Підтримка
www.wikidata.uk-ua.nina.az
StartTLS Opportunistic TLS angl Transport Layer Security stosuyetsya rozshiren u protokolah komunikaciyi dlya prostogo tekstu yaki proponuyut sposib pokrashiti peredachu informaciyi u viglyadi prostogo tekstu do zashifrovanogo TLS abo SSL zamist vikoristannya okremogo portu dlya zashifrovanih komunikacij Kilka protokoliv vikoristovuyut dlya ciyeyi meti komandu pid nazvoyu STARTTLS Ce odna z form oportunistichnih shifruvan i v pershu chergu priznachena yak protidiya pasivnomu monitoringu Komanda STARTTLS dlya IMAP i POP3 viznachena v RFC 2595 dlya SMTP v RFC 3207 dlya XMPP v RFC 6120 i dlya NNTP v RFC 4642 Dlya IRC robocha grupa IRCv3 viznachila rozshirennya STARTTLS hocha piznishe vono bulo zastarilim FTP vikoristovuye komandu AUTH TLS viznachenu v RFC 4217 a LDAP viznachaye OID rozshirennya protokolu RFC 2830 HTTP vikoristovuye zagolovok onovlennya BagatosharovistTLS ne zalezhit vid zastosunku slovami v RFC 5246 Odniyeyu z perevag TLS ye te sho vin ne zalezhit vid protokolu zastosunku Protokoli vishogo rivnya mozhut prozoro nakladatisya poverh protokolu TLS Standart TLS odnak ne viznachaye yak protokoli dodayut zahist za dopomogoyu TLS Rishennya pro te yak iniciyuvati vstanovlennya zv yazku TLS i yak interpretuvati obmin sertifikatami avtentifikaciyi zalishayutsya na rozsud rozrobnikiv i rozrobnikiv protokoliv yaki pracyuyut poverh TLS Stil yakij vikoristovuyetsya dlya viznachennya yak vikoristovuvati TLS vidpovidaye tomu samomu rozriznennyu rivniv yake takozh zruchno pidtrimuyetsya kilkoma bibliotechnimi realizaciyami TLS Napriklad RFC 3207 rozshirennya SMTP ilyustruye nastupnij dialogi yak kliyent i server mozhut pochati bezpechnij seans S lt waits for connection on TCP port 25 gt C lt opens connection gt S 220 mail example org ESMTP service ready C EHLO client example org S 250 mail example org offers a warm hug of welcome S 250 STARTTLS C STARTTLS S 220 Go ahead C lt starts TLS negotiation gt C amp S lt negotiate a TLS session gt C amp S lt check result of negotiation gt C EHLO client example org Ostannya komanda EHLO navedena vishe nadana cherez bezpechnij kanal Zauvazhte sho avtentifikaciya ye neobov yazkovoyu dlya SMTP i propushena vidpovid servera teper mozhe bezpechno proponuvati rozshirennya SMTP AUTH PLAIN yakogo nemaye u vidpovidi u viglyadi prostogo tekstu SSL portiKrim vikoristannya opportunistichnogo TLS bulo viznacheno ryad TCP portiv dlya zahishenih SSL versij vidomih protokoliv Voni vstanovlyuyut bezpechnij zv yazok a potim predstavlyayut komunikacijnij potik identichnij staromu nezashifrovanomu protokolu Okremi porti SSL dayut perevagu v menshij kilkosti chasu zatrimki takozh menshe metadanih peredayetsya v nezashifrovanomu viglyadi Deyaki prikladi Protokol priznachennya Normalnij port Variant SSL port SSL SMTP Vidpraviti list 25 587 SMTPS 465 POP3 Otrimati elektronnu poshtu 110 POP3S 995 IMAP Prochitajte elektronnu poshtu 143 IMAPS 993 NNTP Chitach novin 119 433 NNTPS 563 LDAP Dostup do katalogu 389 LDAPS 636 FTP Peredacha fajliv 21 FTPS 990 Prinajmni dlya protokoliv elektronnoyi poshti RFC 8314 nadaye perevagu okremim portam SSL zamist STARTTLS Slabki storoni ta pom yakshennyaOpportunistic TLS ce oportunistichnij mehanizm shifruvannya Oskilki pochatkovij obmin handshaking vidbuvayetsya u viglyadi prostogo tekstu zlovmisnik yakij kontrolyuye merezhu mozhe zminiti povidomlennya servera za dopomogoyu ataki lyudina poseredini shob stvoriti vrazhennya sho TLS nedostupnij nazivayetsya atakoyu STRIPTLS Bilshist SMTP kliyentiv potim nadsilayut elektronni listi ta mozhlivo paroli u viglyadi prostogo tekstu chasto bez spovishennya koristuvacha Zokrema bagato SMTP z yednan vinikayut mizh poshtovimi serverami de spovishennya koristuvachiv ne realno U veresni 2014 roku bulo viyavleno sho dva internet provajderi v Tayilandi robili ce zi svoyimi kliyentami U zhovtni 2014 roku bulo viyavleno sho Cricket Wireless dochirnya kompaniya AT amp T robit ce zi svoyimi kliyentami Taka povedinka pochalasya she u veresni 2013 roku Aio Wireless yaka piznishe ob yednalasya z Cricket de cya praktika prodovzhilasya Ataki STRIPTLS mozhna zablokuvati nalashtuvavshi SMTP kliyenti vimagati TLS dlya vihidnih z yednan napriklad agent peredachi povidomlen Exim mozhe vimagati TLS cherez direktivu hosts require tls Odnak oskilki