home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   BINKD      Support for the Internet BinKD mailer      8,958 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 6,490 of 8,958   
   Michiel van der Vlist to Richard Menedetter   
   Binkd and TLS   
   17 Dec 19 16:10:47   
   
   TID: FMail-W32 2.1.3.7-B20170919   
   RFC-X-No-Archive: Yes   
   TZUTC: 0100   
   CHRS: CP850 2   
   MSGID: 2:280/5555 5df8f26b   
   REPLY: 2:310/31 5df8dd29   
   Hello Richard,   
      
   On Tuesday December 17 2019 14:31, you wrote to me:   
      
    RM> But this does not make it less standard, only less used. You can   
    RM> import a client certificate into Firefox and other browsers for a long   
    RM> period of time. And you can use this as a more secure means of   
    RM> authentication.   
      
   OK, "less used" describes it better than "non standard".   
      
    RM>>> But naturally then every client needs a signed certificate, and   
    RM>>> the server needs to verify that client certificate.   
      
    MV>> Indeed. And what is the added value of that?   
      
    RM> There is potential value. (eg. passwords can be very easy to guess ...   
    RM> toor, passw0rd, ...)   
      
   That is not a shortcoming of the protocol, it is a shortcoming of the user.   
      
    RM> client certificates are much more secure than eg. 8 digit passwords.   
      
   Binkd session passwords are not limited to 8 characters. I just tried a 25   
   byte string and it functions. I say "bytes" because I inserted a cyrillic   
   UTF-8 character. Changing the last byte results in a password error, so all   
   bytes are used. Case sensitive. I don't know what the limit is, but it is at   
   least 25.   
      
   A properly choosen 25 byte string is impossible to guess I'd say. A brute   
   force attack won't work very well with binkd either. So I don't think that   
   part of binkd can be considered "weak".   
      
    RM> I doubt that that added value is "worth it" in fidonet, where many   
    RM> people used ancient software, and only a small minority is interested   
    RM> to roll out new features.   
      
   Frankly I see no significant added value at this point. It just adds   
   overhead...   
      
    MV>> Binkp's CRYPT protects against unauthorised listeners on the   
    MV>> channel. I am not aware of binkp's security being compromised.   
      
    RM> I am also not aware of it. But you have to admit that security   
    RM> researchers have more prestigeous targets then binkd crypt. (So I   
    RM> assume that it was never really challenged and analyzed.)   
      
   Yes, there is that. It was probably never really challenged.   
      
    RM> Breaking TLS gains you lots of $$$, so many people try it. (without   
    RM> any knowledge of then being successful.)   
      
   I suspect it is already boken by government agencies. Those are the ones that   
   have the resources...   
      
    MV>> Plus that I still wonder what we are protecting against whom. Do   
    MV>> we really need 10 cm armour and triple locks to protect Fidonet   
    MV>> content?   
      
    RM> Why not? ;)   
    RM> Using binkp in a stunnel definitely will not weaken the security.   
      
   Not if you do it right. If you do it wrong....   
      
    RM> (eg. if you break the stunnel, you still are left with the same binkp   
    RM> stream that you would have had previously.) And adding a TLS option   
    RM> for clients that support it, will not be weaker than our existing   
    RM> crypt implementation.   
      
   Unless you use TLS not in addition to but instead of binkp session password   
   and CRYPT.   
      
    RM> So it is doable, and would benefit security from my point of view.   
    RM> But I do not think many people would use it.   
      
   Like I said before, I may give it a try just for the sake of the technical   
   challenge. I don't consider the added security of such magnitude that I'd   
   start using it large scale..   
      
    RM> The easiest target would be to have a second port where you can make   
    RM> stunnel connections. (this is not very practicable from my point of   
    RM> view, outside of PoC) Or the second easiest but more useable target   
    RM> would be to implement starttls and use it if both parties support it.   
    RM> (relying on passwords, not client certificates)   
      
   The Synchronet fans do not seem to like starttls, they want a diffrent port.   
   So we alreay have two competing standards...   
      
      
   Cheers, Michiel   
      
   --- GoldED+/W32-MSVC 1.1.5-b20170303   
    * Origin: http://www.vlist.eu (2:280/5555)   
   SEEN-BY: 1/123 90/1 103/705 154/10 203/0 221/0 6 227/114 229/101 200   
   SEEN-BY: 229/354 426 1014 240/5832 249/307 317 280/464 5003 5555 292/854   
   SEEN-BY: 310/31 342/200 396/45 423/120 712/848 770/1 2452/250 5019/40   
   SEEN-BY: 5020/1042 5053/58   
   PATH: 280/5555 464 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca