When transferring articles between two news servers, are some of you currently encrypting the connection?
If that is the case, I would be interested in knowing how you achieve that:
- what NNTP sofware (INN, Diablo, CodoSoft NNTPd...)
- by what means (stunnel, TCP wrappers, IPsec, native TLS support in the
news server...)
- on what port (119, 433, 563, another port?)
- do you have both unencrypted & encrypted connections with peers, or
only encrypted connections?
==================
I use port 119 to transfer articles - no encryption, but I have my
system configured to accept IPSec compression on the port. I note in my IPsec logs that none of my peers seem to take advantage of compression,
but they may be trying to negotiate authentication (AH) and encryption
(ESP), but I have those features turned OFF for feeds - being that I
consider such posts as already "in the public domain" because they are readable elsewhere. [Or at least I think I have it set up that way.]
My reader port, 563, has TLS enabled via INN's nnrpd program. At the
IPSec level, it could be compressed if negotiated.
When transferring articles between two news servers, are some of you currently encrypting the connection?
If that is the case, I would be interested in knowing how you achieve
that:
- what NNTP sofware (INN, Diablo, CodoSoft NNTPd...)
- by what means (stunnel, TCP wrappers, IPsec, native TLS support in the
news server...)
- on what port (119, 433, 563, another port?)
- do you have both unencrypted & encrypted connections with peers, or
only encrypted connections?
==================
I use port 119 to transfer articles - no encryption, but I have my
system configured to accept IPSec compression on the port. I note in my IPsec logs that none of my peers seem to take advantage of compression,
but they may be trying to negotiate authentication (AH) and encryption
(ESP), but I have those features turned OFF for feeds - being that I
consider such posts as already "in the public domain" because they are readable elsewhere. [Or at least I think I have it set up that way.]
My reader port, 563, has TLS enabled via INN's nnrpd program. At the
IPSec level, it could be compressed if negotiated.
TCP port 563 is dedicated to NNTP over TLS, and registered in the
IANA Service Name and Transport Protocol Port Number Registry for
that usage. NNTP implementations using TCP port 563 begin the TLS
negotiation immediately upon connection and then continue with the
initial steps of an NNTP session. This use of strict TLS on a
separate port is the preferred way of using TLS with NNTP.
If a host wishes to offer separate servers for transit and reading
clients, TCP port 563 SHOULD be used for strict TLS with the reading
server, and an unused port of its choice different than TCP port 433
SHOULD be used for strict TLS with the transit server. The ports
used for strict TLS should be clearly communicated to the clients,
and specifically that no plain-text communication occurs before the
TLS session is negotiated.
============
Using INN, I've seen only one peer that even requested port 433 for NNSP (peer-to-peer) transfer. All the others use 119. Therefore, I agree
that there should not be a dedicated port for NNSPS. However, I see
nothing that would forbid two peers from agreeing to use TLS over their existing NNSP connection. However, is it necessary?
However, peer-to-peer communications are likely to be public
postings distributed worldwide (by default) which anyone can read, so do
they really need protection? If inter-server communications need
protection, there's always IPSec.
However, peer-to-peer communications are likely to be public
postings distributed worldwide (by default) which anyone can read, so do
they really need protection? If inter-server communications need
protection, there's always IPSec.
Though not frequent, two peers may also authenticate themselves (using AUTHINFO). Protecting their credentials with TLS is useful in that
case. I otherwise agree that encrypting public articles is worthless.
Though not frequent, two peers may also authenticate themselves (using
AUTHINFO). Protecting their credentials with TLS is useful in that
case. I otherwise agree that encrypting public articles is worthless.
I do not agree that encrypting public articles is worthless.
For example, the reason for encrypting public articles can be privacy (which some people deem important) - they might not want third parties to know exactly which articles are they retreiving (which is the same reason why
they might want to use HTTPS for accessing Wikipedia or search engine, for example).
Other reason might be that the more of the global traffic is encrypted the better - the less suspicios (and thus likely to be targeted by goverment agencies) would any person be JUST BECAUSE they are using encryption.
(If only 0.01% of global internet traffic is encrypted, everyone using it will be suspected. However if 70% of global traffic is encrypted, it is so common so everyone can use encryption without fear of his/her life being
made hard just because they value their privacy)
Though not frequent, two peers may also authenticate themselves (using
AUTHINFO). Protecting their credentials with TLS is useful in that
case. I otherwise agree that encrypting public articles is worthless.
I do not agree that encrypting public articles is worthless.
I understand your point.
Note that the draft proposal does not say that encrypting is worthless,
but instead references RFC 7258 "Pervasive Monitoring Is an Attack" <https://tools.ietf.org/html/rfc7258> and states that "even an encrypted
but unauthenticated connection might be better than an unencrypted connection".
I hope it suits you.
on a semi-quick read of draft, in section 2.4, the wording in parentheses seems unclear to me in "Be warned if a given server stops advertising the STARTTLS capability label in response to the CAPABILITIES command (of course when a security layer is not already in place) whereas it advertised the STARTTLS capability label during the previous connection."
I think its intent is to indicate that CAPABILITIES should be issued before STARTTLS commands, but the wording is confusing (to me, at least).
Also, in section 3, "CERT vulnerability ID #555316" maybe should have a reference?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 388 |
Nodes: | 16 (2 / 14) |
Uptime: | 133:57:36 |
Calls: | 8,209 |
Calls today: | 7 |
Files: | 13,122 |
Messages: | 5,871,359 |