E-Mail Security. Raj Jain. Washington University in St. Louis



Similar documents
Electronic Mail Security

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Internet Technology 2/13/2013

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Networking Applications

Spam, Spam and More Spam. Spammers: Cost to send

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

DKIM last chance for mail service? TFMC2 01/2006

Chapter 6 Electronic Mail Security

, SNMP, Securing the Web: SSL

How To Stop Spam From Being A Problem

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

security

Information Security Basic Concepts

DKIM Enabled Two Factor Authenticated Secure Mail Client

Network Security Essentials Chapter 7

CS43: Computer Networks . Kevin Webb Swarthmore College September 24, 2015

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

How To Protect Your From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo

Security. Issues:

s and anti-spam Page 1

Exim4U. Server Solution For Unix And Linux Systems

Electronic mail security. MHS (Message Handling System)

Key Management and Distribution

Standards and Products. Computer Security. Kerberos. Kerberos

FTP and . Computer Networks. FTP: the file transfer protocol

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security: Focus of Control. Authentication

Why you need secure

Secure Frequently Asked Questions

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

Network Security Part II: Standards

Key Management and Distribution

Cryptography and Network Security

Marketing Glossary of Terms

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

MDaemon Vs. Microsoft Exchange Server 2013 Standard

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Chapter 10. Network Security

Chap. 1: Introduction

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Telematics. 13th Tutorial - Application Layer Protocols

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Management CSCU9B2 CSCU9B2 1

Collateral Damage. Consequences of Spam and Virus Filtering for the System. Peter Eisentraut 22C3. credativ GmbH.

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

Communication Systems Network Applications - Electronic Mail

Comprehensive Filtering. Whitepaper

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

Chapter 8. Network Security

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

A Noval Approach for S/MIME

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Antispam Security Best Practices

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

XGENPLUS SECURITY FEATURES...

An Overview of Spam Blocking Techniques

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Prof. Sead Muftic Feng Zhang. Lecture 10: Secure Systems

The Case For Secure

Ciphermail Gateway Administration Guide

FortiMail Filtering Course 221-v2.2 Course Overview

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

Anti-spam filtering techniques

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check

COSC 472 Network Security

Blackbaud Communication Services Overview of Delivery and FAQs

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections

Message Authentication Signature Standards (MASS) BOF. Jim Fenton Nathaniel Borenstein

SMTPSWITCH MAILER V6 FEATURES

Internet Security [1] VU Engin Kirda

Network Security Concepts: Review

Transport Level Security

Electronic Mail

Ciphire Mail. Abstract

PGP from: Cryptography and Network Security

What is a Mail Gateway?... 1 Mail Gateway Setup Peering... 3 Domain Forwarding... 4 External Address Verification... 4

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

Q: Why security protocols?

Transcription:

E-Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/ 16-1

Overview Email Overview: SMTP, POP, IMAP, Radix-64, MIME Security Services: Privacy, authentication, Integrity, Non-Repudiation, Anonymity Secure Email Standards: S/MIME, PGP, DKIM, Spam 16-2

Internet Email Overview Simple Mail Transfer Protocol (SMTP): Protocol to deposit email in another user s mailbox Was originally designed for 7-bit ASCII text messages Post Office Protocol (PoP): Protocol to retrieve email from your mailbox Authenticates the user Internet Mail Access Protocol (IMAP) Multimedia Internet Mail Encoding (MIME): To encode non-text messages SMTP Client SMTP FROM:jain@wustl.edu TO:jain@acm.org SMTP Server SMTPd Mail boxes At acm.org 16-3 PoP Server PoPd PoP PoP Client

SMTP Defined in RFC 2821 and RFC 2822 Clients connect to port 25 of SMTP server It is a push protocol and does not allow to pull Extended SMTP (ESMTP) is defined in RFC 2821 ESMTP uses EHLO in stead of HELO ESMTP allows finding the maximum message size SMTP-AUTH is an authentication extension to SMTP (RFC 4954) Allows only authorized users to send email 16-4

Radix-64 Encoding 16-5

--unique-boundary-1 Content-Type: multipart/parallel; boundary=unique-boundary-2 --unique-boundary-2 Content-Type: audio/basic Content-Transfer-Encoding: base64... base64-encoded 8000 Hz single-channel u-law-format audio data goes here... --unique-boundary-2 Content-Type: image/gif Content-Transfer-Encoding: Base64... base64-encoded image data goes here... MIME Example 16-6

Security Services for E-MailE Privacy: of content Authentication: of Sender Integrity: of Content Non-repudiation: Sender cannot deny Proof of Submission: Proof of sending (Certified mail) MTA can sign a message digest Proof of Delivery: to recipient (return receipt + Content non-repudiation) Message flow confidentiality Anonymity 16-7

Security Services for E-Mail E (Cont) Containment: Keeping messages in a security zone Audit: event log Accounting: Accounting log Self Destruct: Receiving mail program will destroy the message Message Sequence Integrity: in-order delivery 16-8

1-to-1 Public Keys: Establishing Keys Need public key to send an encrypted message Can sign a message and send a certificate Secret Keys: Via KDC 16-9

Employee vs. Employer End-to-End Privacy Privacy Use public key to encrypt a secret key Same encrypted message can be sent to multiple recipients Distribution lists require trusting the exploder 16-10

Source Authentication Sign a hash of the message with private key (Good for distribution lists also) Secret Key: MAC=CBC residue with secret key Message digest of the secret key Message digest is encrypted with the secret key (Same digest for multiple recipients) Can share a secret key with mail exploder 16-11

Message Integrity Generally goes with source authentication Integrity with source anonymity is meaningless You can use a shared secret Anyone can change the message encrypted or protected with public key 16-12

Public Key: Non-Repudiation Non-Repudiation: sender signs the message with private key Plausible Deniability: Sender computes a MAC using a random key S and sends [[S] Bob Public ] Alice Private Secret Key: Non-Repudiation: Notary N. N and receipient share a secret N computes a seal = digest of the message and alice's name using a secret key N shares a secret key with recepient and sends A MAC of the message, seal, and Alice. A judge could ask N to verify if the seal is valid. 16-13

Proof of Delivery Delivering MTA or recipient can sign a message digest Impossible to prove that recipient got the message. If recipient signs it before getting the last part of the message, it may not get complete message but has signed. If recipient signs after getting the last part of the message, it may not sign but has the message. 16-14

Verifying Posting Date Preventing Backdating: Notary signs and dates the message Preventing Postdating: Notary signs and dates the message along with a fact not known before the date, e.g., newspaper headline, lottery number,... 16-15

Digital Postmarks Post office can date stamp your document (Service available in USA and other countries also) Client software signs a document and sends it to DPM service DPM authenticates the signature, generates a timestamp and signs the resulting package (hash of message, signature, time) The DPM receipt is sent to the client software and also stored in a non-repudiation database with the message and signature The client software wraps the original document and DPM receipt Anyone can verify the signature and time Original document can be requested from DPM service database www.usps.com/electronicpostmark/ 16-16

Anonymity penet.fi allowed two-way communication. Assigned code name to sender. If someone replies they are also assigned a code name Assigned code name to the source exploder of the replies. Message Flow Confidentiality Can send random messages through third party Can use several intermediaries 16-17

Anonymous Remailers Pseudonymous Remailers: Give a pseudonym to the sender and send. Keep a log of pseudonym and actual address => Can be disclosed Cypherpunk Remailers: Removes the senders address (no return address) => No log Mixmaster Remailers: Anonymous remailer that sends messages in fixed size packets and reorders them to prevent tracing Mixminion Remailers: Strongest anonymity. Handle replies, forward anonymity, replay prevention, key rotation, exit policies, integrated directory servers, dummy traffic 16-18

Secure Email Standards Privacy Enhanced Mail (PEM) - Not deployed S/MIME - Uses PEM principles PGP STARTTLS (SMTP over TLS RFC 2487) SMTP-AUTH (SMTP with password authentication) DKIM 16-19

