Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    BINKD    |    Support for the Internet BinKD mailer    |    8,958 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 6,514 of 8,958    |
|    Alexey Fayans to Rob Swindell    |
|    BINKP over TLS    |
|    20 Dec 19 01:24:52    |
      MSGID: 2:5030/1997@fidonet 5dfbf8b7       REPLY: 7252.binkd@1:103/705 226054d9       CHRS: CP866 2       TZUTC: 0300       TID: FastEcho 1.46.1 43272       Hello Rob!              On Wed, 18 Dec 2019 at 20:54 -0800, you wrote to me:               RS> binkps requires no protocol change, therefore will be adopted way        RS> faster.              Explain, how can something that requires manual configuration changes be       adopted way faster than something that doesn't, if at all?               >> 1.2. Can work out of the box without additional configuration.        RS> Not sure what "box" you're referring to, but there's currently no        RS> BinkP mailers that support STARTTLS, so how could you possibly know        RS> what configuration will be needed?              I mean that STARTTLS-enabled mailers will continue to connect with older       versions and vice versa, and once both sides support STARTTLS, it will start       working without any additional actions or configuration changes.               >> 1.3. Requires significantly less software modified.        RS> I actually implemented binkps is less than an 30 minutes.              I already explained what I mean. Not a protocol implementation on a single       node, but whole infrastructure to make it all work on all nodes.              Or in other words, why my binkp still not using TLS when connecting to your       node? Do you get what I mean?               >> 1.4. Not less secure than TLS on a dedicated port because it is        >> possible to announce TLS support via nodelist.        RS> STARTTLS is well known to be less secure than Implicit TLS:        RS> https://www.agwa.name/blog/post/starttls_considered_harmful              I already said a few times that this and other articles criticize existing       implementations flaws. I will say that again. If designed properly, it will be       as secure as TLS on a dedicated port, just more flexible. And FIDONET       ecosystem allows that.               >> 2. For any kind of TLS something must be decided on certificate        >> authority.        RS> Nope. Self-signed certificates provide privacy via TLS just fine.        RS> A CA is only needed if you're going to use TLS for trust. If you're        RS> only using TLS for privacy, then a CA-signed certificate is not        RS> needed.              The whole sentence is wrong. CA is required to make sure that the certificate       provided by server was not replaced by an attacker during MitM attack. With       self-signed certificate you can never tell that you are connecting to the real       system, unless you know a CA pubkey used to sign that self-signed certificate.       That's kinda basic stuff.                     ... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net       --- GoldED+/W32-MSVC 1.1.5-b20180707        * Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)       SEEN-BY: 1/123 50/109 90/1 103/705 154/10 203/0 221/0 6 227/114 229/101       SEEN-BY: 229/200 354 426 1014 240/5832 249/307 317 280/464 5003 5555       SEEN-BY: 292/854 310/31 342/200 396/45 423/120 451/30 452/166 463/68       SEEN-BY: 469/122 712/848 770/1 2452/250 5000/111 5001/100 5005/49       SEEN-BY: 5015/255 5019/40 42 5020/290 329 715 806 828 846 848 921       SEEN-BY: 5020/1042 1519 2047 2140 4441 12000 5022/128 5023/12 24 5030/1081       SEEN-BY: 5030/1900 1997 5034/13 5053/54 57 58 5054/8 5057/19 5060/900       SEEN-BY: 5064/56 5080/68 102 5083/444       PATH: 5030/1997 5023/24 5020/715 4441 1042 280/5555 464 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca