1
0
mirror of https://github.com/moparisthebest/k-9 synced 2024-12-18 13:52:18 -05:00
Commit Graph

32 Commits

Author SHA1 Message Date
cketti
ef8fbb427e Fix typos 2014-03-05 07:18:24 +01:00
cketti
bc4218be55 Remove all entries without transport encryption from providers.xml 2014-03-05 07:07:43 +01:00
Joe Steele
daea7f1ecd Eliminate the 'if available' connection security options
These options originated in the AOSP email client from which K-9 Mail was
forked.  They provide an odd combination of 2 features:

1. Don't bother to authenticate the server's certificate (applies to both
SSL/TLS and STARTTLS); i.e., blindly accept all certificates.  This is
generally a bad security policy which is susceptible to MITM attacks.

2. If STARTTLS is selected but the server doesn't claim to support
STARTTLS, then proceed without using encryption.  This, too, is a bad
security policy which is susceptible to MITM attacks.

Since the time that K-9 Mail was forked, a couple things have changed:

> K-9 Mail has implemented the ability for users to review and permanently
accept individual certificates that would otherwise fail authentication.
With this ability, there is no need for a user to subject themselves to
the ongoing risks of feature 1. above.  Hence, this commit removes feature
1.

> The AOSP email client has changed its behavior and no longer permits a
security downgrade to an unencrypted connection if the server doesn't
claim to support STARTTLS (i.e., they eliminated feature 2. above). K-9
Mail should do the same.  It's unlikely that a server is going to provide
STARTTLS on an intermittent basis, so providing a contingency for such
unusual behavior is an unnecessary risk.  Hence, this commit removes that
feature as well.

Effect on existing users:

If the old connection security setting was "SSL/TLS (if available)" (which
now gets remapped to "SSL/TLS"), and the server does not provide a
certificate that can be authenticated, then a "Certificate error for
<account name>" notification is generated telling the user to check their
server settings.  Tapping the notification takes the user to the relevant
server settings, where the user can tap "Next" to review the certificate
and choose to permanently accept it.  This process would occur during the
first syncing of folders after application upgrade or (in the case of
SMTP) during the first attempt to send a message.

If the connection security setting was "STARTTLS (if available)" (which
now gets remapped to "STARTTLS"), and the server does not provide a
certificate that can be authenticated, then the same process as above
would occur.

If the old connection security setting was "STARTTLS (if available)", and
the server doesn't claim to support STARTTLS, then the user would get a
certificate error notification which would lead them to the server's
settings.  There they would need to choose a different connection security
-- most likely "NONE".  If they didn't change anything but instead just
tapped "Next", the server settings would be checked again and a dialog
would pop up saying, "Cannot connect to server. (STARTTLS connection
security not available)". (The implementation of notifications when
STARTTLS is not available is not actually included here -- it's in the
commit that follows.)

Regarding the changes to providers.xml:  in cases where the scheme ended
with "+ssl", the schemes were simply updated by appending "+".  In cases
where the scheme ended with "+tls", a check of the server was made to
assure that STARTTLS was available before appending "+" to the scheme.
Domains paran.com and nate.com failed the check and were removed because
no current information could be found.  Domains me.com and mac.com also
failed and were updated based on http://support.apple.com/kb/ht4864.
2014-03-03 17:23:00 -05:00
cketti
dd5ac0f1c4 Add mailbox.org to list of providers 2014-02-20 22:14:40 +01:00
nysatrok
ecb4ed41ba Update providers.xml for German providers
Sources:
http://kundenservice.freenet.de/hilfe/mail4/email-programme/einstellungen-generell/generelle-einstellungen/index.html
http://hilfe.telekom.de/hsp/cms/content/HSP/de/3378/FAQ/theme-45858870/Internet/theme-45858718/Dienste/theme-45858716/E-Mail/theme-305642824/Allgemein/theme-57360865/IMAP/faq-45858521
https://hilfe.web.de/e-mail/imap.html
https://hilfe.gmx.net/mailprogramme/imap.html
2014-01-14 02:36:36 +01:00
pyler
168ac641e0 Add provider Outlook.sk
..and fix settings for Azet.sk
2014-01-14 02:36:28 +01:00
pyler
75fc5f0d70 Add Azet.sk to providers.xml 2013-12-15 20:46:30 +01:00
ascob
18d80c8692 Add posteo.de to providers.xml
Add Posteo.de to providers.xml (according to https://autoconfig.thunderbird.net/v1.1/posteo.de and https://autoconfig.posteo.de/mail/config-v1.1.xml)
2013-12-15 20:40:47 +01:00
Andrew Chen
58e7732996 Add IMAP support for Outlook.com.
IMAP is no longer a Plus feature; removing the note saying that it is.