Secure MIME S/MIME Originally developed by RSA Data Security Inc. Later control passed on to IETF Can use any certificate Bob first sends a signed message with a certificate Alice can then send an encrypted message to Bob PEM and S/MIME use X.500 names S/MIME requires Email as "Alternate Name" in the X.509 certificate Also, a new component E was added to the X.500 name 16-20

S/MIME Example -----------boundarymarker Content-Type: application/pkcs7-signature; name= smime.p7s Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename= smime.p7s Content-Description: S/MIME Cryptographic Signature ABDECDIPAQaAIHGNPAISJPDSFPSDNADNPA -----------boundarymarker 16-21

Pretty Good Privacy (PGP) Used RSA and IDEA (RSA patent in US until 2000) V2.6.2 became legal for use within US and can be downloaded from MIT A patent-free version using public algorithm has also been developed Code published as an OCRable book Open PGP and GNU Privacy Guard Uses certificates issued by almost anyone Certificates can be registered on public sites, e.g., MIT hushmail.com is an example of pgp mail service 16-22

DomainKeys Identified Mail (DKIM) RFC 4871 Sending MTA inserts a signature on behalf of the sender Verifying (Receiving) MTA verifies the signature based on public key of the sender 16-23

Spam Statistics 30 Billion spams per day (June 2005) to 90 billion spams per day (feb 2007) 80 to 85% of mail is spam Most spam originates from USA (19.6%) but 73.58% of spamvertisers are in China. Addresses are harvested from web pages, usenet groups, corporate directories Spam is sent using botnets, open relays, and open proxies Many DNS blackhole list sites were closed down due to DDoS attacks 16-24

CAN-SPAM Act of 2003 Spamming is a misdemeanor You can send unsolicited commercial email iff 1. Unsubscribe compliance Unsubscribe mechanism Opt-out honored within 10 days Opt-out lists used only for compliance 2. Content compliance Accurate from, subject, advertisers address Identify Adult content 3. Sending behavior Compliance Not sent through an open relay Not sent to harvested address Cannot contain false header 16-25

Anti-SPAM:End SPAM:End-User Techniques Address munging: jain at wustl dot edu Avoid responding to spam Use contact forms Disable HTML in e-mail: Web bugs (1x1 transparent gifs) can identified who read the mail Disposable e-mail addresses Reporting spam: spam@uce.gov Responding to spam: Overload the advertiser 16-26

Anti-SPAM:Administrator Techniques Authentication and Reputation Challenge/Response Systems Checksum-based filtering: Matching checksum => Spam, hash busters Country-based filtering DNS Black Lists Enforcing RFC standards HELO/EHLO checking: HELO 127.0.0.1 or HELO localhost Greylisting: Error code 4xx => Retry later Fake MX Records: Multiple MX records, spammers do not retry Greeting delay: Spammers do not wait 16-27

Administrator Techniques (Cont) Hybrid filtering: Pattern matching and scoring Rule-based filtering: more general filtering and scoring Statistical content filtering: Learning from user submitted spam/ham Reverse DNS checks: Email address domain=ip address domain? Sender-supported whitelists and tags: Certified not be spammer SMTP callback verification: Check return address 16-28

Anti-SPAM: Sender ISP Techniques Background checks on new users and customers Confirmed opt-in for mailing list: Removes false submission Egress spam filtering: Check customer's email addresses Limit e-mail backscatter: bouncing messages Port 25 blocking Port 25 interception: Rate limit and egress spam filter Rate limiting Monitor Spam reports Strong Acceptable Use Policy 16-29

Honeypots Spamtraps Anti-SPAM:Law Enforcement 16-30

Summary UA, MTA, SMTP, PoP, IMAP, Radix-64, MIME Encryption is done using secret keys, which are sent using public key encryption S/MIME and PGP both use certificates Spam identification/reduction requires recipient, adminstrators, ISPs, and government actions 16-31

Homework 16 Read chapter 20 complete, and relevant sections of 21, 22 of the textbook Try answering Exercise 20.4 and 20.7 16-32