TIP: Click on subject to list as thread! ANSI
echo: ftsc_public
to: ALAN IANSON
from: OLI
date: 2019-11-22 22:44:00
subject: FTSC

Hi Al,

 AI>>> They do, and both mailers work very well with that encryption.
 AI>>> Do mailers that support CRYPT need to negotiate a session and
 AI>>> exchange passwords before the session can be encrypted?

 Ol>> Yes, you need a shared session password. It's also not a
 Ol>> completely encrypted transmission.

 AI> This was a good start at the time it was implemeneted.

Yes and it's easy to implement.

 Ol>> AFAIK it uses opportunistic TLS (like STARTTLS).

 AI> Yes, James said that he used this method as a start because we still
 AI> need to use the current method when encryption is not supported at
 AI> both sides of the link. The idea (when it's possible) is to move away
 AI> from opportunitic TLS.

It sounds like a good idea, but it's not (IMHO). We don't have to repeat the
mistakes that others did 20 years ago. There will always be many mailers that
don't support TLS, which means it never would be possible to move away from
opportunistic encryption (by that logic).

We can just use another default port for binkps. A _binkps._tcp srv record can
point to the TLS port and a nodelist flag with optional hostname and port
parameters can indicate TLS capability.

 AI>>> Would binkp over TLS (or really, any secure method) be a good
 AI>>> thing?

 Ol>> Why wouldn't it? :)

 AI> I can't think of a reason. If we could get something to test we could
 AI> discover what works, what doesn't, and in time a standard method of
 AI> doing this could be established.

We could test direct TLS with binkp today :)


--- GoldED+/LNX 1.1.5-b20180707
* Origin: kakistocracy (2:280/464.47)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.