Subj : BINKP over TLS
To   : Rob Swindell
From : Alexey Fayans
Date : Fri Dec 20 2019 09:09 pm

Hello Rob!

On Fri, 20 Dec 2019 at 09:56 -0800, you wrote to me:

>> Isn't it your main argument against STARTTLS?
RS> Under no case is Opportunistic TLS (e.g. STARTTLS) as secure as
RS> Implicit TLS.

So far you didn't provide a single fact proving that good STARTTLS
implementation is less secure than TLS on a dedicated port.

RS> Yes, the use of self-signed certs is less secure than
RS> CA-signed certs, but that's a different matter and true for both
RS> Opportunistic and Implicit TLS.

Use of self-signed certs without a well-defined and implemented mandatory
mechanism to verify these certs (either trusted CA or any other similar way)
just turns whole security talk into a joke. Seriously.

>> Why not? It is perfectly mitigated and I explained that a few times
>> already. You gotta stop looking back at old SMTP implementation
>> that wasn't designed against active MitM attacks in the first
>> place.
RS> I look at all the applications of Opportunistic TLS and they're all
RS> less secure than Implicit TLS.

Examples? Maybe you are just looking at bad / not suitable implementations. Not
all implementations are focused on MitM protection and that is fine, similar to
use of self-signed certs just to make it a bit harder to sniff the traffic.


... Music Station BBS | https://bbs.bsrealm.net | telnet://bbs.bsrealm.net
--- GoldED+/W32-MSVC 1.1.5-b20180707
* Origin: Music Station | https://ms.bsrealm.net (2:5030/1997)