<feed xmlns='http://www.w3.org/2005/Atom'>
<title>interimap/tests, branch v0.5.4</title>
<subtitle>Fast bidirectional synchronization for QRESYNC-capable IMAP servers</subtitle>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/'/>
<entry>
<title>libinterimap: add support for the TLS SNI (Server Name Indication) extension.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T20:52:44+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=4ed6f0982cc0553e31e7beadf441beb8573a07d4'/>
<id>4ed6f0982cc0553e31e7beadf441beb8573a07d4</id>
<content type='text'>
This is controlled by the new 'SSL_hostname' option.  The default value
of that option is the value of the 'host' option when it is hostname,
and the empty string (which disables SNI) when it is an IP literal.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is controlled by the new 'SSL_hostname' option.  The default value
of that option is the value of the 'host' option when it is hostname,
and the empty string (which disables SNI) when it is an IP literal.
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: make SSL_verify check the hostname as well.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T18:39:10+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=265f133600e9812726a52ea3067409ed3578e882'/>
<id>265f133600e9812726a52ea3067409ed3578e882</id>
<content type='text'>
More precisely, ensure that the certificate Subject Alternative Name
(SAN) or Subject CommonName (CN) matches the hostname or IP literal
specified by the 'host' option.  Previously it was only verifying the
chain of trust.

This bumps the minimum Net::SSLeay version to 1.83 and OpenSSL version
1.0.2.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
More precisely, ensure that the certificate Subject Alternative Name
(SAN) or Subject CommonName (CN) matches the hostname or IP literal
specified by the 'host' option.  Previously it was only verifying the
chain of trust.

This bumps the minimum Net::SSLeay version to 1.83 and OpenSSL version
1.0.2.
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: always generate new certificates on `make test`.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T13:34:48+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=26e5c04abfb81bdcbd4d89d9f9329b8433920b26'/>
<id>26e5c04abfb81bdcbd4d89d9f9329b8433920b26</id>
<content type='text'>
In addition, sign test certificates with the same root CA.  Hence
running `make test` now requires OpenSSL 1.1.1 or later.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In addition, sign test certificates with the same root CA.  Hence
running `make test` now requires OpenSSL 1.1.1 or later.
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: show the matching pinned SPKI in --debug mode.</title>
<updated>2020-12-11T10:20:37+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T13:28:29+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=17b263c49df682fc45f0e50cceb01db4366ad9a7'/>
<id>17b263c49df682fc45f0e50cceb01db4366ad9a7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>New test with a server offering both RSA+ECDSA certificates.</title>
<updated>2020-12-09T14:29:59+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-09T14:11:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=51df40cf82c67ae828c325a42e28b3155fce9864'/>
<id>51df40cf82c67ae828c325a42e28b3155fce9864</id>
<content type='text'>
This requires dovecot-imapd 2.2.31 or later.

Certificate generated with:

      $ openssl genpkey -algorithm EC -pkeyopt ec_paramgen_curve:P-256 -pkeyopt ec_param_enc:named_curve \
            -out tests/snippets/dovecot/dovecot.ecdsa.key
      $ openssl req -x509 -days 3650 -subj "/CN=InterIMAP test suite" \
            -key tests/snippets/dovecot/dovecot.ecdsa.key \
            -out tests/snippets/dovecot/dovecot.ecdsa.crt
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This requires dovecot-imapd 2.2.31 or later.

Certificate generated with:

      $ openssl genpkey -algorithm EC -pkeyopt ec_paramgen_curve:P-256 -pkeyopt ec_param_enc:named_curve \
            -out tests/snippets/dovecot/dovecot.ecdsa.key
      $ openssl req -x509 -days 3650 -subj "/CN=InterIMAP test suite" \
            -key tests/snippets/dovecot/dovecot.ecdsa.key \
            -out tests/snippets/dovecot/dovecot.ecdsa.crt
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: SSL_fingerprint now supports a space-separate list of digests to pin.</title>
<updated>2020-12-09T14:29:54+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-09T14:06:37+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=a1ef66a76b4a6651b7371a9fd1e35f2f99e85bfa'/>
<id>a1ef66a76b4a6651b7371a9fd1e35f2f99e85bfa</id>
<content type='text'>
And succeeds if, and only if, the peer certificate SPKI matches one of
the pinned digest values.  Specifying multiple digest values can key
useful in key rollover scenarios and/or when the server supports
certificates of different types (for instance RSA+ECDSA).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
And succeeds if, and only if, the peer certificate SPKI matches one of
the pinned digest values.  Specifying multiple digest values can key
useful in key rollover scenarios and/or when the server supports
certificates of different types (for instance RSA+ECDSA).
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: use a RSA certificate rather than ECDSA.</title>
<updated>2020-12-09T13:57:11+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-09T13:57:11+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=b13c9fa6f442f555af65f869b954935dae40fcc4'/>
<id>b13c9fa6f442f555af65f869b954935dae40fcc4</id>
<content type='text'>
It's arguably the most common use-case.  Generated with

  $ openssl genpkey -algorithm RSA -out tests/snippets/dovecot/dovecot.rsa.key
  $ openssl req -x509 -days 3650 -subj "/CN=InterIMAP test suite" \
        -key tests/snippets/dovecot/dovecot.rsa.key \
        -out tests/snippets/dovecot/dovecot.rsa.crt
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It's arguably the most common use-case.  Generated with

  $ openssl genpkey -algorithm RSA -out tests/snippets/dovecot/dovecot.rsa.key
  $ openssl req -x509 -days 3650 -subj "/CN=InterIMAP test suite" \
        -key tests/snippets/dovecot/dovecot.rsa.key \
        -out tests/snippets/dovecot/dovecot.rsa.crt
</pre>
</div>
</content>
</entry>
<entry>
<title>Upgrade URLs to secure HTTP.</title>
<updated>2020-08-04T00:35:05+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-08-04T00:35:05+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=11cd204852f665670b5d4271eab86a3d9f5e5624'/>
<id>11cd204852f665670b5d4271eab86a3d9f5e5624</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: abort on PREAUTH greeting received on plaintext connections</title>
<updated>2020-08-03T18:50:08+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-08-03T18:27:38+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=3b2939febdeb7f92051f95a3b08cf86e221ce21d'/>
<id>3b2939febdeb7f92051f95a3b08cf86e221ce21d</id>
<content type='text'>
Set "STARTTLS = NO" to ignore.  This is similar to CVE-2020-12398 and
CVE-2020-14093.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Set "STARTTLS = NO" to ignore.  This is similar to CVE-2020-12398 and
CVE-2020-14093.
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: Fix response injection vulnerability after STARTTLS.</title>
<updated>2020-08-03T18:30:46+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-08-03T17:20:05+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=bc43c0d9468a8d50ba141c8a965f9f07ed0456ff'/>
<id>bc43c0d9468a8d50ba141c8a965f9f07ed0456ff</id>
<content type='text'>
For background see https://gitlab.com/muttmua/mutt/-/issues/248 .
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
For background see https://gitlab.com/muttmua/mutt/-/issues/248 .
</pre>
</div>
</content>
</entry>
</feed>
