Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    BINKD    |    Support for the Internet BinKD mailer    |    8,958 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 6,483 of 8,958    |
|    Alexey Fayans to Alan Ianson    |
|    BINKP over TLS    |
|    17 Dec 19 15:14:17    |
      MSGID: 2:5030/1997@fidonet 5df8ca80       REPLY: 1:153/757 5df8bb24       CHRS: CP866 2       TZUTC: 0300       TID: FastEcho 1.46.1 43272       Hello Alan!              On Tue, 17 Dec 2019 at 03:11 -0800, you wrote to me:               AI> I'm not going anywhere until I believe, in something. I don't mind        AI> having my beliefs proven to be worthless, in fact I appreciate it if        AI> they are in fact worthless.              Well, like I suggested earlier, you can read about STARTTLS on wikipedia,       where you will find confirmation of my words and more examples of weakness       mitigation, including DNS based (DANE) and MTA-STS (lHSTS for SMTP).               AI>>> That's why STARTTLS has been depricated.        AF>> It's not deprecated globally. Deprecation is only _proposed_ for        AF>> SMTP and other mail protocols and there are reasons for that, but        AF>> that doesn't mean it is deprecated for everything else.        AI> I have only ever used STARTTLS with smtp. If STARTTLS is proposed to        AI> be depricated for smtp I propose we depricate it here too.              There is absolutely no point in deprecating it. There are pros and cons       everywhere. Weak place of STARTTLS is STRIPTLS attack. In FIDONET we have a       nodelist to indicate support of TLS by a node, which mitigates this.               AF>> With STARTTLS none of this is a problem. Additional configuration        AF>> flag to require TLS connection is easy to implement, nodelist        AF>> flag is optional and may be used to tell client to require TLS        AF>> when connecting to supporting node, and additional DNS SRV        AF>> records are not needed as well.        AI> I don't think STARTTLS is going to fly. I really have no strong        AI> feelings for or against STARTTLS, I just don't think that is what        AI> anyone wants today.              I don't see any reasons why not. Any security method can be implemented in a       good or a bad way. If method weakness is taken into account when protocol is       designed, there is no problem with it. STARTTLS failed for SMTP because it was       not implemented in a secure way.                     ... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net       --- GoldED+/W32-MSVC 1.1.5-b20180707        * Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)       SEEN-BY: 1/123 50/109 90/1 103/705 154/10 203/0 221/0 6 227/114 229/101       SEEN-BY: 229/200 354 426 1014 240/5832 249/307 317 280/464 5003 5555       SEEN-BY: 292/854 310/31 342/200 396/45 423/120 451/30 452/166 463/68       SEEN-BY: 469/122 712/848 770/1 2452/250 5000/111 5001/100 5005/49       SEEN-BY: 5015/255 5019/40 42 5020/290 329 715 806 828 846 848 921       SEEN-BY: 5020/1042 1519 2047 2140 4441 12000 5022/128 5023/12 24 5030/1081       SEEN-BY: 5030/1900 1997 5034/13 5053/54 57 58 5054/8 5057/19 5060/900       SEEN-BY: 5064/56 5080/68 102 5083/444       PATH: 5030/1997 5023/24 5020/715 4441 1042 280/5555 464 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca