Hi Vilius et al,

Wednesday, April 6, 2011, 12:00:16 PM, you wrote:

>> > You can do this by using standard plain text connection method.
>> That is hard to do if the server, for example, only supports SSL
>> connections (as is common practice today) and uses self-signed
>> certs for that - and as such just as good as advising someone, who
>> complains that a car lets him put in diesel where unleaded is
>> needed, to try to run his car on wood.

> I'm not sure why you think this is "a common practice". Sure it was
> the case like 5 years ago, but now every major webmail provider,
> bigger companies and even universities use good certificates. I use
> 6 accounts for work and 2 personal accounts and all of them are
> properly secured with proper certificates. And given what messages
> IE, FF and Chrome throughs at users these days, I don't imagine who
> is using self-signed ones.   

This is more of a philosophical discussion about PKE (Public Key
Encryption). This might be a bit OT, if so we can carry on PM.

There are 2 main uses for PKE.

1.- Certify endpoints. For this there must be an unbroken certificate
chain from a trusted CA down through 0 or more intermediate
certificates to the end certificate that is being used. For this
purpose Vilius is right, self-signed certificates are no use.

2.- Secure communications channel. The communication is opaque to all
but the 2 endpoints that are communicating. When you perform
IMAP/POP3/SMTP authentication you are sending your login details, you
definitely don't what people to read that, and you might not want them
to read the mail contents either. For this purpose self-signed
certificates are perfectly OK.

As a small aside, even for purpose 1 the current implementation is
flawed. It all goes down to having a few trusted 100% secure Root CA.
This is not actually the case. Some CA have been compromised in the
past, which is one problem, another is that some countries have their
own internationally recognised government controlled CA, which then
allows the government to mount man-in-the-middle attack on SSL traffic
going through their country.

I want The Bat! to store the self-signed certificate so that I can
simplify purpose 2 above.

Regards.

-- 
   __ _ Debian GNU User Simon Martin
  / /(_)_ __ _ ___ __  __  Project Manager 
 / / | | '_ \| | | \ \/ /  Milliways 
/ /__| | | | | |_| |>  <   mailto: smar...@milliways.cl 
\____/_|_| |_|\__,_/_/\_\ 
Si Hoc Legere Scis Nimium Eruditionis Habes 


________________________________________________________
 Current beta is 5.0.6.1 | 'Using TBBETA' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to