
  424. When the PLAIN mechanism is used, the server gains the ability to
  425. impersonate the user to all services with the same password
  426. regardless of any encryption provided by TLS or other network privacy
  427. mechanisms. While many other authentication mechanisms have similar
  428. weaknesses, stronger SASL mechanisms such as Kerberos address this
  429. issue. Clients are encouraged to have an operational mode where all
  430. mechanisms which are likely to reveal the user's password to the
  431. server are disabled.
  432. Newman Standards Track [Page 11]
  433. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  434. The security considerations for TLS apply to STARTTLS and the
  435. security considerations for SASL apply to the PLAIN mechanism.
  436. Additional security requirements are discussed in section 2.
  437. 10. References
  438. [ABNF] Crocker, D. and P. Overell, "Augmented BNF for Syntax
  439. Specifications: ABNF", RFC 2234, November 1997.
  440. [ACAP] Newman, C. and J. Myers, "ACAP -- Application
  441. Configuration Access Protocol", RFC 2244, November 1997.
  442. [AUTH] Haller, N. and R. Atkinson, "On Internet Authentication",
  443. RFC 1704, October 1994.
  444. [CRAM-MD5] Klensin, J., Catoe, R. and P. Krumviede, "IMAP/POP
  445. AUTHorize Extension for Simple Challenge/Response", RFC
  446. 2195, September 1997.
  447. [IMAP] Crispin, M., "Internet Message Access Protocol - Version
  448. 4rev1", RFC 2060, December 1996.
  449. [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate
  450. Requirement Levels", BCP 14, RFC 2119, March 1997.
  451. [MIME-SEC] Galvin, J., Murphy, S., Crocker, S. and N. Freed,
  452. "Security Multiparts for MIME: Multipart/Signed and
  453. Multipart/Encrypted", RFC 1847, October 1995.
  454. [POP3] Myers, J. and M. Rose, "Post Office Protocol - Version 3",
  455. STD 53, RFC 1939, May 1996.
  456. [POP3EXT] Gellens, R., Newman, C. and L. Lundblade, "POP3 Extension
  457. Mechanism", RFC 2449, November 1998.
  458. [POP-AUTH] Myers, J., "POP3 AUTHentication command", RFC 1734,
  459. December 1994.
  460. [SASL] Myers, J., "Simple Authentication and Security Layer
  461. (SASL)", RFC 2222, October 1997.
  462. [SMTPTLS] Hoffman, P., "SMTP Service Extension for Secure SMTP over
  463. TLS", RFC 2487, January 1999.
  464. [TLS] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0",
  465. RFC 2246, January 1999.
  466. Newman Standards Track [Page 12]
  467. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  468. [UTF-8] Yergeau, F., "UTF-8, a transformation format of ISO
  469. 10646", RFC 2279, January 1998.
  470. 11. Author's Address
  471. Chris Newman
  472. Innosoft International, Inc.
  473. 1050 Lakes Drive
  474. West Covina, CA 91790 USA
  475. EMail: chris.newman@innosoft.com
  476. A. Appendix -- Compliance Checklist
  477. An implementation is not compliant if it fails to satisfy one or more
  478. of the MUST requirements for the protocols it implements. An
  479. implementation that satisfies all the MUST and all the SHOULD
  480. requirements for its protocols is said to be "unconditionally
  481. compliant"; one that satisfies all the MUST requirements but not all
  482. the SHOULD requirements for its protocols is said to be
  483. "conditionally compliant".
  484. Rules Section
  485. ----- -------
  486. Mandatory-to-implement Cipher Suite 2.1
  487. SHOULD have mode where encryption required 2.2
  488. server SHOULD have mode where TLS not required 2.2
  489. MUST be configurable to refuse all clear-text login
  490. commands or mechanisms 2.3
  491. server SHOULD be configurable to refuse clear-text
  492. login commands on entire server and on per-user basis 2.3
  493. client MUST check server identity 2.4
  494. client MUST use hostname used to open connection 2.4
  495. client MUST NOT use hostname from insecure remote lookup 2.4
  496. client SHOULD support subjectAltName of dNSName type 2.4
  497. client SHOULD ask for confirmation or terminate on fail 2.4
  498. MUST check result of STARTTLS for acceptable privacy 2.5
  499. client MUST NOT issue commands after STARTTLS
  500. until server response and negotiation done 3.1,4,5.1
  501. client MUST discard cached information 3.1,4,5.1,9
  502. client SHOULD re-issue CAPABILITY/CAPA command 3.1,4
  503. IMAP server with STARTTLS MUST implement LOGINDISABLED 3.2
  504. IMAP client MUST NOT issue LOGIN if LOGINDISABLED 3.2
  505. POP server MUST implement POP3 extensions 4
  506. ACAP server MUST re-issue ACAP greeting 5.1
  507. Newman Standards Track [Page 13]
  508. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  509. client SHOULD warn when session privacy not active and/or
  510. refuse to proceed without acceptable security level 9
  511. SHOULD be configurable to refuse weak mechanisms or
  512. cipher suites 9
  513. The PLAIN mechanism is an optional part of this specification.
  514. However if it is implemented the following rules apply:
  515. Rules Section
  516. ----- -------
  517. MUST NOT use PLAIN unless strong encryption active
  518. or backwards compatibility dictates otherwise 6,9
  519. MUST use UTF-8 encoding for characters in PLAIN 6
  520. Newman Standards Track [Page 14]
  521. RFC 2595 Using TLS with IMAP, POP3 and ACAP June 1999
  522. Full Copyright Statement
  523. Copyright (C) The Internet Society (1999). All Rights Reserved.
  524. This document and translations of it may be copied and furnished to
  525. others, and derivative works that comment on or otherwise explain it
  526. or assist in its implementation may be prepared, copied, published
  527. and distributed, in whole or in part, without restriction of any
  528. kind, provided that the above copyright notice and this paragraph are
  529. included on all such copies and derivative works. However, this
  530. document itself may not be modified in any way, such as by removing
  531. the copyright notice or references to the Internet Society or other
  532. Internet organizations, except as needed for the purpose of
  533. developing Internet standards in which case the procedures for
  534. copyrights defined in the Internet Standards process must be
  535. followed, or as required to translate it into languages other than
  536. English.
  537. The limited permissions granted above are perpetual and will not be
  538. revoked by the Internet Society or its successors or assigns.
  539. This document and the information contained herein is provided on an
  540. "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
  541. TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
  542. BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
  543. HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
  544. MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
  545. Acknowledgement
  546. Funding for the RFC Editor function is currently provided by the
  547. Internet Society.
  548. Newman Standards Track [Page 15]