home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   BINKD      Support for the Internet BinKD mailer      8,958 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 6,519 of 8,958   
   Alexey Fayans to Alan Ianson   
   BINKP over TLS   
   20 Dec 19 15:41:00   
   
   MSGID: 2:5030/1997@fidonet 5dfcc840   
   REPLY: 1:153/757 5dfc0a31   
   CHRS: CP866 2   
   TZUTC: 0300   
   TID: FastEcho 1.46.1 43272   
   Hello Alan!   
      
   On Thu, 19 Dec 2019 at 14:41 -0800, you wrote to me:   
      
    AI>>> I don't think STARTTLS is what we want today.   
    AF>> Why?   
    AI> Because of what I have read others say on the subject. I really have   
    AI> no good idea why it is frowned upon.   
      
   Well, it's not a strong argument you know.   
      
    AI> The first encounter I had with binkps was about a year ago when   
    AI> SSL/TLS was introduced in Mystic. Mystic has oppotunistic SSL/TLS   
    AI> support. It had to be oppotunistic since James knew at the outset   
    AI> there would be mailers in the mix that did not support SSL/TLS. James   
    AI> received a lot of feedback on the subject that implicit TLS was the   
    AI> way to go rather that Opportunistic.   
      
   Yeah, I guess similar to something I read here. Just some criticism of   
   existing imperfect implementations.   
      
    AI> Since then I have looked up the subject. There is a mountain of   
    AI> information on the subject and I have not read it all, but I don't see   
    AI> folks adopting STARTTLS today, only depricating it.   
      
   Any examples of real deprecations? Even if there are, I bet only   
   implementations where client cannot verify if server supports TLS (like   
   initial SMTP implementation) are being deprecated.   
      
    AF>> I only see a proposal to deprecate STARTTLS _implementation_ in   
    AF>> SMTP and other e-mail protocols because obviously implementation   
    AF>> has flaws. If implemented properly, I don't see any reason for   
    AF>> deprecation.   
    AI> The proposal to depricate STARTTLS is enough for me to depricate it. I   
    AI> am relying the the experience of others and best practise today.   
      
   Only existing SMTP implementation is deprecated because it was designed in   
   such a way that client cannot know if server supports TLS.   
      
   It's also a good thing to be smart when relying on the experience of others.   
   You need to understand the reasons why others are making these decisions. And   
   if these reasons are applicable to the topic (they are not).   
      
    AF>> I don't agree. If it will be implemented this way, I can bet it   
    AF>> will be adopted by less than 1% of systems.   
    AI> In discussions I have had, I have recieved only possitive feedback on   
    AI> the idea of implementing binkps with TLS. I will go ahead and   
    AI> implement binkps in my own setup when I can, with nodes who wish it   
    AI> and support it.   
      
   Sure, it will still less than 1% of all nodes.   
      
    AI> I have done this already with Mystic's mailer (Mystic's implementation   
    AI> needs work) and Synchronet's BinkIT mailer. binkps using TLS is a   
    AI> reality today for those using the BinkIT mailer. I have successfully   
    AI> sent and recieved netmail using Synchronet's BinkIT mailer with binkd   
    AI> on the remote side.   
      
   I know that it is not hard from technical side. I can even run both TLS and   
   clear text protocols on the same port via SSLH. What I am talking about is   
   that it requires some actions from every single node to start using binkps.   
   And these actions are way more than simple binary update. Knowing how most   
   people don't like to change configuration I just predict the failure of the   
   protocol because the majority of sysops will simply ignore it.   
      
    AI> BinkIT's mailer uses implicit TLS and is very secure and I would like   
    AI> to be able to do this with binkd as well, since I use binkd on my node   
    AI> 153/757.   
      
   Let's start talking about "very secure" when there will be a mechanism to   
   verify/trust peers' certificates. Right now it's as secure as plain text.   
      
    AI> If binkd could listen on a secure TLS port (24553) and poll nodes   
    AI> listening on a secure port I'm sure it would be widely accepted   
    AI> although I wouldn't guess a pecentage.   
      
   Yeah, the problem is that it won't magically start doing that.   
      
    AI> For a start there is the BinkIT mailer that supports TLS now.   
      
   Great. How many sysops are using it?   
      
    AI> There are other mailers in use also that likely won't be updated   
    AI> (Argus/Irex) but I think the binkd mailer is the most used today   
    AI> looking at my own logs. If binkd supported TLS most nodes could use it   
    AI> if they choose to.   
      
   Have you seen binkd configuration? Currently it is not possible to define a   
   node supporting two protocols specifying ports. And hardcoding TLS port is not   
   an option obviously.   
      
   And if we imagine that node syntax will be changed, binkd nodelist parser(s)   
   will need to be updated as well in order to understand nodelist flag where   
   binkps port is specified (similar to IBN).   
      
    AF>> I am not a true coder, at least, I don't have enough skill/time   
    AF>> to implement any kind of TLS support in binkd. If someone will do   
    AF>> it, I'll be happy to test.   
    AI> I am going to ask some nodes who have done this for advice on how they   
    AI> did it and if I can do it will netmail you my findings and we can do   
    AI> some testing if you would like.   
      
   Sure.   
      
      
   ... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net   
   --- GoldED+/W32-MSVC 1.1.5-b20180707   
    * Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)   
   SEEN-BY: 1/123 50/109 90/1 103/705 154/10 203/0 221/0 6 227/114 229/101   
   SEEN-BY: 229/200 354 426 1014 240/5832 249/307 317 280/464 5003 5555   
   SEEN-BY: 292/854 310/31 342/200 396/45 423/120 451/30 452/166 463/68   
   SEEN-BY: 469/122 712/848 770/1 2452/250 5000/111 5001/100 5005/49   
   SEEN-BY: 5015/255 5019/40 42 5020/290 329 715 806 828 846 848 921   
   SEEN-BY: 5020/1042 1519 2047 2140 4441 12000 5022/128 5023/12 24 5030/1081   
   SEEN-BY: 5030/1900 1997 5034/13 5053/54 57 58 5054/8 5057/19 5060/900   
   SEEN-BY: 5064/56 5080/68 102 5083/444   
   PATH: 5030/1997 5023/24 5020/715 4441 1042 280/5555 464 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca