Re: The Bat! choosing authentication method

2003-01-02 Thread Peter Palmreuther
Hi CEEJOE,

First let me please you to _NOT_ CC me when replying to a mail of mine
on this list.
I am, as everybody else who writes to this list, subscribed here and do
get all the mail via this list. I don't need a private carbon copy.
Second I want to ask why you do change the subject in such a strange
manner? Neither the square brackets are useful to keep an overview, nor
does any arbitrary time appended to the subject make any sence to me. Is
there a special reason why we should have an eye on this time?

On Thu, 2 Jan 2003 04:08:06 +
CEEJOE <[EMAIL PROTECTED]> wrote:

> A  lot of theory.

That's the basics of e-mail working in practice.

> However, TheBat cant handle secure IMAP4/secure
> POP3  connections flawlessly

It can handle SSL-secured POP3 and SMTP connections.
With some SSL versions on server side there still are problems, but in
general The Bat! can handle SSL for SMTP and POP3.
The only thing it still ain't capable to do is: IMAP-over-SSL.

> That's what counts to me.

AFAIR this thread wasn't about "what counts to you", neither was my
response. My mail was about "what authentication and security mechanism
are present in The Bat! and how are they chosen to be used".
If you don't like The Bat! not fully supporting some functions you'd
need that's a different story. _I_ just wanted to clear the confusion
about CRAM-MD5 vs. SSL.

> In fact, I am not sure whether they will ever waste their time again
> on this matter.

If even _you_ call this "waste of time" they surely will not.
If IMAP and IMAP-over-SSL are implemented and working (according to what
Beta-testers and daily use brings to daylight) they wouldn't "waste"
time, IMHO ...

> TB  is  still  the  best  mailer  I have ever seen. It is (IMO) a
> result  of  brilliant  programmers - but hey, 

> we need this secure thing to fly flawlessly: just "click here to
> exchange certificates" and all is done "automatically".

There's a big difference between "SSL working flawless" and
"automatition of certificate exchange".
The former statement is correct: it _has_ to work flawless, _absolutely_
flawless. Into this category belongs the fixing of "unable to connect"
errors that are coused by a specific SSL-version on server side (which
works with every other MUA).
The latter postulation can open a big security hole if not handled
carefully. These "Click here once and everything is done automatically"
buttons are always possible intruders of security issues.
I don't even know how to "exchange certificates" could be done, but the
whole certificate problem has a two step solution:

Step one requires RITLabs to provide a generic interface for an
institution / system administrator to add a "Trusted Root CA" to the
appropriate AB automatically.
Either by being able to put the "Trusted Root CA" AB on a server for
a central administrator being able to modify it (and _only_ the admin
being able to do so) and import an own Root-certificate into this AB; or
by providing an automatic "post installation import" of a "Trusted Root
Certificate" into this AB. This could, just for being sure, expanded to
"Trusted Intermediate CA" AB. No user would have problems anymore
connecting to a server using a certificate signed by this Root
certficate or any derived intermediate certificate.

Step two would be to introduce a new dialog box: 

,-[ ]
| "Accept this self signed certificate?"
|
| Fingerprint: XXX
| Please compare the fingerprint with information the servers
| administrator provided to the used certificate to make sure this is
| the correct server
|
| [ ] Always accept (import to "Trusted Root CA")
|  
`-

Which pops up if a connection is established and the used certificate is
a self singed not yet in "Trusted Root CA" AB.
 could reveal more details about the certificate for the user
being able to compare this with information provided e.g. on a web site,
to make sure there's no "man in the middle" attack.

All this are semi-automatic solutions, but from a "Security POV" this
should be preferred over one of these "Click here once to do it all
without you even knowing _what_ is done" buttons.

But all this stuff wasn't topic of this thread and therefore should be
discussed in a different one. Even better it should be discussed on
TBTECH or TBBETA, it's nothing that's yet implemented and therefore
these basic discussion of possible solutions is not a problem of "The
Bat! Users" but a "How to improve future use?" problem.

> [Original message, 31/12/2002, 21:39]
> 
> Peter Palmreuther <[EMAIL PROTECTED]> wrote:
> 
> PP> 1.)  The Bat! uses the authentication method it is configured
> PP> to  us ...

Three quesions still left:

1.) Why did you quote this paragraph of my mail? I can't see the
correlation to your response.
2.) Why did you quote if _below_ your response? If you refer to it in
your post it's more wise to quote it at top, if you don't refer to
it it should be left out to avoid confusion

RE:[The Bat! choosing authentication method (was: emptysubject)][02/01/2003-3:55 GMT]

2003-01-01 Thread CEEJOE
A  lot of theory. However, TheBat cant handle secure IMAP4/secure
POP3  connections flawlessly (as Outlook and Netscape do). That's
what  counts  to  me. I still have to use another mailer (which I
really  dislike)  to  handle  my university account from home and
within  campus  (because  TB  wont handle this IMAP thing until v
2.).

I  have  read all of the IMAP related archives. Nothing works and
this  issue  is  very  important  both  for  our functionality in
mailing+security matters *and* the success of TheBat (everyone is
going IMAP+secure).

