TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

STARTTLS Considered Harmful

45 点作者 vectorbunny将近 11 年前

10 条评论

spindritf将近 11 年前
<i>Port numbers are a limited resource.</i><p>That&#x27;s actually a pretty good point and I wish more services used SRV records to determine which host and port to use. HTTP 2.0 was a chance to implement it for HTTP but the effort fizzled out after just a handful of comments in 2007 or so.<p>I also like the idea of squeezing other information into DNS, like certificates, gpg keys, why not HSTS-like information too? Say, a TXT record enforcing ssl, no exceptions (ssl=all). But all this hinges on DNSSEC which is very unpopular here.
评论 #8175399 未加载
评论 #8173274 未加载
gioele将近 11 年前
I think people do not understand that the statement &quot;you should always and only use encryption&quot; is seriously flawed when it comes to protocols used by millions of applications.<p>If you are starting a new protocol for a wide audience you cannot just say &quot;encryption is required&quot;. Which encryption protocol will you require? And will you stick with it forever? Even when it will be broken?<p>So you want a bit of forward compatibility and you add a version identifier to wire protocol the or some other form of negotiation. Well done, now you are opening your self to protocol downgrade attacks. You can try to fight this as much as you want, but will always be back to square one: support for non-updated applications: drop them or support them even thou you know there is a security problem in supporting them?<p>All the non-public SMTP servers I have used in the last years require the use of STARTTLS-enabled connections. So they are dropping old clients, but they can do that because they have a tight control over the &quot;environment&quot; (their students, their employers, etc). Others do not have this luxury.
评论 #8172462 未加载
评论 #8172390 未加载
allegory将近 11 年前
Considering every damn SMTP server out there that talks STARTTLS actually just accepts any certificate by default including self-signed ones, isn&#x27;t this entire point moot?<p>It prevents casual attackers watching the wire i.e. network taps but doesn&#x27;t prevent MITM at all as you can just proxy it with another self signed cert and it goes through.<p>I know this because our SMTP gateway does exactly that, transparently with postfix.
评论 #8173155 未加载
评论 #8173126 未加载
leni536将近 11 年前
<i>a poorly-programmed client would fall back to using the protocol without TLS</i><p>This is not a protocol vulnerability though. Poorly written programs cause problems with any protocol.
评论 #8172204 未加载
hadoukenio将近 11 年前
&gt; a poorly-programmed client would fall back to using the protocol without TLS<p>That was the whole point of STARTTLS - to allow a way to start a tunnel but be backwards compatible to older clients.<p>The real problem was that they didn&#x27;t account for MITM attacks.
评论 #8172224 未加载
评论 #8172456 未加载
brongondwana将近 11 年前
We wrote pretty much this years ago at FastMail:<p><a href="https://www.fastmail.fm/help/technical/ssltlsstarttls.html" rel="nofollow">https:&#x2F;&#x2F;www.fastmail.fm&#x2F;help&#x2F;technical&#x2F;ssltlsstarttls.html</a><p>All the downgrade and pre-encryption MITM and complexity arguments are definitely worth repeating though. Straight up SSL is significantly better.
inopinatus将近 11 年前
Opportunistic encryption between endpoints doesn&#x27;t necessarily require STARTTLS. That is merely a current convention. It could change in future, with the development or invention of some new crypto paradigm. Case in point: opportunistic IPSEC. Okay that wasn&#x27;t the answer either, but it is an alternative in principle, albeit not in practice today for global SMTP.<p>Point is, I think it&#x27;s naive and unwise to assume that the crypto upgrade&#x2F;wrapper is and always shall be TLS and then to build this assumption into standards in a manner that isn&#x27;t future compatible. We are due a great many innovations in end-to-end crypto over the next few decades. For example, I&#x27;m hoping that new and interesting uses will be found for DANE. Maybe we can even bring back network-layer opportunistic encryption.
jvdh将近 11 年前
I am still not convinced by the &quot;encrypt all the SMTP traffic&quot; argument. It adds more encrypted traffic, but these mails are still decrypted on the mail servers to inspect them and then to forward them again.<p>Worse still, most mail servers and programs have no checks whatsoever regarding certificates of other mail servers or clients. As long as it is able to crypt and decrypt, it&#x27;s acceptable. If you&#x27;re lucky there is some sensible admin who restricts algorithms.<p>I&#x27;m still worried that this adds too much false sense of security as it is right now.
评论 #8172894 未加载
dtech将近 11 年前
&gt; To mitigate pervasive monitoring, new protocols should have only secure versions.<p>Isn&#x27;t this the direction newer protocols are taking? AFAIK HTTP 2.0 is always encrypted (even if no SSL cert is installed)<p>For the mentioned protocols: most IMAP and SMTP servers (which enable TLS) disregard the IETF and allow TLS-on-connect connections on ports 993 and 465 respectively. If the IETF would (again) standardize this the problem would be reasonably solved.
评论 #8172463 未加载
评论 #8172460 未加载
mcguire将近 11 年前
&quot;Although it&#x27;s trivial for a properly-programmed client to protect against this downgrade attack,...&quot;<p>...that defeats the &quot;use TLS when available&quot; argument.