ne kozhen poshtovij server pidtrimuye TLS ne realno prosto vimagati TLS dlya vsih z yednan Priklad ataki tipu STRIPTLS sho vikoristovuyetsya v tajskij tehnologiyi masovogo stezhennya 220 smtp gmail com ESMTP mail redacted com gsmtp ehlo a 250 smtp gmail com at your service REDACTED SERVICE 250 SIZE 35882577 250 8BITMIME The STARTTLS command is stripped here 250 ENHANCEDSTATUSCODES 250 PIPELINING 250 SMTPUTF8 220 smtp gmail com ESMTP gsmtp ehlo a 250 smtp gmail com at your service 250 SIZE 35882577 250 8BITMIME 250 STARTTLS 250 ENHANCEDSTATUSCODES 250 PIPELINING 250 SMTPUTF8 Cyu problemu virishuye avtentifikaciya imenovanih ob yektiv na osnovi DNS DANE chastina DNSSEC i zokrema RFC 7672 dlya SMTP DANE dozvolyaye proponuvati pidtrimku bezpechnogo SMTP cherez zapis TLSA Ce povidomlyaye kliyentam yaki pidklyuchayutsya sho voni povinni vimagati TLS takim chinom zapobigayuchi atakam STRIPTLS Podibnim chinom pracyuye proekt STARTTLS Everywhere vid Electronic Frontier Foundation Odnak DNSSEC cherez skladnist rozgortannya ta svoyeridnu kritiku zitknuvsya z nizkim rivnem vprovadzhennya i grupoyu velikih postachalnikiv poslug elektronnoyi poshti vklyuchayuchi Microsoft Google i Yahoo buv rozroblenij novij protokol pid nazvoyu SMTP MTA Strict Transport Security abo MTA STS MTA STS ne vimagaye vikoristannya DNSSEC dlya avtentifikaciyi zapisiv DANE TLSA ale pokladayetsya na sistemu centru sertifikaciyi CA i pidhid doviri pri pershomu vikoristanni TOFU shob uniknuti perehoplennya Model TOFU zmenshuye skladnist ale bez garantij pershogo vikoristannya yaki proponuye DNSSEC Krim togo MTA STS zaprovadzhuye mehanizm zvituvannya pro pomilki ta rezhim lishe zvituvannya sho zabezpechuye postupove rozgortannya ta audit na vidpovidnist PopulyarnistPislya vikrittya zroblenogo Edvardom Snoudenom u svitli globalnogo skandalu z masovim stezhennyam populyarni postachalniki poslug elektronnoyi poshti pokrashili zahist elektronnoyi poshti uvimknuvshi STARTTLS Facebook povidomiv pro ce pislya vvimknennya STARTTLS i zaohochennya inshih provajderiv zrobiti te same poki Facebook ne pripiniv svoyu sluzhbu elektronnoyi poshti v lyutomu 2014 roku 95 vihidnoyi elektronnoyi poshti bulo zashifrovano za dopomogoyu Perfect Forward Secrecy i suvoroyi perevirki sertifikata Primitkitls Extension IRCv3 Working Group 2012 Procitovano 6 April 2024 Tim Dierks Eric Rescorla August 2008 The Transport Layer Security TLS Protocol Procitovano 8 October 2009 Paul Hoffman February 2002 SMTP Service Extension for Secure SMTP over Transport Layer Security Procitovano 8 October 2009 The last line in the example added for clarity See e g the thread started by Paul Smith 26 January 2009 STARTTLS amp EHLO ietf smtp mailing list Procitovano 16 September 2015 Dovecot SSL documentation http wiki2 dovecot org SSL Hoffman Andrews Jacob 11 November 2014 ISPs Removing Their Customers Email Encryption Electronic Frontier Foundation Procitovano 19 January 2019 Google Yahoo SMTP email servers hit in Thailand 12 September 2014 Procitovano 31 July 2015 The FCC Must Prevent ISPs From Blocking Encryption 4 November 2014 Procitovano 31 July 2015 Exim Internet Mailer The smtp transport exim org hosts require tls Exim will insist on using a TLS session when delivering to any host that matches this list Who s That Knocking at my door Understanding Surveillance in Thailand PDF Privacy International 21 January 2017 Procitovano 7 February 2020 Thomas Ptacek 18 March 2016 Against DNSSEC Ramakrishnan Binu Brotman Alexander Jones Janet Margolis Daniel Risher Mark SMTP MTA Strict Transport Security MTA STS tools ietf org angl Procitovano 22 lyutogo 2019 Peterson Andrea 12 August 2014 Facebook s security chief on the Snowden effect the Messenger app backlash and staying optimistic The Washington Post Procitovano 2 November 2014 Cohen David 19 August 2014 Facebook 95 of Notification Emails Encrypted Thanks to Providers STARTTLS Deployment allfacebook com originalu za 22 September 2014 PosilannyaSecure Email Tests and Tools verify STARTTLS in real time dialog like example above Margolis Daniel Risher Mark Ramakrishnan Binu Brotman Alexander Jones Janet SMTP MTA Strict Transport Security MTA STS IETF A mechanism enabling mail service providers to declare their ability to receive Transport Layer Security TLS secure SMTP connections
Топ