My understanding is that TLS 1.3 is secure and a good way to proceed.
--- ENiGMA 1/2 v0.0.11-beta (linux; x64; 12.13.1)NuSkooler
Xibalba BBS @ xibalba.l33t.codes / 44510(telnet) 44511(ssh)
ENiGMA 1/2 BBS WHQ | Phenom | 67 | iMPURE | ACiDic
Your not butting in at all, and if you are you are welcome too.. :)
For testing we can use self-signed certs.
What is still missing is some authentication of incoming connections if no session password is configured. On the TLS level we could use client certificates, but it would make everything more complicated and less flexible.
--- ENiGMA 1/2 v0.0.11-beta (linux; x64; 12.13.1)NuSkooler
Xibalba BBS @ xibalba.l33t.codes / 44510(telnet) 44511(ssh)
ENiGMA 1/2 BBS WHQ | Phenom | 67 | iMPURE | ACiDic
Sysop: | Shaun Ewing |
---|---|
Location: | Blue Mountains, Australia |
Users: | 193 |
Nodes: | 16 (0 / 16) |
Uptime: | 91:33:21 |
Calls: | 142 |
Calls today: | 2 |
Files: | 187,815 |
Messages: | 323,508 |