> > This can only be fixed by a.) compile nnrpd with SSL or b.) replace nnrpd
> > with a wrapper or alternatives.
> c) run nnrpd from inetd.

This is not possible without the use of a secondary ip address. As i already
said, innd listens on port 119 and will hand over readers to nnrpd. For most
users this won't be a possible solution as they usually don't have a
secondary ip address.

> b is not an interesting solution.

As long as you reject a (having ssl in the default binary) it is the _only_
solution which will enable STARTTLS for most users. 

> To implement a and ditch nnrpd-ssl I would like to see data showing
> that SSL support does not use more memory as long as it's not used

I'm afraid it does.

USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root      8876  0.0  0.4  30648  2276 pts/4    S+   21:48   0:00 - nnrpd-ssl
root      8877  0.0  0.2  22420  1516 pts/3    S+   21:48   0:00 - nnrpd


So what now? Do you really think it is an acceptable solution to ship a
package which does not support a security feature like STARTTLS without
having the user hack it or use a secondary ip address? Why not just use 
/etc/alternatives/nnrpd and have it point to either nnrpd-nossl or 
nnrpd-ssl?

I don't think debian should make it harder than needed to enable encryption.
NNTPS is a way to do it, but putting protocols inside SSL on another port is
nowadays deprecated in favor of TLS upgrade through STARTTLS. We really
should support that.



Regards
Michael

-- 
It's an insane world, but i'm proud to be a part of it. -- Bill Hicks



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to