TIP: Click on subject to list as thread! ANSI
echo: binkd
to: ALEXEY FAYANS
from: ROB SWINDELL
date: 2019-12-20 10:04:00
subject: BINKP over TLS

  Re: BINKP over TLS
  By: Alexey Fayans to Rob Swindell on Fri Dec 20 2019 04:12 pm

 > Hello Rob!
 >
 > On Thu, 19 Dec 2019 at 15:43 -0800, you wrote to me:
 >
 >  >> The whole sentence is wrong. CA is required to make sure that the
 >  >> certificate provided by server was not replaced by an attacker
 >  >> during MitM attack. With self-signed certificate you can never tell
 >  >> that you are connecting to the real system, unless you know a CA
 >  >> pubkey used to sign that self-signed certificate. That's kinda
 >  >> basic stuff.
 >  RS> True, if you're concerned about active MitM attacks (not just
 >  RS> passive-snooping).
 >
 > Isn't it your main argument against STARTTLS?

Under no case is Opportunistic TLS (e.g. STARTTLS) as secure as Implicit TLS.
Yes, the use of self-signed certs is less secure than CA-signed certs, but
that's a different matter and true for both Opportunistic and Implicit TLS.

 >  RS> But if you're concerned about active MitM attacks,
 >  RS> then you don't want to use STARTTLS either.
 >
 > Why not? It is perfectly mitigated and I explained that a few times already.
 > You gotta stop looking back at old SMTP implementation that wasn't designed
 > against active MitM attacks in the first place.

I look at all the applications of Opportunistic TLS and they're all less secure
than Implicit TLS.

                                            digital man

Synchronet/BBS Terminology Definition #73:
TCP = Transmission Control Protocol
Norco, CA WX: 66.7øF, 22.0% humidity, 3 mph WSW wind, 0.00 inches rain/24hrs
--- SBBSecho 3.10-Linux
* Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.