On Fri, Nov 22, 2002 at 09:23:57PM +0100, Eugen Leitl wrote: | Question: if you control the traffic layer you can easily disrupt | opportunistic encryption (STARTTLS & Co) by killing public key exchange, | or even do a MITM. | | Is there any infrastructure in MTAs for public key caching, and admin | notification if things look fishy? (Fishy: a host which used to do PKI | with you suddenly says it can't, or its key differs from key you cached). | | (Okay, it's unlikely, but maybe people have been anticipating this).
Not that we've found. I did a little experimenting with huge SSL session timeouts and high log levels, but saw nothing logged that indicated that someone who should have had a key didn't. While what you propose is useful enough that I spent time looking for it, lets not let the best become the enemey of the good. Needing to disrupt a network connection is a huge cost for an Eve who prefers to avoid detection. Not an unpayable one, but not to be ignored. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume