TIP: Click on subject to list as thread! ANSI
echo: binkd
to: ROB SWINDELL
from: ALEXEY FAYANS
date: 2019-12-20 16:09:00
subject: BINKP over TLS

Hello Rob!

On Thu, 19 Dec 2019 at 15:43 -0800, you wrote to me:

 >> The whole sentence is wrong. CA is required to make sure that the
 >> certificate provided by server was not replaced by an attacker
 >> during MitM attack. With self-signed certificate you can never tell
 >> that you are connecting to the real system, unless you know a CA
 >> pubkey used to sign that self-signed certificate. That's kinda
 >> basic stuff.
 RS> True, if you're concerned about active MitM attacks (not just
 RS> passive-snooping).

Isn't it your main argument against STARTTLS?

 RS> But if you're concerned about active MitM attacks,
 RS> then you don't want to use STARTTLS either.

Why not? It is perfectly mitigated and I explained that a few times already.
You gotta stop looking back at old SMTP implementation that wasn't designed
against active MitM attacks in the first place.


... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net
--- GoldED+/W32-MSVC 1.1.5-b20180707
* Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.