Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 23 |
Nodes: | 6 (0 / 6) |
Uptime: | 54:40:23 |
Calls: | 583 |
Files: | 1,139 |
D/L today: |
179 files (27,921K bytes) |
Messages: | 111,801 |
It appears that the phpmailer is set to use STARTTLS at port 587.
This is less secure than SSL at port 465. STARTTLS is subject to MITM protocol downgrade attack.
STARTTLS allows the client to establish a plaintext, unencrypted
connection with the mail server with no warning to the user. If this
happens both the client and the server may send credentials and message
data in the clear with no encryption. Why the brainlets who design mail servers have allowed this state of affairs is beyond my clairvoyance. STARTTLS should have been scrapped long ago.
To ensure security I need to configure rslight phpmailer to always
fail to connect if a secure SSL/TLS connection cannot be established at
port 465. Is there a way to force rslight phpmailer connect with
SSL/TLS or error and die, rather than STARTTLS?
The only other option I see is to configure a local proxy to connect to
the mail server and use IPTABLES to prevent the connection from
reaching out, so that STARTTLS won't expose a plaintext connection.
Even then I am not sure if this will 100% ensure against password
leakage even on localhost in the middle of a shared server farm.
Are there tips or tricks to ensure I am always getting a secure
connection with phpmailer?