Hello Oli!
On Tue, 17 Dec 2019 at 08:33 +0100, you wrote to me:
AF>> It's not about believing. You can read on wikipedia for example
AF>> about MitM and STARTTLS. MitM can fool client into thinking
AF>> STARTTLS is not supported. Mitigation is requiring encryption on
AF>> client side. As simple as that.
Ol> If you already know that the other side supports encryption and you
Ol> want to enforce it, you don't need STARTTLS.
STARTTLS is needed to run TLS on the same port, and I already explained why it
is essential to run it on the same port.
AI>>> I don't think the binkd developers are going to bring STARTTLS
AI>>> to the table but we need to hear from them.
AF>> Exactly.
Ol> The had plenty of time. binkp is not only used by binkd. Direct TLS
Ol> works today with binkd with some helper software.
This implementation is a proof of concept, but obviously will not be adopted by
most sysops. And what is the point in security when no-one uses it?
AF>> Synhcronet is not the only software out there. And manual
AF>> configuration is not even an option. Globally, (1) a new nodelist
AF>> flag is required to indicate support if binkps and its port;
Ol> Now we need to stop introducing new nodelist flags?
I didn't say that.
AF>> (2) binkps must be supported on DNS level as well, i.e.
AF>> _binkps._tcp SRV records;
Ol> not need if you have a nodelist flag. nodelist flag not needed if
Ol> there is a _binkps._tcp record.
That is not true. Some mailers do not support nodelists and rely on DNS. For
example, binkd.
AF>> (3) nodelist parsers must be updated to understand new flag;
Ol> Yeah, you should use a nodelist parser that gets updated occasionally.
Sure. But if something can be done without requiring updates to software, it
should be done this way. Less requirements means better adoption.
AF>> (4) additional configuration must be introduced in mailers to
AF>> support binkps, and for binkd it may be an issue since node
AF>> records were not designed for multiple protocols based on
AF>> different ports.
Ol> So software has to be updated in both cases, especially the mailer.
Yes, the difference is how big are the updates and how much software will need
to be updated.
Ol> You still can use unencrypted or CRYPTed sessions, if your software
Ol> doesn't has support for any new encryption scheme.
Of course. And I am sure that most sysops will not move to dedicated TLS port
because of the complexity. Why designing something that will not be adopted -
that is the big question.
AF>> With STARTTLS none of this is a problem. Additional configuration
AF>> flag to require TLS connection is easy to implement, nodelist
AF>> flag is optional and may be used to tell client to require TLS
AF>> when connecting to supporting node, and additional DNS SRV
AF>> records are not needed as well.
Ol> Do we have a proposal for binkp STARTTLS that doesn't leak unencrypted
Ol> meta-data?
Client can initiate STARTTLS right away. Server can wait for STARTTLS handshake
a few seconds before starting unencrypted session (this will probably introduce
a few seconds delay with older mailers). Just an example. Probably developers
can think of a better way.
... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net
--- GoldED+/W32-MSVC 1.1.5-b20180707
* Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)
|