<Zarthus>
but I can see sasl plain being implemented
head8debian has joined #cinch
head8debian has quit [Ping timeout: 246 seconds]
postmodern has quit [Quit: Leaving]
head8debian has joined #cinch
<dominikh>
Zarthus: it tries blowfish, and if that fails, it tries plain. (yes, that's prone toa degradation attack, but blowfish itself already is insecure, so eh). but there's no way to set the mechanism to use right now. do you really need that?
<dominikh>
(it could be added.)
<Zarthus>
dominikh: it's not "necessary", but from what I gathered blowfish is less secure than PLAIN over TLS, so my preference goes to using PLAIN.
<dominikh>
I don't see how it could be less secure than PLAIN. BLOWFISH over TLS should be as secure as PLAIN over TLS, no?
<Zarthus>
I suppose it might just be the atheme implementation of blowfish, I am not sure. One second, I'll get a source.
<Zarthus>
I am not 100% confident if this applies to every services package, but it does apply to Atheme at least.
<dominikh>
that doesn't say that BLOWFISH over TLS is less secure than PLAIN over TLS. It's saying that BLOWFISH over an unencrypted connection is less secure than PLAIN over TLS. And that's of course true, BLOWFISH is sort of broken. BLOWFISH over TLS shouldn't be less secure than PLAIN over TLS, it's just pointless
<dominikh>
also, as that changelog says, atheme removed support for BLOWFISH alltogether, so if you connect to atheme services, Cinch will try BLOWFISH, it'll fail, and then it'll use PLAIN
<Zarthus>
alright, thanks for clearing up the confusion.
<dominikh>
(I would love to drop BLOWFISH support completely, but there's probably someone depending on it. I also hate myself for the downgrade attack I'm allowing, but there's probably people depending on that, as well…)
<dominikh>
People should just use ssl client certificates for authentication ;)
<Zarthus>
yeah that's a good alternative to authentication, I just ended up implementing sasl first, but it shouldn't be too much effort to end up also allowing for SSL authentication
<Zarthus>
eerr, client certificates*
<dominikh>
are you writing your own services?
<Zarthus>
nope - just using cinch for generic irc plugins and getting familiar with ruby in general.
<dominikh>
because you said you implemented SASL
<Zarthus>
Yeah it's a bit misphrased, it's more or less just referring to "reading the password from a configuration file and then telling cinch to use that"