This  is  one story: I recommended TB to the top 2 system guys to
find  out  it  couldnt  connect  to the IMAP4 server ... it was a
shame.  And  they  left the program aside like a potato chips bag
when  it  is empty. In fact, I am not sure whether they will ever
waste their time again on this matter.

TB  is  still  the  best  mailer  I have ever seen. It is (IMO) a
result  of  brilliant  programmers - but hey, we need this secure
thing   to   fly   flawlessly:   just  "click  here  to  exchange
certificates"  and  all  is  done  "automatically". This thing of
going  to  IE,  exporting/importing  certificates,  etc. cannt be
handled  by  90% of the academic users. And nobody has an army of
system  guys  to  go  around  "n"  users desks to configure this.
That's  why  Netscape  and  Outlook are selected for this matters
(while they are much worse mailers).

Cheers,


[EMAIL PROTECTED]  [Ø©Eªnº - þªT®iª - NØsT®ª]

Las Palmas, Canary Islands [02/01/2003, 3:55 GMT]


Using The Bat! v1.62 Christmas Edition on Windows 2000 5.0 Build  2195
Service Pack 3

  

[Original message, 31/12/2002, 21:39]

Peter Palmreuther <[EMAIL PROTECTED]> wrote:

PP> 1.)  The Bat! uses the authentication method it is configured
PP> to  us ...




Current version is 1.62 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html



Re: The Bat! choosing authentication method (was: empty subject)

2002-12-31 Thread Greg Strong
Hello Peter,

On Tue, 31 Dec 2002, at 22:39:28 GMT +0100 (12/31/2002, 3:39 PM -0500
GMT here), you wrote in
<[EMAIL PROTECTED]">mid:[EMAIL PROTECTED]>:

PP> Hope this sorts the whole stuff out a little bit

Good explanation, thanks!

PP> "Happy new year" to all list members and all they know :-)

Happy new year to you as well.

-- 
Best regards,

Greg Strong 
TB! v1.62 Beta/17 on Windows XP Service Pack 1
PGP public keys:
mailto:[EMAIL PROTECTED]?subject=0xB1FE63FA&Body=Please20send20keys



Current version is 1.62 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html



The Bat! choosing authentication method (was: empty subject)

2002-12-31 Thread Peter Palmreuther
Hello CEEJOE,

On Tuesday, December 31, 2002 at 5:14:29 PM you [C] wrote (at least in
part):

C> As  you  see,  you dont get clear answers. That's so because this
C> issue  is __very_fishy_ (or shall I say "batty" ?) in
C> TheBat.

It ain't. And your mail additionally mixed up some things :-(

1.) The Bat! uses the authentication method it is configured to use.
2.) Exception was: it on SMTP-level "CRAM-MD5" was activated, but
_NOT_ enforced ("Require secure (MD5) authentication"
deacktivated) _AND_ the SMTP-server sent "AUTH CRAM-MD5" in it's
EHLO-greeting The Bat! tried to use CRAM-MD5 a second time even if
it failed in the first instance. It didn't fall back to "normal"
authentication. But as I wrote: only on SMTP-level.
This should be fixed, IIRC. I think I remember having read
something about this being fixed in a Beta-announcement.
3.) For POP retrieval The Bat! uses _exactly_ the configured
authentication method. As one can see: in cofiguration dialog
they're all _exclusive_, so if one checks "Regular" The Bat! does
not try to use CRAM-MD5. This is simple because POP3-servers don't
have a greeting that allows to figure out which authentication
methods are supported and The Bat! does not "wild guessing and
probing". It's up to the user to decide what should be taken, a
POP account could be locked on server side with to many "failed
logins" and a probing of The Bat! could trigger this error.
4.) SSL has _NOTHING_ to do with The Bat! set to a dedicated
authentication method.
(SSL) and (CRAM-MD5/APOP/Regular/Plain) are two different pairs of
shoes. SSL secures the _connection itself_ by encryption. This
encryption is applied to _ALL_ data exchanged in this session,
from a possible login until the "QUIT" command. The different
authentication methods only describe the way the authentication
data are sent: Regular/Plain authentication sends username and
password in plain text, while APOP and CRAM-MD5 encrypt the
password (plus username for CRAM-MD5) and _ONLY_ the password
(plus username for CRAM-MD5). The rest of communication, means:
mail retrieval or mail sendout, is done unencrypted.
5.) Yes, The Bat! is _not yet_ capable of using a SSL-secured
IMAP-connection, albeit configuration dialog pretends something
similar. If IMAP is selected and STARTTLS or TLS the latter is
simply ignored and the connection is done as if "Regular" for
"Connection" would have been chosen.

Hope this sorts the whole stuff out a little bit and a "Happy new
year" to all list members and all they know :-)

CYa next year :-)

Pit
-- 
Regards
Peter Palmreuther
(The Bat! v1.62 Beta/17 on Windows 2000 5.0 Build 2195 Service Pack 1)

"There is no statute of limitations on stupidity."



Current version is 1.62 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html