Re: BINKP over TLS
By: Alexey Fayans to Rob Swindell on Fri Dec 20 2019 04:12 pm
> Hello Rob!
>
> On Thu, 19 Dec 2019 at 15:43 -0800, you wrote to me:
>
> >> The whole sentence is wrong. CA is required to make sure that the
> >> certificate provided by server was not replaced by an attacker
> >> during MitM attack. With self-signed certificate you can never tell
> >> that you are connecting to the real system, unless you know a CA
> >> pubkey used to sign that self-signed certificate. That's kinda
> >> basic stuff.
> RS> True, if you're concerned about active MitM attacks (not just
> RS> passive-snooping).
>
> Isn't it your main argument against STARTTLS?
Under no case is Opportunistic TLS (e.g. STARTTLS) as secure as Implicit TLS.
Yes, the use of self-signed certs is less secure than CA-signed certs, but
that's a different matter and true for both Opportunistic and Implicit TLS.
> RS> But if you're concerned about active MitM attacks,
> RS> then you don't want to use STARTTLS either.
>
> Why not? It is perfectly mitigated and I explained that a few times already.
> You gotta stop looking back at old SMTP implementation that wasn't designed
> against active MitM attacks in the first place.
I look at all the applications of Opportunistic TLS and they're all less secure
than Implicit TLS.
digital man
Synchronet/BBS Terminology Definition #73:
TCP = Transmission Control Protocol
Norco, CA WX: 66.7øF, 22.0% humidity, 3 mph WSW wind, 0.00 inches rain/24hrs
--- SBBSecho 3.10-Linux
* Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)
|