Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Email Security
Contents
Why?
Distribution Lists
Mail Infrastructure
Security Characteristics
Authentication
Confidentiality
Non-repudiation
Solutions:
PEM
S/MIME
PGP
Current email
Email Fundamentals
Email Fundamentals
Client
Mail
Server
Mail
Server
Mail
Server
Client
Email Fundamentals:
Important Services
Verification of IP addresses:
Whois
www.samspade.org
Numerous other websites.
My Favorite.
Email Fundamentals:
Important Services
Domain Name System (DNS) translates between
domain names and IP address.
4.
5.
6.
Email Fundamentals:
Important Services
10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255
192.168.0.0-192.168.255.255
Email Protocols:
Email Protocols:
Email Protocols:
Post Office
Service
Protocol
Characteristics
Stores only
incoming
messages.
POP
Stores all
messages
IMAP
MS MAPI
Lotus
Notes
Web-based send
and receive.
HTTP
helo 129.210.16.8
250 server8.engr.scu.edu Hello dhcp-19-198.engr.scu.edu [129.210.19.198], pleased to meet you
data
354 Enter mail, end with "." on a line by itself
quit
221 2.0.0 server8.engr.scu.edu closing connection
SMTP Headers:
SMTP Headers
To enable headers:
Eudora:
Hotmail:
MS Outlook:
Juno:
Yahoo!:
SMTP Headers
Originator fields
Informational Fields
Identification Fields
Resent Fields
SMTP Headers
Trace Fields
SMTP Headers
SMTP Header
Server Logs
Account received
IP address from which they were sent.
Time and date (beware of clock drift)
IP addresses
Server Logs
Law-enforcement:
Company:
Unix Sendmail
Simplest:
Distribution List
Sender
Distribution List
Maintainer
msg
msg
recipient
recipient
msg
recipient
msg
recipient
msg
recipient
Distribution List
Get list
Sender
msg
msg
List
msg
msg
msg
recipient
recipient
recipient
recipient
recipient
Local Exploder
Remote Exploder
Mail Handling
Mail Infrastructure
Two Standards
SMTP
Mail Infrastructure
MTA
MTA
MTA
UA
UA
Mail Infrastructure
Privacy
Authentication
Integrity
Non-repudiation
Proof of submission
Proof of Delivery
Anonymity
Containment
Audit
Accounting
Self Destruct
Key Establishments
Out-of-band transmission
PKI
Piggy-backing of certificates on email
messages.
Out-of-band transmission
Ticket via KDC.
Privacy
Threats
Eavesdropping.
Relay nodes might store messages.
Privacy
End-to-End Privacy
Privacy
Remote exploding:
Local exploding:
Source Authentication
Source Authentication
Various methods:
Source Authentication
Message Integrity
Why?
Repudiation
Hence non-repudiation.
Alice picks secret key S.
She encrypts S with Bobs public key: {S}
Bob.
She signs {S}
Bob with her private key: [{S}Bob]Alice
She uses S to compute a MAC for the message.
She sends the message, the MAC, and [{S}
Bob]Alice to Bob.
Bob knows that the message came from Alice because of
Alices private key.
Bob can create any other message with S, therefore, he cannot
prove that Alice send him that particular message.
Hence repudiation.
Repudiation
Needs a notary N.
Hence non-repudiation.
Proof of Submission /
Delivery
Message Flow
Confidentiality
Needs an intermediary.
Alice sends her email to Ivy, who
forwards it to Bob.
Alice periodically sends fake
messages to Ivy.
Ivy periodically sends fake
messages to random recipients.
Anonymity
Containment
uuencode
Verifying dates
Preventing Backdating
Preventing Postdating
PEM message
Establishing keys
Certification
Data canonicalization
Encryption
Integrity protection
MD2
MD5
Protected by cryptography
Multiple recipients
Forwarding
S/MIME
S/MIME
Mime introduces five new headers:
MIME-Version:
Content-Type:
Content-ID:
Content-Transfer-Encoding:
Content-Description:
S/MIME
Multipart
content-type
Content type
header
contains a
parameter
that defines
the delimiter
between body
parts.
S/MIME
S/MIME
S/MIME provides
Enveloped Data
Signed Data
Clear-signed Data
S/MIME
S/MIME
S/MIME
S/MIME
To make an SignedData MIME
S/MIME
Clear signing
S/MIME
Certification Hierarchy
Guerilla Freeware
Transfer Encoding
Binary
Text file
PGP messages