Subj : Binkd and TLS
To : Richard Menedetter
From : Michiel van der Vlist
Date : Tue Dec 17 2019 04:10 pm
Hello Richard,
On Tuesday December 17 2019 14:31, you wrote to me:
RM> But this does not make it less standard, only less used. You can
RM> import a client certificate into Firefox and other browsers for a long
RM> period of time. And you can use this as a more secure means of
RM> authentication.
OK, "less used" describes it better than "non standard".
RM>>> But naturally then every client needs a signed certificate, and
RM>>> the server needs to verify that client certificate.
MV>> Indeed. And what is the added value of that?
RM> There is potential value. (eg. passwords can be very easy to guess ...
RM> toor, passw0rd, ...)
That is not a shortcoming of the protocol, it is a shortcoming of the user.
RM> client certificates are much more secure than eg. 8 digit passwords.
Binkd session passwords are not limited to 8 characters. I just tried a 25 byte
string and it functions. I say "bytes" because I inserted a cyrillic UTF-8
character. Changing the last byte results in a password error, so all bytes are
used. Case sensitive. I don't know what the limit is, but it is at least 25.
A properly choosen 25 byte string is impossible to guess I'd say. A brute force
attack won't work very well with binkd either. So I don't think that part of
binkd can be considered "weak".
RM> I doubt that that added value is "worth it" in fidonet, where many
RM> people used ancient software, and only a small minority is interested
RM> to roll out new features.
Frankly I see no significant added value at this point. It just adds
overhead...
MV>> Binkp's CRYPT protects against unauthorised listeners on the
MV>> channel. I am not aware of binkp's security being compromised.
RM> I am also not aware of it. But you have to admit that security
RM> researchers have more prestigeous targets then binkd crypt. (So I
RM> assume that it was never really challenged and analyzed.)
Yes, there is that. It was probably never really challenged.
RM> Breaking TLS gains you lots of $$$, so many people try it. (without
RM> any knowledge of then being successful.)
I suspect it is already boken by government agencies. Those are the ones that
have the resources...
MV>> Plus that I still wonder what we are protecting against whom. Do
MV>> we really need 10 cm armour and triple locks to protect Fidonet
MV>> content?
RM> Why not? ;)
RM> Using binkp in a stunnel definitely will not weaken the security.
Not if you do it right. If you do it wrong....
RM> (eg. if you break the stunnel, you still are left with the same binkp
RM> stream that you would have had previously.) And adding a TLS option
RM> for clients that support it, will not be weaker than our existing
RM> crypt implementation.
Unless you use TLS not in addition to but instead of binkp session password and
CRYPT.
RM> So it is doable, and would benefit security from my point of view.
RM> But I do not think many people would use it.
Like I said before, I may give it a try just for the sake of the technical
challenge. I don't consider the added security of such magnitude that I'd start
using it large scale..
RM> The easiest target would be to have a second port where you can make
RM> stunnel connections. (this is not very practicable from my point of
RM> view, outside of PoC) Or the second easiest but more useable target
RM> would be to implement starttls and use it if both parties support it.
RM> (relying on passwords, not client certificates)
The Synchronet fans do not seem to like starttls, they want a diffrent port. So
we alreay have two competing standards...
Cheers, Michiel
--- GoldED+/W32-MSVC 1.1.5-b20170303
* Origin:
http://www.vlist.eu (2:280/5555)