On 10-Mar-2003 12:54 Charlie Brady wrote:
| 
| That's probably very similar to this:
| 
| http://www.superscript.com/ucspi-ssl/install.html

    Only insofar as they want to provide (nearly) the same functionality.
    It's certainly much easier to scrutinize the patch.

| The problem with both options (for me at least) is that there are
| licensing problems. There is already enough confustion about Dan

    Sure, but the licensing problems don't affect bincimap.  There
    are many ways to get tls/ssl over tcp, without bincimap needing
    to know about it.

| >     I think this is better than STARTTLS as most clients don't offer enough
| >     choice to avoid potential man-in-the-middle attacks.
| 
| I don't understand why you think STARTTLS is any different to an SSLized 
| tcpserver in that respect.

    I was referring to clients which _prefer_ tls/ssl (via STARTTLS) over
    non-ssl dedicated channels, but which revert to non-tls/ssl when STARTTLS
    isn't advertised as a capability; they often do so without alerting
    the user.

| Sure, but that's a separate, and easier, issue. Using a wrapper such as 
| stunnel is simple in those cases.

    Absolutely.  I see now that you're actually interested in having STARTTLS
    supported, just not in bincimap, preferring a post-auth bincimap and
    some other layer to provide STARTTLS, like imap-auth or some such thing.
    Until clients get smarter, I think STARTTLS is a bad thing; sticking to
    respective ports is more reliable.
    
    On the other hand, bincimap at least has the option of disallowing plain
    auth without tls/ssl.  As far as I can tell, it won't be able to do
    that unless you put something else in the chain to give it the hint.
--
-dale

Reply via email to