A White Hat Hack against a server using Barracuda came back with the following report, hopefully this can feed into improving BOA's security, reccomendations at the end.
Technical details:
The Server was found to be using a self-signed SSL certificate for it's SMTP service over TLS.
Vulnerabilities were also found with the host server using TLS/SSL where this service permits clients to renegotiate connections. Performing this renegotiation a number of times could permit the client (an attacker) to open several connections simultanneously and repeatedly renegotiate leading to a possible Denial of Service attack.
The remote server supports the use of RC4 in it's cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.
Reccomendations possibly actionable for BOA scripts:
Disable SSL/TLS renegotiation.
Reconfigure the application to avoid use of RC4 ciphers.
Reccomendations not actionable in BOA scripts
Disable the SMTP Service if it is not being used or purchase a valid SSL certificate.
Comments
Comment #1
omega8cc commentedI don't think it was tested with any recent BOA server and csf/lfd enabled.
I would also recommend to test it with valid cert via https://www.ssllabs.com/ssltest/
See also: https://community.qualys.com/blogs/securitylabs/2013/03/19/rc4-in-tls-is...
That said, we could probably just close remote access to the Postfix server installed with Debian/Ubuntu defaults, since it is needed only for outgoing SMTP/sendmail.
Comment #2
realityloop commentedI vote for closing remote access.
Comment #3
hyperglide commentedCan I get pointed in the right direction, where we can buy a certification and properly add to our BOA install. Ty.
Comment #4
omega8cc commentedCommitted in:
http://drupalcode.org/project/barracuda.git/commit/61db393
http://drupalcode.org/project/barracuda.git/commit/2daec1b
Thanks for the suggestion!