Subj : Mironet
To   : Alan Ianson
From : Oli
Date : Sat Feb 11 2023 06:50 pm

Alan wrote (2023-02-11):

>>> ? 11 Feb 00:00:36 [78274] Warning: remote set UNSECURE session
>>> + 11 Feb 00:00:36 [78274] pwd protected session (MD5)

>> This means your system is sending a session password, but the remote
>> session has no password set for incoming connections and returns M_OK
>> 'non-secure', which gets logged as "Warning: remote set UNSECURE
>> session". (a wrong password should return an error)

>> It is not a password protected or encrypted session, even if binkd
>> tells you so. It is a security flaw of binkd though.

AI> Is that a misconfiguration at the remote end, there is no (or an
AI> incorrect) password set?

See http://ftsc.org/docs/fts-1026.001

 * M_OK "non-secure"
   report to remote about normal password unprotected
   session; usually used for empty password;

I think an incorrect password should return an M_ERR and close the connection.

But it depends on the server. A man in the middle, a compromised server or a weird implementation could just ignore the password and send back M_OK "secure".

AI> Binkd should not log "pwd protected session (MD5)" in that case.

I always use the -md option (require CRAM-MD5) for the node and check for CRYPT in the perl hook script. A CRYPT session works only if both parties use the same password.

---
* Origin: War is Peace. Freedom is Slavery. Ignorance is Strength. (2:280/464.47)