2026/01/06

Newest at the top

2026-01-06 22:06:02 +0100 <jreicher> Oh, I don't consider that a problem with STARTTLS. IMO that's a problem with client implementations. They shouldn't proceed if TLS is unavailable.
2026-01-06 22:05:27 +0100morj(~morj@user/morj) (Quit: Konversation terminated!)
2026-01-06 22:03:19 +0100karenw(~karenw@user/karenw) (Ping timeout: 246 seconds)
2026-01-06 22:02:54 +0100synchromesh(~john@2406:5a00:2412:2c00:c177:4fdc:d0ff:49db) synchromesh
2026-01-06 22:02:28 +0100synchromesh(~john@2406:5a00:2412:2c00:c177:4fdc:d0ff:49db) (Read error: Connection reset by peer)
2026-01-06 21:59:49 +0100merijn(~merijn@host-cl.cgnat-g.v4.dfn.nl) (Ping timeout: 246 seconds)
2026-01-06 21:59:21 +0100 <mauke> https://en.wikipedia.org/wiki/Opportunistic_TLS#Weaknesses_and_mitigations
2026-01-06 21:58:23 +0100Typer_of_Terms(~Typer_of_@85.62.22.209) Typer_of_Terms
2026-01-06 21:57:33 +0100 <jreicher> Why?
2026-01-06 21:56:15 +0100 <mauke> insecure
2026-01-06 21:55:13 +0100 <jreicher> larsivi: I quite like STARTTLS, and always have. Why would it be frowned upon?
2026-01-06 21:54:46 +0100merijn(~merijn@host-cl.cgnat-g.v4.dfn.nl) merijn
2026-01-06 21:47:31 +0100sord937(~sord937@gateway/tor-sasl/sord937) (Quit: sord937)
2026-01-06 21:44:02 +0100trickard_(~trickard@cpe-57-98-47-163.wireline.com.au)
2026-01-06 21:43:48 +0100trickard(~trickard@cpe-57-98-47-163.wireline.com.au) (Read error: Connection reset by peer)
2026-01-06 21:43:15 +0100merijn(~merijn@host-cl.cgnat-g.v4.dfn.nl) (Ping timeout: 240 seconds)
2026-01-06 21:38:05 +0100merijn(~merijn@host-cl.cgnat-g.v4.dfn.nl) merijn
2026-01-06 21:34:30 +0100jreicher(~joelr@user/jreicher) jreicher
2026-01-06 21:32:00 +0100prite(~pritam@user/pritambaral) (Quit: Konversation terminated!)
2026-01-06 21:29:53 +0100weary-traveler(~user@user/user363627) user363627
2026-01-06 21:27:55 +0100euandreh(~Thunderbi@2804:d59:8970:b900:ab52:d56:3299:431) (Ping timeout: 264 seconds)
2026-01-06 21:25:43 +0100comerijn(~merijn@77.242.116.146) (Ping timeout: 240 seconds)
2026-01-06 21:23:56 +0100Brumaire(~no@94.140.114.73) Brumaire
2026-01-06 21:20:25 +0100Lycurgus(~juan@user/Lycurgus) (Quit: alsoknownas.renjuan.org ( juan@acm.org ))
2026-01-06 21:10:59 +0100Brumaire(~no@94.140.114.73) (Read error: Connection reset by peer)
2026-01-06 21:10:55 +0100itaipu(~itaipu@168.121.98.37) (Ping timeout: 240 seconds)
2026-01-06 21:10:34 +0100trickard__trickard
2026-01-06 21:09:31 +0100Brumaire_(~no@94.140.114.73) (Remote host closed the connection)
2026-01-06 21:01:37 +0100ttybitnik(~ttybitnik@user/wolper) (Read error: Connection reset by peer)
2026-01-06 21:00:35 +0100polykernel(~polykerne@user/polykernel) polykernel
2026-01-06 21:00:22 +0100polykernel(~polykerne@user/polykernel) (Ping timeout: 244 seconds)
2026-01-06 20:55:37 +0100pavonia(~user@user/siracusa) siracusa
2026-01-06 20:44:42 +0100euandreh(~Thunderbi@2804:d59:8970:b900:ab52:d56:3299:431) euandreh
2026-01-06 20:42:34 +0100morj(~morj@user/morj) morj
2026-01-06 20:39:06 +0100 <mauke> so I guess data-default officially supports microhs now
2026-01-06 20:37:43 +0100Lord_of_Life_Lord_of_Life
2026-01-06 20:37:13 +0100Lord_of_Life(~Lord@user/lord-of-life/x-2819915) (Ping timeout: 246 seconds)
2026-01-06 20:36:24 +0100Lord_of_Life_(~Lord@user/lord-of-life/x-2819915) Lord_of_Life
2026-01-06 20:29:11 +0100__monty__(~toonn@user/toonn) toonn
2026-01-06 20:26:08 +0100jreicher(~joelr@user/jreicher) (Quit: In transit)
2026-01-06 20:18:59 +0100 <larsivi> STARTTLS is a mechanism to allow for both non-TLS and TLS on the same port. Not ideal, and generally frowned upon these days, at least for SMTP.
2026-01-06 20:16:09 +0100jmcantrell_jmcantrell
2026-01-06 20:12:30 +0100remexre(~remexre@user/remexre) remexre
2026-01-06 20:11:18 +0100remexre(~remexre@user/remexre) (Ping timeout: 252 seconds)
2026-01-06 20:08:23 +0100newmind(~newmind@91-133-90-252.dyn.cablelink.at)
2026-01-06 20:01:07 +0100 <glguy> And perhaps related: the STARTTLS feature implemented by some clients means you'll automatically upgrade plaintext connections to TLS connections
2026-01-06 20:00:05 +0100 <glguy> SASL Plain mechanism is a different category from using TLS(previously called SSL). You can use each of those independently
2026-01-06 19:44:45 +0100larsivi(~larsivi@user/larsivi) larsivi
2026-01-06 19:38:18 +0100__monty__(~toonn@user/toonn) (Ping timeout: 252 seconds)
2026-01-06 19:32:10 +0100comerijn(~merijn@77.242.116.146) merijn