Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Self Signed Certificate Keystore #60

Open
daneren2005 opened this issue Nov 15, 2012 · 7 comments
Open

Self Signed Certificate Keystore #60

daneren2005 opened this issue Nov 15, 2012 · 7 comments

Comments

@daneren2005
Copy link
Owner

Currently all self-signed certificates are accepted. On the first acceptance of a self-signed certificate for a given domain it needs to be saved on either the device keystore if accessible, or on a app specific one if nothing else. There also needs to be a way to clear it in case the self-signed certificate or domain changes.

@daneren2005
Copy link
Owner Author

@daneren2005
Copy link
Owner Author

@onetimeburner
Copy link

You could provide the ability to hand-key the certificate's SHA1 fingerprint? : )

@ultramancool
Copy link

If you could just provide a way to disable the self-signed allowance, that'd be good. I install my own CA cert onto my devices, but realized that DSub worked without this. Allow self-signed should be a checkbox at least.

@precurse
Copy link

I've been using DSub for a while with my Subsonic setup with a valid Root-CA cert. My certificate expired the other day and noticed that DSub continued to connect without any warnings or errors.

I then proceeded to test to see how it handled self-signed certificates. It appears there is NO certificate checking done at all. Any server certificate is accepted by the DSub client, which means any MITM (Man-in-the-middle) TLS attack can be carried out trivially and credentials stolen.

Other Subsonic clients that I tested off the Play Store seem to do this CA check properly. Please fix! I have a test installation that you can use to verify if needed.

@OS-WS
Copy link

OS-WS commented Apr 26, 2021

Hi @daneren2005 ,
Was this issue ever addressed?

by the way, this issue was assigned with CVE-2018-1000664 -
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1000664

flyingOwl added a commit to flyingOwl/Subsonic that referenced this issue Jan 28, 2024
Every server configuration has its own setting that enables the use of
insecure connections. This is disabled by default. Only verified https
connections are allowed. Error messages with a note about the setting
have been added.

CVE-2018-1000664

Discussed in daneren2005#60
paroj pushed a commit to paroj/DSub2000 that referenced this issue Apr 1, 2024
Every server configuration has its own setting that enables the use of
insecure connections. This is disabled by default. Only verified https
connections are allowed. Error messages with a note about the setting
have been added.

CVE-2018-1000664

Discussed in daneren2005#60
paroj pushed a commit to paroj/DSub2000 that referenced this issue Apr 5, 2024
Every server configuration has its own setting that enables the use of
insecure connections. This is disabled by default. Only verified https
connections are allowed. Error messages with a note about the setting
have been added.

CVE-2018-1000664

Discussed in daneren2005#60
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants