AF>>> No it doesn't. MitM attack can only fool client into thinking
AF>>> that TLS is not supported. But you can require TLS on a client
AF>>> side and it will just disconnect, no harm done.
AI>> I believe it does.
AF> It's not about believing. You can read on wikipedia for example about
AF> MitM and STARTTLS. MitM can fool client into thinking STARTTLS is not
AF> supported. Mitigation is requiring encryption on client side. As
AF> simple as that.
If you already know that the other side supports encryption and you want to
enforce it, you don't need STARTTLS.
AI>> I don't think the binkd developers are going to bring STARTTLS to
AI>> the table but we need to hear from them.
AF> Exactly.
The had plenty of time. binkp is not only used by binkd. Direct TLS works today
with binkd with some helper software.
AF> Synhcronet is not the only software out there. And manual
AF> configuration is not even an option. Globally, (1) a new nodelist flag
AF> is required to indicate support if binkps and its port;
Now we need to stop introducing new nodelist flags?
AF> (2) binkps must be supported on DNS level as well, i.e. _binkps._tcp
AF> SRV records;
not need if you have a nodelist flag. nodelist flag not needed if there is a
_binkps._tcp record.
AF> (3) nodelist parsers must be updated to understand new flag;
Yeah, you should use a nodelist parser that gets updated occasionally.
AF> (4) additional configuration must be introduced in mailers to support
AF> binkps, and for binkd it may be an issue since node records were not
AF> designed for multiple protocols based on different ports.
So software has to be updated in both cases, especially the mailer. You still
can use unencrypted or CRYPTed sessions, if your software doesn't has support
for any new encryption scheme.
AF> With STARTTLS none of this is a problem. Additional configuration flag
AF> to require TLS connection is easy to implement, nodelist flag is
AF> optional and may be used to tell client to require TLS when connecting
AF> to supporting node, and additional DNS SRV records are not needed as
AF> well.
Do we have a proposal for binkp STARTTLS that doesn't leak unencrypted
meta-data?
* Origin: kakistocracy (2:280/464.47)
|