http://blogs.office.com/b/microsoft-outlook/archive/2013/09/12/outlook-com-now-with-imap.aspx
2013-09-13 14:36:02 -07:00
nysatrok
01096d5db8 Update providers.xml according to https://autoconfig.thunderbird.net/v1.1/gmx.de 2013-08-30 14:39:41 +00:00
Jesse Vincent
5ee1ec770d Merge pull request #361 from aatdark/aatdark_issue5876
Add SSL required for provider gmx.de (Issue 5876)
2013-08-16 16:50:32 -07:00
Bernhard Redl
4aa716ce14 Add SSL required for provider gmx.de (Issue 5876) 2013-08-16 04:43:59 +02:00
russian k-9 mail user
765555eb18 Update providers.xml
Some Russian ISP added
2013-07-24 01:28:13 +04:00
russian k-9 mail user
83e7752734 Update providers.xml
updated
2013-07-13 12:49:01 +04:00
russian k-9 mail user
2b8a596e2d Update providers.xml
about 70% of russian mailboxes. it works
2013-07-11 20:57:12 +04:00
Sean Barag
75823b0e8b Add IMAP provider info for fastmail.fm
Lets K9 automatically configure the IMAP and SMTP ports for fastmail.fm
accounts.
2013-07-11 08:41:19 -04:00
Sander Bogaert
b5a3141fdd Add the new outlook.com domain to our list of preconfigured domains. 2012-10-01 15:07:48 +02:00
ashley willis
2632b39003 updated Yahoo! Mail Variants 2012-05-05 00:21:06 -05:00
Koji Arai
39f2138292 added a Japanese provider "auone.jp" 2012-03-17 23:16:35 +09:00
ashley willis
4db048343f account setup changes:
added gmx.com.
set delete policy to DELETE_POLICY_ON_DELETE for IMAP on automatic setup like manual setup does.
set default names for Archive and Spam on manual config like automatic setup does.
2012-02-16 18:35:25 -06:00
ashley willis
bd700127de added montclair.edu to res/xml/providers.xml based on http://oit.montclair.edu/documentation/msu_apps/email/AndroidPhoneSettingUpYourMSUEmailAccount.pdf 2012-01-23 19:51:30 -06:00
sunglim
eb83cfe1b5 add some Korean providers 2011-05-12 02:57:43 +09:00
Jesse Vincent
a4b62297ef update bestpractical.com and fsck.com provider configs 2011-02-07 22:10:12 -05:00
Andrew Chen
4c6ebef9a8 Use full email addresses as usernames for alternate Yahoo! domains. 2011-01-02 17:20:09 +00:00
Andrew Chen
41cc645f92 Add support for other Yahoo! domains (ymail.com, rocketmail.com) 2011-01-02 09:20:59 +00:00
Koji Arai
884829a2e7 Newly added Japanese 2 providers. 2010-11-20 19:44:06 +00:00
Jesse Vincent
620b6f3907 providers.xml update from Froyo AOSP 2010-11-14 15:20:54 +00:00
Jesse Vincent
845cd2a4da Cleanup our Yahoo provider note 2010-06-08 02:37:09 +00:00
Jesse Vincent
a9283ad435 Improvements to the fsck.com pre-defined mail provider 2009-12-07 00:52:36 +00:00
Jesse Vincent
72ca05e1bd add a test autoconfig provider I can actually test 2009-11-28 04:57:05 +00:00
Brock Tice
9d45b3604e Fixed prefix separator issues. Separators are now pulled from the separator column of folder listings. Also switched the default gmail IMAP server to imap.googlemail.com (from imap.gmail.com). 2008-12-03 04:14:39 +00:00
Jesse Vincent
ffd7766384 Initial commit - This source code should be EXACTLY what the current version of the 'Email' application in the android repo looks like as of this date. 2008-10-28 01:04:44 +00:00