{"id":323,"date":"2004-10-14T17:06:42","date_gmt":"2004-10-14T17:06:42","guid":{"rendered":"http:\/\/maydanoz.arved.priv.at\/blog\/?p=323"},"modified":"2004-10-14T17:06:42","modified_gmt":"2004-10-14T17:06:42","slug":"the_most_common","status":"publish","type":"post","link":"https:\/\/arved.priv.at\/weblog\/2004\/10\/14\/the_most_common\/","title":{"rendered":"The most common insecure protocol"},"content":{"rendered":"<p>After TELNET has been replaced by SSH in many cases and serious admins have started to replace FTP with SFTP\/SCP the most common insecure protocols are IMAP and POP3.<br \/>\nAlthough most Emailprograms support a secure Emailprotocol the insecure variants are still much more common. I have installed the <a href=\"http:\/\/dovecot.org\/\">dovecot<\/a> IMAP\/POP3-server on my mailserver, but unfortunately at the moment it does not support SSL because the gnutls version in the FreeBSD ports collection is incompatible, so i read mail via SSH\/mutt which is probably a lot faster than waiting until Mail.app has synced my 70MB mailbox over my ADSL line.<br \/>\nAt university i always wonder that even computer science students don&#8217;t think when they start their MUA while connected to the university WLAN.<br \/>\nAnd I wonder even more when I read their passwords, more than 15% of my small sample (a 45 minutes course) use their surname as password.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After TELNET has been replaced by SSH in many cases and serious admins have started to replace FTP with SFTP\/SCP the most common insecure protocols are IMAP and POP3. Although most Emailprograms support a secure Emailprotocol the insecure variants are still much more common. I have installed the dovecot IMAP\/POP3-server on my mailserver, but unfortunately &hellip; <a href=\"https:\/\/arved.priv.at\/weblog\/2004\/10\/14\/the_most_common\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The most common insecure protocol&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-323","post","type-post","status-publish","format-standard","hentry","category-computer-networks"],"_links":{"self":[{"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/posts\/323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":0,"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/posts\/323\/revisions"}],"wp:attachment":[{"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/categories?post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arved.priv.at\/weblog\/wp-json\/wp\/v2\/tags?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}