TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

STARTTLS Considered Harmful

45 pointsby vectorbunnyalmost 11 years ago

10 comments

spindritfalmost 11 years ago
<i>Port numbers are a limited resource.</i><p>That&#x27;s actually a pretty good point and I wish more services used SRV records to determine which host and port to use. HTTP 2.0 was a chance to implement it for HTTP but the effort fizzled out after just a handful of comments in 2007 or so.<p>I also like the idea of squeezing other information into DNS, like certificates, gpg keys, why not HSTS-like information too? Say, a TXT record enforcing ssl, no exceptions (ssl=all). But all this hinges on DNSSEC which is very unpopular here.
评论 #8175399 未加载
评论 #8173274 未加载
gioelealmost 11 years ago
I think people do not understand that the statement &quot;you should always and only use encryption&quot; is seriously flawed when it comes to protocols used by millions of applications.<p>If you are starting a new protocol for a wide audience you cannot just say &quot;encryption is required&quot;. Which encryption protocol will you require? And will you stick with it forever? Even when it will be broken?<p>So you want a bit of forward compatibility and you add a version identifier to wire protocol the or some other form of negotiation. Well done, now you are opening your self to protocol downgrade attacks. You can try to fight this as much as you want, but will always be back to square one: support for non-updated applications: drop them or support them even thou you know there is a security problem in supporting them?<p>All the non-public SMTP servers I have used in the last years require the use of STARTTLS-enabled connections. So they are dropping old clients, but they can do that because they have a tight control over the &quot;environment&quot; (their students, their employers, etc). Others do not have this luxury.
评论 #8172462 未加载
评论 #8172390 未加载
allegoryalmost 11 years ago
Considering every damn SMTP server out there that talks STARTTLS actually just accepts any certificate by default including self-signed ones, isn&#x27;t this entire point moot?<p>It prevents casual attackers watching the wire i.e. network taps but doesn&#x27;t prevent MITM at all as you can just proxy it with another self signed cert and it goes through.<p>I know this because our SMTP gateway does exactly that, transparently with postfix.
评论 #8173155 未加载
评论 #8173126 未加载
leni536almost 11 years ago
<i>a poorly-programmed client would fall back to using the protocol without TLS</i><p>This is not a protocol vulnerability though. Poorly written programs cause problems with any protocol.
评论 #8172204 未加载
hadoukenioalmost 11 years ago
&gt; a poorly-programmed client would fall back to using the protocol without TLS<p>That was the whole point of STARTTLS - to allow a way to start a tunnel but be backwards compatible to older clients.<p>The real problem was that they didn&#x27;t account for MITM attacks.
评论 #8172224 未加载
评论 #8172456 未加载
brongondwanaalmost 11 years ago
We wrote pretty much this years ago at FastMail:<p><a href="https://www.fastmail.fm/help/technical/ssltlsstarttls.html" rel="nofollow">https:&#x2F;&#x2F;www.fastmail.fm&#x2F;help&#x2F;technical&#x2F;ssltlsstarttls.html</a><p>All the downgrade and pre-encryption MITM and complexity arguments are definitely worth repeating though. Straight up SSL is significantly better.
inopinatusalmost 11 years ago
Opportunistic encryption between endpoints doesn&#x27;t necessarily require STARTTLS. That is merely a current convention. It could change in future, with the development or invention of some new crypto paradigm. Case in point: opportunistic IPSEC. Okay that wasn&#x27;t the answer either, but it is an alternative in principle, albeit not in practice today for global SMTP.<p>Point is, I think it&#x27;s naive and unwise to assume that the crypto upgrade&#x2F;wrapper is and always shall be TLS and then to build this assumption into standards in a manner that isn&#x27;t future compatible. We are due a great many innovations in end-to-end crypto over the next few decades. For example, I&#x27;m hoping that new and interesting uses will be found for DANE. Maybe we can even bring back network-layer opportunistic encryption.
jvdhalmost 11 years ago
I am still not convinced by the &quot;encrypt all the SMTP traffic&quot; argument. It adds more encrypted traffic, but these mails are still decrypted on the mail servers to inspect them and then to forward them again.<p>Worse still, most mail servers and programs have no checks whatsoever regarding certificates of other mail servers or clients. As long as it is able to crypt and decrypt, it&#x27;s acceptable. If you&#x27;re lucky there is some sensible admin who restricts algorithms.<p>I&#x27;m still worried that this adds too much false sense of security as it is right now.
评论 #8172894 未加载
dtechalmost 11 years ago
&gt; To mitigate pervasive monitoring, new protocols should have only secure versions.<p>Isn&#x27;t this the direction newer protocols are taking? AFAIK HTTP 2.0 is always encrypted (even if no SSL cert is installed)<p>For the mentioned protocols: most IMAP and SMTP servers (which enable TLS) disregard the IETF and allow TLS-on-connect connections on ports 993 and 465 respectively. If the IETF would (again) standardize this the problem would be reasonably solved.
评论 #8172463 未加载
评论 #8172460 未加载
mcguirealmost 11 years ago
&quot;Although it&#x27;s trivial for a properly-programmed client to protect against this downgrade attack,...&quot;<p>...that defeats the &quot;use TLS when available&quot; argument.