[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Towards a Torbutton for Thunderbird (torbutton-birdy)
On 05/07/2012 11:33 AM, anonym wrote:
> 05/06/2012 03:57 PM, Jacob Appelbaum:
>>> A few Tor hackers (Sukhbir, tagnar, myself, etc) are working on a
>>> plugin for Thunderbird that attempts to Torify it properly. The
>>> codename for now is 'torbutton-birdy' and it is based largely on
>>> the seminal analysis[-1] by tagnaq. Two core goals in addition to
>>> Torification is the integration with MixGUI[0] and of course
>>> Enigmail[1].
>
> This sounds awesome! In Tails we have had plans to move to
> Thunderbird/Icedove [1] for some time and this seems like a must have.
>
> [1] https://tails.boum.org/todo/Return_of_Icedove__63__/
>
Great - I agree. It would basically be installed and then any account in
use will be configured to go over Tor by default.
>>> DNS and other connections leak during account creation (when
>>> Thunderbird
>>>> is trying to work out how to connect), but after that I can
>>>> receive (IMAP w/STARTTLS, IMAPS) and send (Submission
>>>> w/STARTTLS, SMTPS) without seeing any leaks, including no DNS
>>>> leaks. I can also see the connections showing up in the Vidalia
>>>> Network Map.
>>>>
>> These issues should be listed in the TODO file - I'm sorry to say
>> that Thunderbird and the Mozilla team seems to refuse to Do The
>> Right Thing with the account setup wizard. The bugs on this topic are
>> a depressing read - it's not really possible to override this and
>> fail closed - which seems like an unreasonable stance...
>
> In January I worked a bit on securing Thunderbird's autoconfiguration
> wizard to make it suitable for Tails. What I did was the following:
>
> * When probing a mail provider for an xml config, first try HTTPS,
> then http (old behaviour: http only).
> * When using a fetched xml config, prefer using TLS/SSL over plaintext
> (old behaviour: use whatever is defined first in the xml file).
> * Introduce a boolean pref called `mailnews.auto_config_ssl_only`
> (that has a checkbox in the autoconfiguration wizard) that does the
> following when true:
> - Only allow HTTPS when fetching xml configs from mail provider.
> - Only allow HTTPS when fetching xml configs from Mozilla's database
> (luckily the default URL is using HTTPS).
> - Don't check DNS MX records for mail configurations. (This may need
> some rethinking for DNSSEC.)
> - Only accept fetched xml configs that use safe email protocols
> (SSL/TLS for SMTP/IMAP/POP).
> - Only probe the mail server for safe email protocols (SSL/TLS for
> SMTP/IMAP/POP).
>
> These changes are implemented in the `secure_account_creation` branch
> in a git repository that can be cloned as follow:
>
> git clone git://labs.riseup.net/tails_icedove.git
All of those need to go upstream, please. They do not belong in
Torbutton-birdy, they belong in TB proper, I think.
>
> (Since the repo is huge (and there's no gitweb AFAIK) I also attached
> the commits as git patches. This were written for Thunderbird 8, but I
> know they apply cleanly to TB 10 as well.)
>
Nothing attached here...
> Comments on the above described approach (and the implementation) are of
> course highly welcome.
>
> The idea is to at least try to get this merged upstream (if not in
> Mozilla, perhaps at least in Debian) in some form, otherwise we're
> gonna ship an Icedove built from sources with these changes applied in
> Tails.
>
Yes, I agree.
> It's unclear to me if you've done (or plan to do) some work on the
> autoconfig wizard in torbutton-birdy. I'd appreciate if you could
> elaborate on this.
>
We haven't touched it - please check out the TODO.
All the best,
Jacob
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk