• [Dialog] news.neodome.net stunnel.conf with workarounds for expired sel

    From Ronald@21:1/5 to All on Thu Jan 11 16:47:52 2024
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome} stunnel.conf (tested on January 10th, 2024)
    ; See https://groups.google.com/g/news.software.readers/c/sxkkJYuI728
    ; Use a different port for each identity between 49152 & 65535
    ; Stunnel log will always report at least these next four lines:
    ; Reading configuration from file (path)\stunnel.conf
    ; UTF-8 byte order mark detected
    ; FIPS mode disabled
    ; Configuration successful
    ; Like it or not, posting to news.neodome.net requires a login/password
    ; Like it or not, news.neodome.net requires at least a 10-char passwd
    ; Like it or not, the news.neodome.net certificate is self-signed
    ; Like it or not, the news.neodome.net certificate expired in 12/2020
    ; Like it or not, news.neodome.net REQUIRES encryption when posting
    ; Like it or not, Dialog (circa 2005) uses old encryption standards
    ; Like it or not, news.neodome.net won't accept Dialog port 119
    ; Like it or not, news.neodome.net won't accept Dialog port 119 SSL
    ; Like it or not, news.neodome.net won't accept Dialog port 563
    ; But news.neodome.net will accept Dialog port 563 with Dialog SSL
    ; Like it or not, Dialog port 563 SSL uses old encryption standards
    ; These four tests suggested by Bernd & Vanguard worked in Jan 2024
    ; 1. news.neodome.net accepts Dialog port 563 SSL posts
    ; 2. news.neodome.net accepts sTunnel port 119 STARTTLS posts
    ; 3. news.neodome.net accepts sTunnel port 563 posts (ignoring the cert)
    ; 4. news.neodome.net accepts sTunnel port 563 posts (acknowledging cert)
    ; Each solution below is tested workaround thanks to Bernd Rose & Vanguard
    ; Like it or not, Dialog obfuscates or omits some identify information
    ; So you may want to save that identify information here in stunnel.conf
    ; Neodome Identity: (archive your real email address here if you like)
    ; Dialog Identity: (archive your Dialog email address here if you like)
    ; Dialog Username = (archive your Dialog username here if you like)
    ; Dialog Password = (archive your Dialog password here if you like)
    ; System timezone: (archive your system timezone here if you like)
    ; Like it or not, SSL often cares about accurate time zone matching
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome1}
    ; This method sets Dialog to use Dialog port 563 SSL encryption
    ; 40Tude Dialog will NOT use the latest encryption standards.
    ; sTunnel is not involved so the stunnel.conf should be empty
    ; Dialog Host: news.neodome.net
    ; Dialog Port: 563
    ; Dialog SSL: checked
    ; Dialog Username: (required)
    ; Dialog Password: (required)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; No stunnel.conf entries are used for [Neodome1] setup
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome2}
    ; This method sets Dialog to use sTunnel port 119 STARTTLS.
    ; You'd think it wouldn't require a password, but it does
    ; If you are able to connect through sTunnel to a server
    ; that connection will always be encrypted (e.g., as STARTTLS)
    ; (Although, with the right setting, it is possible to use
    ; "null encryption" [aka a non-encrypting "encryption" method])
    ; Setting sTunnel to connect with protocol NNTP on port 119
    ; leads to a handshake with STARTTLS by default
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome2] needs authentication to prevent MITM attacks
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49152 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required)
    ; Dialog Password: (required)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; For self-signed certificates that have not expired, a good way to
    ; deal with them is to download them & they will be checked against
    ; the existing non-expired self-signed certificate (which has no chain)
    ; In Stunnel, if you've recently posted, you can do the following:
    ; Stunnel: Save Peer Certificate -> Peer-Neodome2.pem
    ; Up comes a box saying:
    ; Stunnel 5.69 on Win64
    ; Peer certificate change has been saved.
    ; Add the following lines to section [Neodome2]:
    ; CAfile = peer-Neodome2.pem
    ; verifyPeer = yes
    ; to enable cryptographic authentication.
    ; Then reload stunnel configuration file.
    ; This approach will fail for neodome but only because it is expired
    [Neodome2]
    client = yes
    accept = 127.0.0.1:49152
    connect = news.neodome.net:119
    protocol = nntp
    ; CAfile = peer-Neodome2.pem
    ; verifyPeer = yes
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome3}
    ; This method sets Dialog to use sTunnel port 563 encryption
    ; Where this method does not even touch the certificate
    ; It's probably the best option because it uses current encryption
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49153 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required)
    ; Dialog Password: (required)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome3] needs authentication to prevent MITM attacks
    [Neodome3]
    client = yes
    accept = 127.0.0.1:49153
    connect = news.neodome.net:563
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome4}
    ; This is a very minor variation on the method #3 tested above
    ; This method sets Dialog to use sTunnel port 563 encryption
    ; Where this method requires but does not check the certificate
    ; The "verify = 0" was initially suggested by the Neodome admin
    ; The "verify = 0" requests a certificate but does not check it
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49154 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required)
    ; Dialog Password: (required)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome4] needs authentication to prevent MITM attacks
    [Neodome4]
    client = yes
    accept = 127.0.0.1:49154
    connect = news.neodome.net:563
    verify = 0
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ronald@21:1/5 to All on Thu Jan 11 17:16:50 2024
    On Thu, 11 Jan 2024 16:47:52 -0500, Ronald wrote:
    Cleaned it up a bit so that it can be saved in a Dialog archive.

    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ; stunnel.conf (tested on January 10th, 2024)
    ; <https://groups.google.com/g/news.software.readers/c/DTYKUX3VwLw>
    ; <https://groups.google.com/g/news.software.readers/c/sxkkJYuI728>
    ; Each solution below is a tested workaround thanks mostly to Bernd Rose
    ; Like it or not, Dialog obfuscates or omits some identify information
    ; So you may want to save that identify information here in stunnel.conf
    ; Neodome Identity: (archive your real email address here if you like)
    ; Dialog Identity: (archive your Dialog email address here if you like)
    ; Dialog Username = (archive your Dialog username here if you like)
    ; Dialog Password = (archive your Dialog password here if you like)
    ; Like it or not, SSL often cares about accurate time zone matching
    ; System timezone: (archive your system timezone here if you like)
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ; Apparently news.neodome.net does not require authentication to read
    ; However, news.neodome.net requires a login/password to post
    ; And news.neodome.net requires at least a 10-character password
    ; Unfortunately, the news.neodome.net certificate is self-signed
    ; And worse, the news.neodome.net certificate expired in 12/2020
    ; Even so, news.neodome.net REQUIRES encryption when posting
    ; With the result that news.neodome.net won't accept Dialog port 119
    ; Unfortunately, Dialog (circa 2005) uses old encryption standards
    ; And unfortunately news.neodome.net won't accept Dialog port 119 SSL
    ; However news.neodome.net will accept Dialog port 563 old encryption
    ; And news.neodome.net will accept stunnel port 119 STARTTLS encryption
    ; Also news.neodome.net will accept that the certificate simply exists
    ; That gave us four working workarounds to the encryption problem set
    ; 1. news.neodome.net accepts Dialog port 563 SSL encryption
    ; 2. news.neodome.net accepts sTunnel port 119 protocol=nntp encryption
    ; 3. news.neodome.net accepts sTunnel port 563 ignoring the certificate
    ; 4. news.neodome.net accepts sTunnel port 563 acknowledging the cert
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome0}
    ; The boiler-plate section below "should" work but won't work in 2024
    ; because Neodome has a self-signed certificate which is also expired
    ; [Neodome0]
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 65534 (pick an unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; client = yes
    ; accept = 127.0.0.1:63534
    ; connect = news.neodome.net:563
    ; verifyChain = yes
    ; CAfile = ca-certs.pem
    ; checkHost = news.neodome.net
    ; OCSPaia = yes
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome1 workaround}
    ; This method sets Dialog to use Dialog port 563 SSL encryption
    ; 40Tude Dialog will NOT use the latest encryption standards.
    ; sTunnel is not involved so the stunnel.conf should be empty
    ; Dialog Host: news.neodome.net
    ; Dialog Port: 563
    ; Dialog SSL: checked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; No stunnel.conf entries are used for this [Neodome1] workaround
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome2 workaround}
    ; This method sets Dialog to use sTunnel port 119 STARTTLS.
    ; You'd think it wouldn't require a password, but it does
    ; If you are able to connect through sTunnel to a server
    ; that connection will always be encrypted (e.g., as STARTTLS)
    ; (Although, with the right setting, it is possible to use
    ; "null encryption" [aka a non-encrypting "encryption" method])
    ; Setting sTunnel to connect with protocol NNTP on port 119
    ; leads to a handshake with STARTTLS by default
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome2] needs authentication to prevent MITM attacks
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49152 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; For self-signed certificates that have not expired, a good way to
    ; deal with them is to download them & they will be checked against
    ; the existing non-expired self-signed certificate (which has no chain)
    ; In Stunnel, if you've recently posted, you can do the following:
    ; Stunnel: Save Peer Certificate -> Peer-Neodome2.pem
    ; Up comes a box saying:
    ; Stunnel 5.69 on Win64
    ; Peer certificate change has been saved.
    ; Add the following lines to section [Neodome2]:
    ; CAfile = peer-Neodome2.pem
    ; verifyPeer = yes
    ; to enable cryptographic authentication.
    ; Then reload stunnel configuration file.
    [Neodome2]
    client = yes
    accept = 127.0.0.1:49152
    connect = news.neodome.net:119
    protocol = nntp
    ; CAfile = peer-Neodome2.pem
    ; verifyPeer = yes
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome3 workaround}
    ; This method sets Dialog to use sTunnel port 563 encryption
    ; Where this method does not even touch the certificate
    ; It's probably the best option because it uses current encryption
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49153 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome3] needs authentication to prevent MITM attacks
    [Neodome3]
    client = yes
    accept = 127.0.0.1:49153
    connect = news.neodome.net:563
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome4 workaround}
    ; This is a very minor variation on the method #3 tested above
    ; This method sets Dialog to use sTunnel port 563 encryption
    ; Where this method requires but does not check the certificate
    ; The "verify = 0" was initially suggested by the Neodome admin
    ; The "verify = 0" requests a certificate but does not check it
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49154 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome4] needs authentication to prevent MITM attacks
    [Neodome4]
    client = yes
    accept = 127.0.0.1:49154
    connect = news.neodome.net:563
    verify = 0
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Larry Wolff@21:1/5 to Ronald on Fri Jan 12 00:07:30 2024
    On 1/11/2024 5:16 PM, Ronald wrote:

    On Thu, 11 Jan 2024 16:47:52 -0500, Ronald wrote:
    Cleaned it up a bit so that it can be saved in a Dialog archive.

    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ; stunnel.conf (tested on January 10th, 2024)
    ; <https://groups.google.com/g/news.software.readers/c/DTYKUX3VwLw>
    ; <https://groups.google.com/g/news.software.readers/c/sxkkJYuI728>
    ; Each solution below is a tested workaround thanks mostly to Bernd Rose
    ; Like it or not, Dialog obfuscates or omits some identify information
    ; So you may want to save that identify information here in stunnel.conf
    ; Neodome Identity: (archive your real email address here if you like)
    ; Dialog Identity: (archive your Dialog email address here if you like)
    ; Dialog Username = (archive your Dialog username here if you like)
    ; Dialog Password = (archive your Dialog password here if you like)
    ; Like it or not, SSL often cares about accurate time zone matching
    ; System timezone: (archive your system timezone here if you like)
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ; Apparently news.neodome.net does not require authentication to read
    ; However, news.neodome.net requires a login/password to post
    ; And news.neodome.net requires at least a 10-character password
    ; Unfortunately, the news.neodome.net certificate is self-signed
    ; And worse, the news.neodome.net certificate expired in 12/2020
    ; Even so, news.neodome.net REQUIRES encryption when posting
    ; With the result that news.neodome.net won't accept Dialog port 119
    ; Unfortunately, Dialog (circa 2005) uses old encryption standards
    ; And unfortunately news.neodome.net won't accept Dialog port 119 SSL
    ; However news.neodome.net will accept Dialog port 563 old encryption
    ; And news.neodome.net will accept stunnel port 119 STARTTLS encryption
    ; Also news.neodome.net will accept that the certificate simply exists
    ; That gave us four working workarounds to the encryption problem set
    ; 1. news.neodome.net accepts Dialog port 563 SSL encryption
    ; 2. news.neodome.net accepts sTunnel port 119 protocol=nntp encryption
    ; 3. news.neodome.net accepts sTunnel port 563 ignoring the certificate
    ; 4. news.neodome.net accepts sTunnel port 563 acknowledging the cert
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome0}
    ; The boiler-plate section below "should" work but won't work in 2024
    ; because Neodome has a self-signed certificate which is also expired
    ; [Neodome0]
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 65534 (pick an unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; client = yes
    ; accept = 127.0.0.1:63534
    ; connect = news.neodome.net:563
    ; verifyChain = yes
    ; CAfile = ca-certs.pem
    ; checkHost = news.neodome.net
    ; OCSPaia = yes
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome1 workaround}
    ; This method sets Dialog to use Dialog port 563 SSL encryption
    ; 40Tude Dialog will NOT use the latest encryption standards.
    ; sTunnel is not involved so the stunnel.conf should be empty
    ; Dialog Host: news.neodome.net
    ; Dialog Port: 563
    ; Dialog SSL: checked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; No stunnel.conf entries are used for this [Neodome1] workaround
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome2 workaround}
    ; This method sets Dialog to use sTunnel port 119 STARTTLS.
    ; You'd think it wouldn't require a password, but it does
    ; If you are able to connect through sTunnel to a server
    ; that connection will always be encrypted (e.g., as STARTTLS)
    ; (Although, with the right setting, it is possible to use
    ; "null encryption" [aka a non-encrypting "encryption" method])
    ; Setting sTunnel to connect with protocol NNTP on port 119
    ; leads to a handshake with STARTTLS by default
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome2] needs authentication to prevent MITM attacks
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49152 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; For self-signed certificates that have not expired, a good way to
    ; deal with them is to download them & they will be checked against
    ; the existing non-expired self-signed certificate (which has no chain)
    ; In Stunnel, if you've recently posted, you can do the following:
    ; Stunnel: Save Peer Certificate -> Peer-Neodome2.pem
    ; Up comes a box saying:
    ; Stunnel 5.69 on Win64
    ; Peer certificate change has been saved.
    ; Add the following lines to section [Neodome2]:
    ; CAfile = peer-Neodome2.pem
    ; verifyPeer = yes
    ; to enable cryptographic authentication.
    ; Then reload stunnel configuration file.
    [Neodome2]
    client = yes
    accept = 127.0.0.1:49152
    connect = news.neodome.net:119
    protocol = nntp
    ; CAfile = peer-Neodome2.pem
    ; verifyPeer = yes
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome3 workaround}
    ; This method sets Dialog to use sTunnel port 563 encryption
    ; Where this method does not even touch the certificate
    ; It's probably the best option because it uses current encryption
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49153 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome3] needs authentication to prevent MITM attacks
    [Neodome3]
    client = yes
    accept = 127.0.0.1:49153
    connect = news.neodome.net:563
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome4 workaround}
    ; This is a very minor variation on the method #3 tested above
    ; This method sets Dialog to use sTunnel port 563 encryption
    ; Where this method requires but does not check the certificate
    ; The "verify = 0" was initially suggested by the Neodome admin
    ; The "verify = 0" requests a certificate but does not check it
    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49154 (pick any unused port between 49152 & 65535)
    ; Dialog SSL: unchecked
    ; Dialog Username: (required for posting to most text newsgroups)
    ; Dialog Password: (required for posting to most text newsgroups)
    ; Dialog Allwd. conn.: 2
    ; Dialog Use pipelining (unchecked)
    ; Like it or not, you'll see these sTunnel warnings with this entry
    ; LOG3: No trusted certificates found
    ; LOG4: Service [Neodome4] needs authentication to prevent MITM attacks
    [Neodome4]
    client = yes
    accept = 127.0.0.1:49154
    connect = news.neodome.net:563
    verify = 0
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

    Does this set the encryption to TLS or to something else?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Bernd Rose@21:1/5 to Larry Wolff on Fri Jan 12 17:39:12 2024
    On Fri, 12th Jan 2024 00:07:30 -0500, Larry Wolff wrote:

    [sTunnel configuration examples]
    Does this set the encryption to TLS or to something else?

    If not explicitly set, default options apply. Current default sTunnel securityLevel is 2. The explanation for this level hasn't been updated
    in the sTunnel documentation for quite some time. Current sTunnel 5.71
    is compiled against OpenSSL 3.1.3. This does permit neither SSL nor any
    TLS prior to TLS 1.2 as default. Therefore, (depending on the server capabilities) sTunnel will connect with at least TLS 1.2 with default
    options. Any lesser protocol requires explicit lowering of the security settings.

    Bernd

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Bernd Rose@21:1/5 to All on Fri Jan 12 18:59:11 2024
    On Thu, 11th Jan 2024 17:16:50 -0500, Ronald wrote:

    Too much information, some misleading (or a misinterpretation of what
    I wrote).

    ;{Neodome0}
    ; The boiler-plate section below "should" work but won't work in 2024
    ; because Neodome has a self-signed certificate which is also expired

    Don't confuse readers with configuration variants, that will /not/ work.

    ;{Neodome1 workaround}
    ; This method sets Dialog to use Dialog port 563 SSL encryption
    ; 40Tude Dialog will NOT use the latest encryption standards.
    ; sTunnel is not involved so the stunnel.conf should be empty

    Rather insecure method, which hasn't anything to do with sTunnel.

    ;{Neodome2 workaround}
    ; This method sets Dialog to use sTunnel port 119 STARTTLS.
    ; You'd think it wouldn't require a password, but it does

    It _only_ requires a password when connection is established from a client, that explicitly requests STARTTLS. It just so happens, that sTunnel can not
    be configured to connect without any encryption (except NULL encryption,
    which still /is/ encryption). So, to connect to Neodome port 119 without (STARTTLS) encryption one needs to bypass sTunnel and connect directly.
    (In this case from Dialog.) Without encryption, posting isn't permitted
    on Neodome, though. Therefore, this would be a read-only setup.

    ; (Although, with the right setting, it is possible to use
    ; "null encryption" [aka a non-encrypting "encryption" method])

    Which will lead nowhere, because no server should be configured to accept
    such an "encryption" attempt. Therefore, NULL-encryption shouldn't be
    mentioned in a configuration template, but only in technical explanations.
    (If at all. I just wanted to avoid possible wise-assed comments against
    me formulating that sTunnel had _no_ way for unencrypted connections...)

    Keeping in mind, that configuring sTunnel for a port 119 STARTTLS
    connection to Neodome is a bit less intuitive and requires an
    additional parameter, there is no need to include this variant in
    a configuration template. Connection with the dedicated port 563
    does not work inferior.

    ; For self-signed certificates that have not expired, a good way to
    ; deal with them is to download them & they will be checked against
    ; the existing non-expired self-signed certificate (which has no chain)

    Does not apply to the (current) Neodome setup. And because there is no
    sign, that the situation may improve in the foreseeable future, there
    (again) is no need to include this in configuration templates explicitly dedicated to Neodome.

    ;{Neodome3 workaround}
    ; This method sets Dialog to use sTunnel port 563 encryption
    ; Where this method does not even touch the certificate

    Oh, it /does/ touch (and use) it. sTunnel just doesn't verify the
    _eligibility_ of the certificate in the described setup.

    ; It's probably the best option because it uses current encryption

    Which will be any connection run through sTunnel, as long as sTunnel
    is not explicitly mis-configured.

    ; Dialog Host: 127.0.0.1
    ; Dialog Port: 49153 (pick any unused port between 49152 & 65535)

    I usually don't recommend using ports from this dynamic port range for
    static tasks. This port range should be managed by the OS, which assigns
    ports to applications temporarily requesting a (more-the less throwaway)
    port. Any port you assign statically from this range /may/ already have
    been assigned by the OS to another program. I usually recommend to
    check the official IANA list for ports from the static port ranges and
    use those, that apply (only) to applications not installed on the system.

    https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml

    Ports 1191, 1192, 1193, 5631, 5632, 5633 are usually available and
    could be read (as aide-memoire) as 119-1 ... 119-3 (for STARTTLS
    connections to an external port 119) or as 563-1 ... 563-3 for
    connections to an external standard NNTP encryption port 563.

    [Neodome3]
    client = yes
    accept = 127.0.0.1:49153
    connect = news.neodome.net:563

    That's what users have to look for in your lengthy document.

    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    ;{Neodome4 workaround}
    ; This is a very minor variation on the method #3 tested above

    It is essentially the same as your Neodome method #3. It just has
    an outdated sTunnel option as extra line, which is a duplicate of
    the default settings of some newer options. (Which, therefore, can
    be left out from the configuration.)

    Hope, this clarifies some matters a bit more...
    Bernd

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)