ArchLinux: 201410-13: ejabberd: circumvention of encryption
Summary
It was discovered that ejabberd does not enforce the starttls_required setting when compression is used, which causes clients to unexpectedly establish connections without encryption.
Resolution
Upgrade to 14.07-2.
# pacman -Syu "ejabberd>=14.07-2"
The problems have been fixed upstream [0] but no release version is
available yet.
References
[0] https://github.com/processone/ejabberd/commit/7bdc115 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8760 https://bugs.archlinux.org/task/42541
![Dist Arch](/images/distros/dist-arch.png)
Workaround
Disable compression ('zlib' in c2s configuration) and find affected
users with:
# ejabberdctl connected_users_info | grep 'c2s_compressed\s'
You may kick affected user sessions and they should be able to reconnect
with encryption and without compression.