Hello Rob!
On Fri, 20 Dec 2019 at 11:55 -0800, you wrote to me:
>> So far you didn't provide a single fact proving that good STARTTLS
>> implementation is less secure than TLS on a dedicated port.
RS> Opportunistic TLS gives both the client and the server (or a MitM) the
RS> ability to "opt-out" of using TLS.
Depends on implementation. Protocol (binkp) may require to drop connection if
TLS negotiation fails with a node that supports TLS according to nodelist.
RS> With an Implicit TLS session, no such option is availble; the entire
RS> TCP session is secure, or it doesn't exist.
And how is it more secure than above?
>> Use of self-signed certs without a well-defined and implemented
>> mandatory mechanism to verify these certs (either trusted CA or any
>> other similar way) just turns whole security talk into a joke.
>> Seriously.
RS> A less funny joke than Binkd's CRYPT option. Seriously.
Sure, but did I ever speak about it?
>> >> Why not? It is perfectly mitigated and I explained that a few
>> times
>> >> already. You gotta stop looking back at old SMTP implementation
>> >> that wasn't designed against active MitM attacks in the first
>> >> place.
>> RS> I look at all the applications of Opportunistic TLS and
>> they're all
>> RS> less secure than Implicit TLS.
>>
>> Examples?
RS> NNTP, FTP, IRC.
Sure, all very old designs without security in mind. Also, all of these are
just services while FIDONET is an ecosystem and has a nodelist where TLS
support can be indicated. That makes a perfect platform for a truly secure
STARTTLS implementation.
>> Maybe you are just looking at bad / not suitable implementations.
>> Not all implementations are focused on MitM protection and that is
>> fine, similar to use of self-signed certs just to make it a bit
>> harder to sniff the traffic.
RS> Security is a moving target. If you're going to implement something,
RS> as I have with binkps, you shoot for the state of the art, today's
RS> best practices, not yesterday's.
Like I said earlier, there is no universal standard for everything. When you
design something, you gotta be smart and understand well what you are doing and
why.
RS> STARTTLS is yesterday's solution
Nope, only a few not very well designed implementations are `yesterdays
solution`.
RS> It would be silly to
RS> implement STARTTLS in a newly-defined TCP applictaion protocol today.
Nope, it will be silly to design a protocol that has no future.
... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net
--- GoldED+/W32-MSVC 1.1.5-b20180707
* Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)
|