TIP: Click on subject to list as thread! ANSI
echo: binkd
to: ALEXEY FAYANS
from: OLI
date: 2019-12-17 08:32:00
subject: BINKP over TLS

 AF>>> No it doesn't. MitM attack can only fool client into thinking
 AF>>> that TLS is not supported. But you can require TLS on a client
 AF>>> side and it will just disconnect, no harm done.
 AI>> I believe it does.

 AF> It's not about believing. You can read on wikipedia for example about
 AF> MitM and STARTTLS. MitM can fool client into thinking STARTTLS is not
 AF> supported. Mitigation is requiring encryption on client side. As
 AF> simple as that.

If you already know that the other side supports encryption and you want to
enforce it, you don't need STARTTLS.

 AI>> I don't think the binkd developers are going to bring STARTTLS to
 AI>> the table but we need to hear from them.

 AF> Exactly.

The had plenty of time. binkp is not only used by binkd. Direct TLS works today
with binkd with some helper software.

 AF> Synhcronet is not the only software out there. And manual
 AF> configuration is not even an option. Globally, (1) a new nodelist flag
 AF> is required to indicate support if binkps and its port;

Now we need to stop introducing new nodelist flags?

 AF> (2) binkps must be supported on DNS level as well, i.e. _binkps._tcp
 AF> SRV records;

not need if you have a nodelist flag. nodelist flag not needed if there is a
_binkps._tcp record.

 AF> (3) nodelist parsers must be updated to understand new flag;

Yeah, you should use a nodelist parser that gets updated occasionally.

 AF>  (4) additional configuration must be introduced in mailers to support
 AF> binkps, and for binkd it may be an issue since node records were not
 AF> designed for multiple protocols based on different ports.

So software has to be updated in both cases, especially the mailer. You still
can use unencrypted or CRYPTed sessions, if your software doesn't has support
for any new encryption scheme.

 AF> With STARTTLS none of this is a problem. Additional configuration flag
 AF> to require TLS connection is easy to implement, nodelist flag is
 AF> optional and may be used to tell client to require TLS when connecting
 AF> to supporting node, and additional DNS SRV records are not needed as
 AF> well.

Do we have a proposal for binkp STARTTLS that doesn't leak unencrypted
meta-data?

* Origin: kakistocracy (2:280/464.47)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.