home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   BINKD      Support for the Internet BinKD mailer      8,958 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 6,523 of 8,958   
   Rob Swindell to Alexey Fayans   
   BINKP over TLS   
   20 Dec 19 11:55:46   
   
   TZUTC: -0800   
   MSGID: 7267.binkd@1:103/705 226279a5   
   REPLY: 2:5030/1997@fidonet 5dfd11a6   
   PID: Synchronet 3.17c-Linux  Dec 12 2019 GCC 6.3.0   
   TID: SBBSecho 3.10-Linux r3.148 Dec 12 2019 GCC 6.3.0   
   COLS: 80   
   CHRS: CP437 2   
   NOTE: FSEditor.js v1.103   
     Re: BINKP over TLS   
     By: Alexey Fayans to Rob Swindell on Fri Dec 20 2019 09:09 pm   
      
    > Hello Rob!   
    >   
    > On Fri, 20 Dec 2019 at 09:56 -0800, you wrote to me:   
    >   
    >  >> Isn't it your main argument against STARTTLS?   
    >  RS> Under no case is Opportunistic TLS (e.g. STARTTLS) as secure as   
    >  RS> Implicit TLS.   
    >   
    > So far you didn't provide a single fact proving that good STARTTLS   
    > implementation is less secure than TLS on a dedicated port.   
      
   Opportunistic TLS gives both the client and the server (or a MitM) the ability   
   to "opt-out" of using TLS. With an Implicit TLS session, no such option is   
   availble; the entire TCP session is secure, or it doesn't exist.   
      
    >  RS> Yes, the use of self-signed certs is less secure than   
    >  RS> CA-signed certs, but that's a different matter and true for both   
    >  RS> Opportunistic and Implicit TLS.   
    >   
    > Use of self-signed certs without a well-defined and implemented mandatory   
    > mechanism to verify these certs (either trusted CA or any other similar way)   
    > just turns whole security talk into a joke. Seriously.   
      
   A less funny joke than Binkd's CRYPT option. Seriously.   
      
    >  >> Why not? It is perfectly mitigated and I explained that a few times   
    >  >> already. You gotta stop looking back at old SMTP implementation   
    >  >> that wasn't designed against active MitM attacks in the first   
    >  >> place.   
    >  RS> I look at all the applications of Opportunistic TLS and they're all   
    >  RS> less secure than Implicit TLS.   
    >   
    > Examples?   
      
   NNTP, FTP, IRC.   
      
    > Maybe you are just looking at bad / not suitable implementations.   
    > Not all implementations are focused on MitM protection and that is fine,   
    > similar to use of self-signed certs just to make it a bit harder to sniff   
    > the traffic.   
      
   Security is a moving target. If you're going to implement something, as I have   
   with binkps, you shoot for the state of the art, today's best practices, not   
   yesterday's. STARTTLS is yesterday's solution to TCP session security and is   
   being phased-out. It would be silly to implement STARTTLS in a newly-defined   
   TCP applictaion protocol today.   
      
                                               digital man   
      
   Synchronet/BBS Terminology Definition #35:   
   HTTP = Hypertext Transfer Protocol   
   Norco, CA WX: 71.9øF, 20.0% humidity, 1 mph W wind, 0.00 inches rain/24hrs   
   --- SBBSecho 3.10-Linux   
    * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)   
   SEEN-BY: 1/123 90/1 103/705 154/10 203/0 218/700 221/0 227/114 229/101   
   SEEN-BY: 229/200 354 426 1014 240/5832 249/307 317 280/464 5003 5555   
   SEEN-BY: 292/854 310/31 342/200 396/45 423/120 712/848 770/1 2452/250   
   PATH: 103/705 280/464 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca