NNPS / TCP port 433

Grant Taylor gtaylor at tnetconsulting.net
Thu Oct 28 18:04:35 UTC 2021


On 10/28/21 1:24 AM, Julien ÉLIE wrote:
> Hi Grant,

Hi Julien,

> And also a less known 532 port:
> netnews    - 532 - readnews
> 
> https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?&page=10 
> 
> Still reserved for Netnews, but no longer used nowadays (it used to by a 
> Microsoft reader client decades ago, but I have no more information).

O.o???

I searched IANA's DB for "NNTP" and came up with the three ports.  I'm 
sort of glad that netnews / readnews didn't come up because it sounds 
like more of a Microsoft proprietary thing than it does an open standard 
used by anything outside of the Microsoft ecosystem.  So, baring any 
encouragement to mess with it, I'm going to ignore as opposed to being 
ignorant of it.

But thank you for the pointer to it.  #TIL....

> Because it is more detailed in RFC 4642 (defining STARTTLS) which was 
> updated by RFC 8143 (discouraging STARTTLS, in benefit to implicit TLS 
> connections, amongst other things).

ACK

The powers that be ~> industry seems to keep waffling back and forth on 
explicit vs implicit port encryption.  As I understand it, it started 
with separate implicit ports (a port was either encrypted exclusive or 
not) because STARTTLS was not yet a thing.  Then it went to combined 
explicit ports (because you explicitly stated if you wanted encryption). 
  And now we seem to be going back to separate implicit ports in an 
attempt to avoid downgrade attacks on explicit ports.

I'll have to check out RFC 8143 to see what I'm missing.  Thank you for 
the pointer.

> That's right, as Russ answered earlier.

ACK

> Nonetheless, I have another question, now that implicit TLS is the 
> preferred way to use TLS.
> 
> - For news servers with both transit and reader facilities on the same 
> daemon, port 119 can be used unencrypted, and port 563 with TLS (even 
> for the transit facility by the way).

ACK

> Port 433 remains unencrypted for the transit facility, if a separate 
> port is needed.

I would expect that the NNSP port 433 could be explicit encrypted via 
STARTTLS much like NNTP port 119.

> - For mode-switching news servers like INN, port 119 can be used 
> unencrypted for transit and reader facilities, and port 563 with TLS for 
> reader.

ACK

> Port 433 remains unencrypted for the transit facility.

I'm not sure.  (See above comment.)

> And then the question is: what should be done for transit with implicit 
> TLS?

I'm of the mind that we as the NNTP using community make a server rule 
-- a la. "house rule" -- that the NNSP port 433 be implicitly TLS 
protected much like NNTPS port 563 is.  --  I say this because the 
current industry best practices are to use implicit encryption.  So if 
the NNSP port 433 is largely unused and we want to start making use of 
it, why not impose implicit encryption.

Have NNTP port 119 be legacy mixed use, NNSP port 433 be implicit 
encryption for server-to-server, and NNTPS port 563 be implicit 
encryption for client-to-server?

For the rest of this message, I'm assuming the following:

NNTP  - 119 - c2s / s2s - unencrypted or explicit encryption
NNSP  - 433 -       s2s - implicit encryption
NNTPS - 563 - c2s       - implicit encryption

Consider this a request for comments on the above proposal.

> We cannot run 2 innd instances (one for unencrypted connections, 
> another one for implicit TLS).

I'm not yet convinced that we need a 2nd instance of INN(d) running. 
Instead, I think that what I'm experimenting with in the NNTPS pointers 
thread could be used to provide the three ports listed above via one 
instance of INN(d).

> Wouldn't we need a 4th port for that?

I'm not convinced that we do need a 4th port.  Sure, one could be 
defined for uniformity.  But I think doing so would be questionable in 
these days of opportunistic encryption ~> encrypt everything possible.

> Or say port 433 is for implicit TLS for mode-switching servers?

As indicated above, I'm inclined to say that NNSP/433 uses implicit TLS 
protection.

> (But then, separating unencrypted transit and reader cannot be done.)

I'm content separating transit and reader at the client side; NNSP/433 
and NNTPS/563 respectively.  I don't see an actual /need/ to be able to 
have encrypted transport and reader on the same port.

On the off hand chance that I wanted encrypted transport & reader on the 
same port, I could leverage a different aspect of the NNTPS pointers 
thread to differentiate known transport peers from readers via remote IP 
addresses connecting to the local server.  Or said another way, assume 
that $PORT is mode reader by default and only transport for known remote 
IPs.

P.S.  Russ, thank you for your reply.  I rolled my responses to your 
message into this longer message.



-- 
Grant. . . .
unix || die

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4013 bytes
Desc: S/MIME Cryptographic Signature
URL: <https://lists.isc.org/pipermail/inn-workers/attachments/20211028/a61e969a/attachment.bin>


More information about the inn-workers mailing list