Sveiki,

Wednesday, April 6, 2011, 8:21:03 PM, you wrote:

> Hi Vilius et al,

> Wednesday, April 6, 2011, 12:00:16 PM, you wrote:

>>> > You can do this by using standard plain text connection method.
>>> That is hard to do if the server, for example, only supports SSL
>>> connections (as is common practice today) and uses self-signed
>>> certs for that - and as such just as good as advising someone, who
>>> complains that a car lets him put in diesel where unleaded is
>>> needed, to try to run his car on wood.

>> I'm not sure why you think this is "a common practice". Sure it was
>> the case like 5 years ago, but now every major webmail provider,
>> bigger companies and even universities use good certificates. I use
>> 6 accounts for work and 2 personal accounts and all of them are
>> properly secured with proper certificates. And given what messages
>> IE, FF and Chrome throughs at users these days, I don't imagine who
>> is using self-signed ones.   

> This is more of a philosophical discussion about PKE (Public Key
> Encryption). This might be a bit OT, if so we can carry on PM.

> There are 2 main uses for PKE.

> 1.- Certify endpoints. For this there must be an unbroken certificate
> chain from a trusted CA down through 0 or more intermediate
> certificates to the end certificate that is being used. For this
> purpose Vilius is right, self-signed certificates are no use.

> 2.- Secure communications channel. The communication is opaque to all
> but the 2 endpoints that are communicating. When you perform
> IMAP/POP3/SMTP authentication you are sending your login details, you
> definitely don't what people to read that, and you might not want them
> to read the mail contents either. For this purpose self-signed
> certificates are perfectly OK.

> As a small aside, even for purpose 1 the current implementation is
> flawed. It all goes down to having a few trusted 100% secure Root CA.
> This is not actually the case. Some CA have been compromised in the
> past, which is one problem, another is that some countries have their
> own internationally recognised government controlled CA, which then
> allows the government to mount man-in-the-middle attack on SSL traffic
> going through their country.

> I want The Bat! to store the self-signed certificate so that I can
> simplify purpose 2 above.

Completely   true.  With small addition, that point 2 only makes sense
when  you  can  certify  endpoints  also.  E.i.  to  allow self-signed
communication  in  secure  manner  you  MUST  get certificate from the
person  you  trust,  on  USB  key,  or that such certificate should be
pushed  securely  through  Windows  Group Policy for example. Trusting
(e.g.   accepting)   self-signed   CA   through internet is risky. You
could  actually  be accepting certificate of transparent proxy without
knowing  it,  you  have  to  check figerprint, etc, etc. This is why I
think  current  method  is  really  enough. If it doesn't work as some
users said, then of course BT ticket should be created for that.

-- 
Best regards,
 Vilius


________________________________________________________
 Current beta is 5.0.6.1 | 'Using TBBETA' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to