The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.



Similar documents
DRAFT NIST Special Publication Trustworthy

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Internet Architecture

DKIM last chance for mail service? TFMC2 01/2006

Security. Guevara Noubir Network Security Northeastern University

Security 1 / 43

Secure Frequently Asked Questions

The GlobalCerts TM Secur Gateway TM

Trust in Begins with Authentication

Using WinGate 6 . Concepts, Features, and Configurations.

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Network Services. SMTP, Internet Message Format. Johann Oberleitner SS 2006

Options for encrypted communication with AUDI AG Version of: 31 May 2011

Ciphire Mail. Abstract

CIPHERMAIL ENCRYPTION. CipherMail white paper

Secured Mail through PGP Mail Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Djigzo encryption. Djigzo white paper

CS43: Computer Networks . Kevin Webb Swarthmore College September 24, 2015

PGP Universal Satellite Version 2.7 for Windows Release Notes

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Emacs SMTP Library. An Emacs package for sending mail via SMTP. Simon Josefsson, Alex Schroeder

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

MAPI Connector Overview

A Guide Systems and Security. Brian Donadio. East Carolina University

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Why you need secure

CipherMail Gateway Quick Setup Guide

Table of Contents. Electronic mail. History of (2) History of (1) history. Basic concepts. Aka (or according to Knuth)

DKIM Enabled Two Factor Authenticated Secure Mail Client

Cyber Warnings E-Magazine August 2015 Edition Copyright Cyber Defense Magazine, All rights reserved worldwide

SESA Securing with Cisco Security Appliance Parts 1 and 2

Clearswift Information Governance

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Linux Network Administration

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Public Key Infrastructure (PKI)

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

Application Firewalls

DJIGZO ENCRYPTION. Djigzo white paper

GlobalSign Enterprise Solutions

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

Digital certificates and SSL

Ciphermail for BlackBerry Quick Start Guide

Encryption of Traffic

sendmail Cookbook Craig Hunt O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

What is a Mail Gateway?... 1 Mail Gateway Setup Peering... 3 Domain Forwarding... 4 External Address Verification... 4

DomainKeys Identified Mail (DKIM) Service Overview

Domain Name System (DNS)

BITS SECURITY TOOLKIT:

74% 96 Action Items. Compliance

Sonian Getting Started Guide October 2008

Sending s without the risk! Secure Communications with Rohde & Schwarz

How To Write An On A Linux Computer (No Mail) (No ) (For Ahem) (Or Ahem, For Ahem). (For An ) Or Ahem.Org) (Ahem) Or An

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Electronic Mail

Receiving Secure from Citi For External Customers and Business Partners

Secur User Guide

DANE for SMTP. Viktor Dukhovni & Wes Hardaker. IETF 87, Berlin July 2013

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Chapter 6 Electronic Mail Security

Network Security Essentials Chapter 7

Best Practices

Chapter 10. Cloud Security Mechanisms

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Exim4U. Server Solution For Unix And Linux Systems

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

Migration Project Plan for Cisco Cloud Security

Secure Client Applications

DomainKeys Identified Mail DKIM authenticates senders, message content

A Guide to Secure

Secure User Guide

Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 ( /5049/5050) Course KC Days OVERVIEW COURSE OBJECTIVES AUDIENCE

F-Secure Internet Gatekeeper

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

IBM i. Networking . Version 7.2

Early 1990s Steve Case and AOL

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

EAL4+ Security Target

Internet Security [1] VU Engin Kirda

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Spam, Spam and More Spam. Spammers: Cost to send

Libra Esva. Whitepaper. Glossary. How Really Works. Security Virtual Appliance. May, It's So Simple...or Is It?

How to Build an Effective Mail Server Defense

Solution Brief FortiMail for Service Providers. Nathalie Rivat

SPAMfighter SMTP Anti Spam Server

Overview. SSL Cryptography Overview CHAPTER 1

XGENPLUS SECURITY FEATURES...

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

SMTP Servers. Determine if an message should be sent to another machine and automatically send it to that machine using SMTP.

How To Protect Your From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Transport server data paths

Computer Networks - CS132/EECS148 - Spring

Transcription:

Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components act as both. Some are used by end users, are some are completely automated. In addition to the core components, some organizations use special purpose components that provide a specific set of security features. There are also other components used by mail servers when performing operations. These include the Domain Name System (DNS) and other network infrastructure pieces. The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Fig X- 1: Main components used for email Mail User Agents (MUAs) Most end users interact with their email system via a Mail User Agent (MUA). A MUA is a software component that allows an end user to compose and email message and send it to one or more recipients. The message is then sent to a server for sending. The MUA also the component used by end users to access a mailbox where emails have been delivered. MUA's are available for a variety of systems including mobile hosts. The proper secure configuration for an MUA depends on the MUA in question and the system it is running on. Some basic recommendations can be found in Section MM.

MUA's may utilize several protocols to connect to and communicate with email servers (see Section PP below). There may also be other features as well such as a cryptographic interface for producing encrypted and/or digitally signed email. Mail Transfer Agents (MTAs) Email is transmitted across networks via Mail Transfer Agents (MTAs). MTA's communicate using the Simple Mail Transfer Protocol (SMTP) described below and act as both client and server, depending on the situation. For example, an MTA can act as a server when accepting an email message from an end user's MUA, then act as a client in connecting to and transferring the message to the recipient domain's MTA for final delivery. MTA's can also act as more specialized agents such as: Mail Submission Agents (MSA): An MTA that accepts mail from MUA's and begins the transmission process by sending it to a MTA for further processing. Often the MSA and first- hop MTA is the same process, just fulfilling both roles. Mail Delivery Agent (MDA): An MTA that receives mail from an organization's inbound MTA and ultimately places the message in a specific mailbox. Like the MSA, the MDA could be a combined in- bound MTA and MDA component. MTA's may also perform various security functions to prevent malicious email from being delivered or include authentication credentials such as digital signatures (see Section DKIM). These security functions may be provided by other components that act as lightweight MTA's or these functions may be added to MTA's via filters or patches. Guidance for deploying and configuring a MTA for Federal agency use exists as NIST SP 800-45 "Guidelines on Electronic Mail Security" [SP800-45]. In addition, the Dept. of Homeland Security (DHS) has produced the Email Gateway Reference Architecture [REFARCH] for agencies to use as a guide when setting up or modifying the email infrastructure for an agency. Special Use Components In addition to MUA's and MTA's, an organization may use one or more special purpose components for a particular task. Some of these may implement part or all of the Simple Mail Transfer Protocol (see below) or use another protocol altogether. In some cases these special use components may provide a security function such as malware filtering, or may provide some business process functionality such as email archiving or content filtering.

Given the variety of components, there is no one single set of configurations for an administrator to deploy. An administrator should consult the documentation for their given component. Special Considerations for Cloud and Hosted Service Customers Organizations that outsource their email service (whole or in part) may not have direct access to MTA's or any possible special use components. Secure configuration of these devices are done by the provider in cases of Email as a Service (EaaS). Customers of Infrastructure as a Service (IaaS) may have sufficient access privileges to configure their email servers themselves. In either set- up, the enterprise may have complete configuration control over MUA's in use. Related Components In addition to MUA's and MTA's, there are other network components used to support the email service for an organization. Most obviously is the physical infrastructure: the cables, WiFi access points and the routers and switches that make up the network. In addition, there are network components used by email components in the process of completing their tasks. This includes the Domain Name System, Public Key Infrastructure, and network security components that are used by the organization. Domain Name System The Domain Name System (DNS) is a global, distributed database and associated lookup protocol. DNS is used to map a piece of information (most commonly an IP address) to a human readable domain name. The DNS is used by MUA's and MTA's to find the address of the next- hop server for mail delivery. Sending MTA's query for the Mail Exchange Resource Record (MX RR) for the recipient's domain (the right hand side of the "@" symbol) in order to find the receiving MTA to contact. The DNS is also used as the publication method for protocols designed to protect email and combat malicious, spoofed email. Technologies such as Sender Policy Framework, DomainKeying Internet Mail and other use the DNS to publish policy artifacts or public keys that can be used by receiving MTA's to validate that a given message originated from the sending domain's mail servers. These protocols are discussed in Section XX. In addition, there are new proposals to encode end- user certificates (for S/MIME or OpenPGP) in the DNS using a mailbox as the hostname. These protocols are discussed in Section XX. A third use of the DNS with email is with reputation services. These services provide information about the authenticity of an email based on the purported sending domain or originating IP address. These services do not rely on the anti- spoofing techniques described above but through historical monitoring, domain registration history, and other information sources. These services are often used to combat unsolicited bulk email (i.e. spam) and malicious email that could contain malware or links to subverted websites.

Recommendations for deploying DNS in a security manner are beyond the scope of this document. Readers are directed to NIST SP 800-81 [SP800-81] for recommendations on deploying DNS. Enterprise Perimeter Security Components Organizations may utilize security components that do not directly handle email, but may perform operations that affect email transactions. These include network components like firewalls, Intrusion Detection Systems (IDS) and similar malware scanners. These systems may not play any direct role in the sending and delivering of email but may have a significant impact if misconfigured. This could result in legitimate SMTP connections being denied and the failure of valid email from being delivered. Network administrators should take the presence of these systems into consideration when making changes an organization's email infrastructure. Public Key Infrastructure and Web of Trust Organizations that send and receive S/MIME or OpenPGP protected messages will also need to rely on the certificate infrastructure used with these protocols. This does not always require the deployment of a dedicated system, but does require administrator time to obtain, configure and distribute security credentials to end- users. S/MIME uses X.509 certificates [RFC5280] to store public keys used to validate digital signatures and encrypt email. X.509 certificates are issued by an organization or Certificate Authority (CA) for and individual end- user (for S/MIME) or MTA (for SMTP over TLS). Recommendations for S/MIME protected email are given in Section XX. Recommendations for SMTP over TLS are given in Section XX. Federal agency network administrators should also consult NIST SP 800-57 Part3 [SP800-57P3] for further guidance on cryptographic parameters and deployment of any PKI components and credentials within an organization. OpenPGP is an alternative to S/MIME that uses its own certificate format. Instead of using a hierarchical system of certificate issuers anchored by a collection of root certificates (Certificate Authorities), OpenPGP users can use a variety of methods to distribute and authenticate certificates. The most straightforward publication method is to use a public key server [REF?] to get another user's certificate. The downside is that, as these servers are public, an attacker can submit a certificate with a spoofed email address to trick senders into using it to send mail to an attacker instead of (or addition to) the intended recipient. To validate another end- user's certificate OpenPGP used the concept of a Web- of- Trust. In a Web- of- Trust, each user digitally signs Email protocols There are two types of protocols used in the transmission of email. The first are the protocols used to transfer messages between MTA's and their end users (using MUA's. The second is the protocol used to transfer messages between mail servers.

This guide is not meant to be an in- depth discussion of the protocols used in email. The protocols discussed here simply for background information. Simple Mail Transfer Protocol Email messages are transferred from one mail server to another (or from an MUA to MSA/MTA) using the Simple Mail Transfer Protocol (SMTP). SMTP was originally specified in 1982 as RFC 281, but has undergone several revisions; the most current being RFC 5321 [RFC5321]. SMTP is a client- server protocol where client (email sender) contacts the server (next- hop recipient) and issues a set of commands to tell the server about the message to be sent, then sending the message itself. The majority of these commands are ASCII text messages sent by the client and a resulting return code (and additional ASCII text) returned by the server. The basic SMTP connection procedure is shown below in Fig X- 2: Fig X- 2: Basic SMTP Connection Set- up In the above, the client initiates the connection using TCP over port 25 1. After the initial connection the client and server perform a series of SMTP transactions to send the message. These transactions take the form of first stating the return address of the message (known as the return path) using the MAIL command, then the recipient(s) using the RCPT command and ending with the DATA command which contains the header and body of the email message. After each command the server response with either a positive or negative (i.e. error) code. SMTP servers can advertise the availability of options during the initial connection. These extensions are originally defined in RFC 1869 [RFC1869]. These options usually deal with the transfer of the actual message and will not be covered in this guide except for the STARTTLS option. This option given by the server is used to indicate to the client that Transport Layer Security (TLS) is available. SMTP over TLS allows the email message to be sent over an encrypted channel to protect 1 Although MUA's often use TCP port 587 when submitting email to be sent.

against monitoring a message in transit. Recommendations for configuring SMTP over TLS are given in Section XX. Mail Access Protocols MUA's typically do not use SMTP when retrieving mail from an end- user's mailbox. MUA's use another client- server protocol to retrieve the mail from a server for display on an end- user's host system. These protocols are commonly called Mail Access Protocols and are either Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP). Most modern MUA's support both protocols but an enterprise service may restrict the use of one in favor of a single protocol for ease of administration or other reasons. Recommendations for the secure configuration of these protocols are given in Section XX. POP3 [RFC1939] is the simpler of the two protocols and typically downloads all mail for a user from the server, then deletes the copy on the server, although there is an option to maintain it on the server. POP3 is similar SMTP, in that the client connects to a port (normally tcp/110, or tcp/995 when using TLS) and sends ASCII commands, to which the server responds. When the session is complete, the client terminates the connection. POP3 transactions are normally done in the clear, but an extension is available to do POP3 over TLS using the STLS command, which is very similar to the STARTTLS option in SMTP. Clients may connect initially over port 110 and invoke the STLS command, or alternatively, most servers allow TLS by default connections on port 995. IMAP [RFC3501] is an alternative to POP3 but includes more built- in features that make it more appealing for enterprise use. IMAP clients can download email messages, but the messages remain on the server. This and the fact that multiple clients can access the same mailbox simultaneously mean that end- users with multiple devices (laptop and smartphone for example), and keep their email synchronized across multiple devices. Like POP3, IMAP also has the ability to secure the connection between a client and a server. Traditionally, IMAP uses tcp/port 143, but can use a STARTTLS- like option or default to TLS and use tcp/port 993 instead. In addition to POP3 and IMAP, there are other proprietary protocols in use with certain enterprise email implementations. Microsoft Exchange clients 2 can use the Messaging Application Programming Interface (MAPI/RPC) to access a mailbox on a Microsoft Exchange server (and some other compatible implementations). Some cloud providers require clients to access their cloud- based mailbox using a web portal as the MUA instead of a dedicated email client. 2 Administrators should consult their implementation's version- specific documentation on the correct security configuration.

Email Message Format: Multi- Purpose Internet Mail Extensions In the early days of the Internet, email was sent in straight ASCII format. However, now every modern MUA's send and present email that uses the Multi- purpose Internet Mail Extensions (MIME) [RFC1521], [RFC1522]. MIME allows email to contain non- ASCII character sets as well as other non- text message components and attachments. MIME allows for an email message to be broken into parts, with each part identified by the version in use and content type. Typical content types include text/plain (for ASCII text), image/jpeg, text/html, etc. The available types are listed in an IANA registry 3 for developers, but not all may be understood by all MUA's. Security in MIME Messages There is an extension to MIME to include types for digital signatures and encrypted content. These extensions are known as Secure Multi- purpose Internet Mail Extensions (S/MIME) [RFC3850], [RFC3851]. S/MIME provides authentication, integrity and non- repudiation (via digital signatures) and confidentiality (via encryption) to email messages. S/MIME utilizes asymmetric keys for cryptography (i.e. public key cryptography) where the public portion is normally encoded and presented as X.509 digital certificates. However, there is also a MIME type defined for use with OpenPGP [RFC3156]. So enterprises can use S/MIME with either an X.509 PKI infrastructure or OpenPGP. Fig X- 3: Sending a Digitally Signed Message When an end- user wishes to send a S/MIME digitally signed message (Fig X- 3), they first compose the message, then use the private portion of their S/MIME key pair to generate the digital signature. End - users need to have an MUA that supports S/MIME and the necessary cryptographic libraries to access the private key and generate the signature. The receiver of the S/MIME message then uses the sender's public key (from the sender's X.509 certificate) and validates the digital signature. 3 http://www.iana.org/assignments/media- types/media- types.xhtml

The receiver can also check to see if the senders certificate has a valid PKIX chain back to a root certificate the receiver trusts to further authenticate the sender if they have no prior association (and does not have the sender's certificate stored locally). Fig X- 4: Sending an Encrypted Email An end- user who wishes to send a S/MIME encrypted message (Fig X- 4) to another user must first obtain the recipient's certificate and use the public key to encrypt the composed message. The recipient then uses the private portion of the key pair to decrypt the message for reading. In this case the sender must possess the recipient's certificate before sending the message. The sender also has the option of digitally signing the message with the sender own private key to provide authentication and integrity protection. An enterprise looking to use S/MIME to provide email security will need to obtain or produce credentials for each end user in the organization. An organization can generate its own root certificate and give its members a certificate generated from that root, or purchase certificates for each member from a well- known Certificate Authority (CA). Either way, the organization must make their members' certificate(s) (and any enterprise certs) available for end- users outside of the enterprise in order to validate digital signatures and generate encrypted messages for end- users in the enterprise. This can happen in a variety of methods; see Section XX for potential solutions. Pretty Good Privacy Pretty Good Privacy (PGP) was originally developed in 1991 but later made open source as OpenPGP [RFC4880] and is usually the version found in most implementations. OpenPGP is similar to S/MIME with X.509 (usually referred to as just S/MIME) certificates in that it provides authentication, integrity protection, non- repudiation and confidentiality using asymmetric cryptography. The public portion of the asymmetric key is encoded in a digital certificate, but one that does not use the X.509 format.

The main difference between OpenPGP and S/MIME is that OpenPGP does not rely on a hierarchical PKI to chain trust from an end- user's certificate to a trusted root certificate. OpenPGP uses the Web- of- Trust, in which certificate holders generate digital signatures over other users' certificates. In this way, end- users vouch for each other. Using a Web- of- Trust a recipient of an OpenPGP signed message may be able to authenticate the sender if they can trace the sender's certificate to another, previously trusted member of the recipient's Web- of- Trust. Like S/MIME, one of the biggest hurdles of deployment is obtaining the certificate of another user in order to send an encrypted message, or validate a digital signature. OpenPGP does have the concept of public key servers that allow any certificate holder to publish a certificate associated with a particular email address. However, there is no vetting of this process, so a malicious actor could submit a certificate for a spoofed email address, and include their own to possibly intercept sensitive email. There are some alternative ways to publish certificates using the DNS, as described in Section XX