[Users] [Bug 3299] [Security] Please fix POODLE vulnerability in Claws Mail

noreply at thewildbeast.co.uk noreply at thewildbeast.co.uk
Sat Oct 18 01:11:21 CEST 2014


http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3299

--- Comment #4 from nw9165-3201 <nw9165-3201 at yahoo.com> ---
Hello,

(In reply to comment #3)
> Since you are referring us to our own development mailing list, what do you
> hope to achieve by opening this here? Are you just trolling, or are you
> really saying, "hey Claws devs, look at what you wrote on your dev mailing
> list"

well, it's simple. I tried to post something on the users mailing list
(http://lists.claws-mail.org/cgi-bin/mailman/listinfo/users). But my posts are
always being rejected. I tried it several times, but they were always rejected
(I still don't know why).

So I came here. Simple as that.

And it would have been nice if you would have informed the Claws Mail users
about the vulnerability via the users mailing list (or the official website or
whatever). So, I don't think it hurts to report this vulnerability on the
official bug tracker?

Funnily enough though, I already figured that you would probably be going to
diss me, as you are pretty much always doing everytime I report something
here...

By now I somehow am getting the feeling that, for whatever reason, you are
playing the "Good cop/bad cop routine" (Colin = good "cop", you = bad "cop")...

Anyway:

(In reply to comment #2)
> You can either use STARTTLS (use port 143 on IMAP, 110 on POP3, 25 or 587 on
> SMTP for that).

That doesn't seem to work on the IMAP server I am trying. It doesn't allow to
connect via port 143. It only seems to support port 993.

It's the IMAP server from T-Online / Deutsche Telekom AG
(secureimap.t-online.de).

The SMTP server (securesmtp.t-online.de) supports connecting on port 25 and 587
though.

Regards

-- 
You are receiving this mail because:
You are the assignee for the bug.



More information about the Users mailing list