Hi Maxim,

On  Fri, 13 Oct 2006 02:48:57 +0300 UTC (10/12/2006, 6:48 PM -0500 UTC my
time), Maxim Masiutin wrote:

M> Do you know that The Bat! is the most secure e-mail client. If we will
M> allow unsafe actions there and there we will became as insecure as the
M> other e-mail clients.

What unsafe actions? Accepting an expired SSL cert to a server that already
requires CRAM-MD5 authentication?  That's up to the user to decide, everyone
does it with browsers all the time. LOL... Next thing will be that TB! will
not start at all if the user is smoking a cigarette, another unsafe action.
In TB!, we don't even have that choice to accept or not, it is taken out of
our hands for our benefit and safety... Sounds like a good sales pitch to me
:)

However, I do not consider Pine (who was designed by Mark C., the "inventor"
of the IMAP RFC, Mutt, or Mulberry, or several others insecure by any
means..... The IMAPS server already requires CRAM-MD5 over SSL v3 auth. Yet,
they let me choose to permanently accept any cert...

M> Why don't you simply use "regular" connection instead of TLS with expired
M> certificate?

Can't, the remote server is configured only for IMAP with SSL only (port
993), not 143 standard which is not even opened in the firewall.

Wouldn't it be easier to just let the customer decide. This has nothing to
do with unsafe actions, just some fine tuning of programming the Address
book / trusted root CA to not block expired certs. We are not talking about
a root cert for e-commerce doing credit card transactions here..

-- 
Gary





________________________________________________________
 Current ALPHA is 3.86.03 | 'Using TBBETA' information:
http://www.silverstones.com/thebat/TBUDLInfo.html
IMPORTANT: To register as a Beta tester, use this link first -
http://www.ritlabs.com/en/partners/testers/

Reply via email to