> If anyone has a reference ...

Not a reference, but some history —

Microsoft’s point-to-point tunneling protocol version 1.0 was a miserable 
failure.  Version 2.0 closed up many of those holes and was widely regarded as 
secure, except for a configuration option which was on by default: “Enable 
backwards compatibility.”  So to exploit a PPTP 2.0 connection, you just had to 
connect and give it a 1.0 handshake, at which point it would fall back into an 
insecure mode.

The protocol was secure: you just had to configure it correctly.  The server 
was correctly implemented.  It’s just that it was shipped in a completely 
broken state, most system administrators didn’t know it and/or didn’t check it, 
and as a result it was pretty much useless.

A secure protocol must be used correctly in order to provide communications 
security.  Too often people completely lose sight of that and don’t even 
introduce it into their discussions.  So — discuss.  If you use ssh and trust 
it, how do you know that you’re using it correctly?  How do you know the people 
who connect to your system are?  Etc.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to