home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   BINKD      Support for the Internet BinKD mailer      8,958 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 6,529 of 8,958   
   Alexey Fayans to Rob Swindell   
   BINKP over TLS   
   21 Dec 19 06:01:38   
   
   MSGID: 2:5030/1997@fidonet 5dfd8f09   
   REPLY: 7267.binkd@1:103/705 226279a5   
   CHRS: CP866 2   
   TZUTC: 0300   
   TID: FastEcho 1.46.1 43272   
   Hello Rob!   
      
   On Fri, 20 Dec 2019 at 11:55 -0800, you wrote to me:   
      
    >> So far you didn't provide a single fact proving that good STARTTLS   
    >> implementation is less secure than TLS on a dedicated port.   
    RS> Opportunistic TLS gives both the client and the server (or a MitM) the   
    RS> ability to "opt-out" of using TLS.   
      
   Depends on implementation. Protocol (binkp) may require to drop connection if   
   TLS negotiation fails with a node that supports TLS according to nodelist.   
      
    RS> With an Implicit TLS session, no such option is availble; the entire   
    RS> TCP session is secure, or it doesn't exist.   
      
   And how is it more secure than above?   
      
    >> Use of self-signed certs without a well-defined and implemented   
    >> mandatory mechanism to verify these certs (either trusted CA or any   
    >> other similar way) just turns whole security talk into a joke.   
    >> Seriously.   
    RS> A less funny joke than Binkd's CRYPT option. Seriously.   
      
   Sure, but did I ever speak about it?   
      
    >>  >> Why not? It is perfectly mitigated and I explained that a few   
    >> times   
    >>  >> already. You gotta stop looking back at old SMTP implementation   
    >>  >> that wasn't designed against active MitM attacks in the first   
    >>  >> place.   
    >>  RS> I look at all the applications of Opportunistic TLS and   
    >> they're all   
    >>  RS> less secure than Implicit TLS.   
    >>   
    >> Examples?   
      
    RS> NNTP, FTP, IRC.   
      
   Sure, all very old designs without security in mind. Also, all of these are   
   just services while FIDONET is an ecosystem and has a nodelist where TLS   
   support can be indicated. That makes a perfect platform for a truly secure   
   STARTTLS implementation.   
      
    >> Maybe you are just looking at bad / not suitable implementations.   
    >> Not all implementations are focused on MitM protection and that is   
    >> fine, similar to use of self-signed certs just to make it a bit   
    >> harder to sniff the traffic.   
    RS> Security is a moving target. If you're going to implement something,   
    RS> as I have with binkps, you shoot for the state of the art, today's   
    RS> best practices, not yesterday's.   
      
   Like I said earlier, there is no universal standard for everything. When you   
   design something, you gotta be smart and understand well what you are doing   
   and why.   
      
    RS> STARTTLS is yesterday's solution   
      
   Nope, only a few not very well designed implementations are `yesterdays   
   solution`.   
      
      
    RS> It would be silly to   
    RS> implement STARTTLS in a newly-defined TCP applictaion protocol today.   
      
   Nope, it will be silly to design a protocol that has no future.   
      
      
   ... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net   
   --- GoldED+/W32-MSVC 1.1.5-b20180707   
    * Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)   
   SEEN-BY: 1/123 50/109 90/1 103/705 154/10 203/0 221/0 6 227/114 229/101   
   SEEN-BY: 229/200 354 426 1014 240/5832 249/307 317 280/464 5003 5555   
   SEEN-BY: 292/854 310/31 342/200 396/45 423/120 451/30 452/166 463/68   
   SEEN-BY: 469/122 712/848 770/1 2452/250 5000/111 5001/100 5005/49   
   SEEN-BY: 5015/255 5019/40 42 5020/290 329 715 806 828 846 848 921   
   SEEN-BY: 5020/1042 1519 2047 2140 4441 12000 5022/128 5023/12 24 5030/1081   
   SEEN-BY: 5030/1900 1997 5034/13 5053/54 57 58 5054/8 5057/19 5060/900   
   SEEN-BY: 5064/56 5080/68 102 5083/444   
   PATH: 5030/1997 5023/24 5020/715 4441 1042 280/5555 464 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca