TIP: Click on subject to list as thread! ANSI
echo: binkd
to: ROB SWINDELL
from: ALEXEY FAYANS
date: 2019-12-21 05:58:00
subject: BINKP over TLS

Hello Rob!

On Fri, 20 Dec 2019 at 11:55 -0800, you wrote to me:

 >> So far you didn't provide a single fact proving that good STARTTLS
 >> implementation is less secure than TLS on a dedicated port.
 RS> Opportunistic TLS gives both the client and the server (or a MitM) the
 RS> ability to "opt-out" of using TLS.

Depends on implementation. Protocol (binkp) may require to drop connection if
TLS negotiation fails with a node that supports TLS according to nodelist.

 RS> With an Implicit TLS session, no such option is availble; the entire
 RS> TCP session is secure, or it doesn't exist.

And how is it more secure than above?

 >> Use of self-signed certs without a well-defined and implemented
 >> mandatory mechanism to verify these certs (either trusted CA or any
 >> other similar way) just turns whole security talk into a joke.
 >> Seriously.
 RS> A less funny joke than Binkd's CRYPT option. Seriously.

Sure, but did I ever speak about it?

 >>  >> Why not? It is perfectly mitigated and I explained that a few
 >> times
 >>  >> already. You gotta stop looking back at old SMTP implementation
 >>  >> that wasn't designed against active MitM attacks in the first
 >>  >> place.
 >>  RS> I look at all the applications of Opportunistic TLS and
 >> they're all
 >>  RS> less secure than Implicit TLS.
 >>
 >> Examples?

 RS> NNTP, FTP, IRC.

Sure, all very old designs without security in mind. Also, all of these are
just services while FIDONET is an ecosystem and has a nodelist where TLS
support can be indicated. That makes a perfect platform for a truly secure
STARTTLS implementation.

 >> Maybe you are just looking at bad / not suitable implementations.
 >> Not all implementations are focused on MitM protection and that is
 >> fine, similar to use of self-signed certs just to make it a bit
 >> harder to sniff the traffic.
 RS> Security is a moving target. If you're going to implement something,
 RS> as I have with binkps, you shoot for the state of the art, today's
 RS> best practices, not yesterday's.

Like I said earlier, there is no universal standard for everything. When you
design something, you gotta be smart and understand well what you are doing and
why.

 RS> STARTTLS is yesterday's solution

Nope, only a few not very well designed implementations are `yesterdays
solution`.


 RS> It would be silly to
 RS> implement STARTTLS in a newly-defined TCP applictaion protocol today.

Nope, it will be silly to design a protocol that has no future.


... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net
--- GoldED+/W32-MSVC 1.1.5-b20180707
* Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.