Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    BINKD    |    Support for the Internet BinKD mailer    |    8,958 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 6,474 of 8,958    |
|    Oli to Alexey Fayans    |
|    BINKP over TLS    |
|    17 Dec 19 08:33:22    |
      REPLY: 2:5030/1997@fidonet 5df82b49       MSGID: 2:280/464.47@fidonet 5df88a07       PID: GED+LNX 1.1.5-b20180707       CHRS: UTF-8 4       TZUTC: 0100       TID: CrashMail II/Linux 1.7        AF>>> No it doesn't. MitM attack can only fool client into thinking        AF>>> that TLS is not supported. But you can require TLS on a client        AF>>> side and it will just disconnect, no harm done.        AI>> I believe it does.               AF> It's not about believing. You can read on wikipedia for example about        AF> MitM and STARTTLS. MitM can fool client into thinking STARTTLS is not        AF> supported. Mitigation is requiring encryption on client side. As        AF> simple as that.              If you already know that the other side supports encryption and you want to       enforce it, you don't need STARTTLS.               AI>> I don't think the binkd developers are going to bring STARTTLS to        AI>> the table but we need to hear from them.               AF> Exactly.              The had plenty of time. binkp is not only used by binkd. Direct TLS works       today with binkd with some helper software.               AF> Synhcronet is not the only software out there. And manual        AF> configuration is not even an option. Globally, (1) a new nodelist flag        AF> is required to indicate support if binkps and its port;              Now we need to stop introducing new nodelist flags?               AF> (2) binkps must be supported on DNS level as well, i.e. _binkps._tcp        AF> SRV records;              not need if you have a nodelist flag. nodelist flag not needed if there is a       _binkps._tcp record.               AF> (3) nodelist parsers must be updated to understand new flag;              Yeah, you should use a nodelist parser that gets updated occasionally.               AF> (4) additional configuration must be introduced in mailers to support        AF> binkps, and for binkd it may be an issue since node records were not        AF> designed for multiple protocols based on different ports.              So software has to be updated in both cases, especially the mailer. You still       can use unencrypted or CRYPTed sessions, if your software doesn't has support       for any new encryption scheme.               AF> With STARTTLS none of this is a problem. Additional configuration flag        AF> to require TLS connection is easy to implement, nodelist flag is        AF> optional and may be used to tell client to require TLS when connecting        AF> to supporting node, and additional DNS SRV records are not needed as        AF> well.              Do we have a proposal for binkp STARTTLS that doesn't leak unencrypted       meta-data?               * Origin: kakistocracy (2:280/464.47)       SEEN-BY: 1/123 90/1 103/705 154/10 203/0 221/0 227/114 229/101 200       SEEN-BY: 229/354 426 1014 240/5832 249/307 317 280/464 5003 5555 292/854       SEEN-BY: 310/31 342/200 396/45 423/120 712/848 770/1 2452/250       PATH: 280/464 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca