PCI - Disable Plain text authentication

baronn

Active Member
Dec 27, 2017
40
8
58
manchester
cPanel Access Level
Root Administrator
Hi Everyone,

Getting this issue with PCI for: Remote Mail Service Accepting Unencrypted Credentials Detected (IMAP) basically:


* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE STARTTLS LOGINDISABLED] Dovecot ready.

vidence: ~$ telnet xxx.xxx.xx.xxx. 143 Trying xxx.xxx.xx.xxx... Connected to xxx.xxx.xx.xxx.. Escape character is '^]'. * OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS LOGINDISABLED] Dovecot ready. A LOGIN USER PASS * BAD [ALERT] Plaintext authentication not allowed without SSL/TLS, but your client did it anyway. If anyone was listening, the password was exposed. A NO [PRIVACYREQUIRED] Plaintext authentication disallowed on non-secure (SSL/TLS) connections.

We have require clients to connect via tls switched on in exim confirguration and also explained to pci vendor that we dont send cc details at all via email and its only for standard communication.

They are adamant that this nees to be fixed and so far nothing i have read:

has helped us to fix this.

How can we prevent plaintext authenticatin on 143??? Cannot find any clear information OR more importantly steps on how to fix this. Can you help out here please...
 
Last edited by a moderator:

ffeingol

Well-Known Member
PartnerNOC
Nov 9, 2001
943
421
363
cPanel Access Level
DataCenter Provider
Go to WHM, Mailserver Configuration and change "Allow Plaintext Authentication (from remote clients)" from Yes to No. You might, however, make your other clients unhappy.
 
  • Like
Reactions: cPRex

baronn

Active Member
Dec 27, 2017
40
8
58
manchester
cPanel Access Level
Root Administrator
Go to WHM, Mailserver Configuration and change "Allow Plaintext Authentication (from remote clients)" from Yes to No. You might, however, make your other clients unhappy.
thats already set to 'no' but PCI still complaining... specifically on port 143
 

sparek-3

Well-Known Member
Aug 10, 2002
2,173
280
388
cPanel Access Level
Root Administrator
Have you talked to a human that is running this PCI scan?

The evidence provided shows that your server doesn't accept plain text logins - an upgrade to a TLS connection is required before LOGIN can be understood by the server.

Now... that doesn't stop a stupid client from connecting to your IMAP service and trying to log in, exposing their password in plain text. If the connecting client is worth anything it would realize that the capabilities listed by your IMAP service does not list plaintext login.

If a client still wants to send the password information in plaintext, then that's on the client. Not the server's fault.
 
  • Like
Reactions: ffeingol

baronn

Active Member
Dec 27, 2017
40
8
58
manchester
cPanel Access Level
Root Administrator
OK, then simply block port 143, as POP/SSL will be on 993. Again, this may make all the rest of your customers upset.
Thank for the info. Yup thats the last resort which I hope it wont come to as I hope one of the @cpanel team can shed some light or insight...

Have you talked to a human that is running this PCI scan?

The evidence provided shows that your server doesn't accept plain text logins - an upgrade to a TLS connection is required before LOGIN can be understood by the server.

Now... that doesn't stop a stupid client from connecting to your IMAP service and trying to log in, exposing their password in plain text. If the connecting client is worth anything it would realize that the capabilities listed by your IMAP service does not list plaintext login.

If a client still wants to send the password information in plaintext, then that's on the client. Not the server's fault.
100% agree with you. Thing is no human to talk to which is ridiculous. A few failures many which have been accepted as false positive but a couple which seem to be responded by same person which failed and and very hard 'we dont accept' that answers. Like you say its not the servers fault if you want to send your passwords!
 
  • Like
Reactions: cPRex