Prof. Sead Muftic Feng Zhang. Lecture 10: Secure E-mail Systems



Similar documents
Lecture 10: 1. Secure E mail E systems. Systems. Page 1

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

Electronic Mail Security

Electronic mail security. MHS (Message Handling System)

Chapter 6 Electronic Mail Security

Cryptography and Network Security Chapter 15

Network Security Essentials Chapter 7

PGP from: Cryptography and Network Security

Security. Issues:

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

A Noval Approach for S/MIME

. MIME is the protocol that was devised to allow non-ascii encoded content in an and attached files to an .

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

Security. Why do we have to hide from the police, Daddy? Because we use PGP, son. They use S/MIME

Grid Computing - X.509

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Cryptography and Network Security

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda.

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail)

GlobalSign Enterprise Solutions

Software and Cloud Security

PrivaSphere Gateway Certificate Authority (GW CA)

Understanding digital certificates

, SNMP, Securing the Web: SSL

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Cryptography and Security

Integrating Fax Sending Services

Communication Systems Network Applications - Electronic Mail

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Security. Michael E. Locasto University of Calgary

Ciphermail for BlackBerry Reference Guide

Taxonomy of Security Protocol

Electronic Mail

Djigzo S/MIME setup guide

Security and privacy in public WLAN networks

Standards and Products. Computer Security. Kerberos. Kerberos

Ciphermail S/MIME Setup Guide

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

NetSec Exercise 8 Communication Mixes

infilename outfilename signcert privkey headers flags

Chapter 8. Network Security

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Gateway

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Specifying the content and formal specifications of document formats for QES

CS549: Cryptography and Network Security

Installing your Digital Certificate & Using on MS Out Look 2007.

Telematics. 13th Tutorial - Application Layer Protocols

Savitribai Phule Pune University

Ciphermail Gateway Administration Guide

Security. Raj Jain. Washington University in St. Louis

Federal S/MIME V3 Client Profile

Chapter 10. Network Security

Lecture 9 - Network Security TDTS (ht1)

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

IT Networks & Security CERT Luncheon Series: Cryptography

IBM Client Security Solutions. Client Security User's Guide

Options for encrypted communication with AUDI AG Version of: 31 May 2011

PGP - Pretty Good Privacy

Why you need secure

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CPSC Network Programming. , FTP, and NAT.

PGP Universal Satellite Version 2.7 for Windows Release Notes

How To Encrypt With An Certificate On An From A Gmail Account On A Pc Or Mac Or Ipa (For A Pc) On A Microsoft Gmail (For An Ipa) Or Ipad (For Mac) On

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Ciphermail Gateway Administration Guide

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications

Secure Data Exchange Solution

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Transcription:

Prof. Sead Muftic Feng Zhang Lecture 10: Secure E-mail Systems

Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System 3. Secure applications based on secure E mail

Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System 3. Secure applications based on secure E mail

Standard E-mail system Components of E-mail system are Mail Servers and User Agents (UA)

Internet E-mail With a standard E-mail system a user creates an E-mail letter at his/her workstation using UA Header B o d y

RFC 822 E-mail format From: john @ mit.edu To: sead@ dsv.su.se Subject: Normal letter Date: 10-April-2004 Dear Sead: How are you today? What are you doing?

Dear Ahmed: Transmission - SMTP (RFC 821) From: sead @ dsv.su.se To: APATEL @ ccvax.ucd.ie Subject: Normal letter Date: 7-July-1993 Dear Ahmed: How are you today? What are you doing? From: sead @ dsv.su.se To: APATEL @ ccvax.ucd.ie Subject: Normal letter Date: 7-July-1993 How are you today? What are you doing? From: sead @ dsv.su.se To: APATEL @ ccvax.ucd.ie Subject: Normal letter Date: 7-July-1993 Dear Ahmed: How are you today? What are you doing? From: sead @ dsv.su.se To: APATEL @ ccvax.ucd.ie Subject: Normal letter Date: 7-July-1993 Dear Ahmed: How are you today? What are you doing? E-mail letters are transmitted in clear and during transmission stored at sending and receiving Mail Server

Internet E-mail potential problems This implies the following problems: The text of the letter may be read by anybody The correct contents of the received letter cannot be guaranteed The sender cannot be authenticated and verified The sender is not certain that the letter will be read only by the intended receiver The sender may repudiate sending the letter or its contents

Secure Email - PEM Header B o d y Confidentiality Integrity (MIC) Sender s Auth Receiver s Auth Non-repudiation

PEM principles Header B o d y All security services and parameters are applied to the body of the letter

Format of PEM letter From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-2004 PEM header PEM letter text The body of the PEM letter is divided in two parts: PEM header and PEM letter text

Types of PEM letters MIC - CLEAR MIC - ONLY and ENCRYPTED From: john @ mit.edu To: sead@ dsv.su.se Subject: PEM letter Date: 10-April-2004 From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-2004 From: john @ mit.edu To: sead@ dsv.su.se Subject: PEM letter Date: 10-April-2004 PEM parameters PEM parameters PEM parameters Dear Sead: How are you? asdfegtylhtr uhgrfdestgpl

MIC clear PEM letter Implements Data Integrity, Sender s Authenticity and Non Repudiation (letter contents guarantied) MIC - CLEAR MIC - ONLY and ENCRYPTED From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-2004 From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-2004 From: john @ mit.edu To: sead@ dsv.su.se Subject: PEM letter Date: 10-April-2004 PEM parameters PEM parameters PEM parameters Dear John: How are you? asdfegtylhtr uhgrfdestgpl

MIC only PEM letter Implements Data Integrity, Sender s Authenticity and Non Repudiation (letter contents guarantied) MIC - CLEAR MIC - ONLY and ENCRYPTED From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-2004 From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-2004 From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-2004 PEM parameters PEM parameters PEM parameters Dear Sead: How are you? asdfegtylhtr uhgrfdestgpl

ENCRYPTED PEM letter Implements Data Integrity, Data Confidentiality, Sender s Authenticity, Receiver s Authenticity and Non Repudiation MIC - CLEAR MIC - ONLY and ENCRYPTED From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-1997 From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-1997 From: john @ mit.edu To: sead @ dsv.su.se Subject: PEM letter Date: 10-April-1997 PEM parameters PEM parameters PEM parameters Dear Sead: How are you? asdfegtylhtr uhgrfdestgpl

Creating PEM letter Local Form Canonical Form Cryptographic Processing Base64 Encoding

Canonical form of a PEM letter ASCII character set <CR><LF> line delimiters

Cryptographic processing For MIC-ONLY and MIC-CLEAR type of letters: Calculate MIC (MD2 or MD5) on Canonical Form Sign MIC using Sender s secret key

Cryptographic processing For ENCRYPTED type of letters: Calculate MIC over Canonical Form Sign MIC using Sender s secret key Generate random Data Encryption Key - DEK Encrypt the Canonical Form using DEK Encrypt MIC using DEK Protect DEK with Receiver s public key

Printable encoding Only for MIC-ONLY and ENCRYPTED type of letters. Base64 coding: Coding to 6 bits per printable character Input 24 bits from 3 bytes are transformed to 24 bits in 4 bytes Output line length - 64 printable characters

PEM header RFC 1421 Proc-Type: Content-Domain: DEK-Info: ENCRYPTED MIC-ONLY MIC-CLEAR CRL RFC822 <algorithm id.>, <mode>, <parameters> Originator-ID-Asymmetric: Originator-Certificate: Issuer-Certificate: MIC-Info: Id. of Sender and of Sender s key Sender s certificate Issuer s certificate <MIC alg. id.>, <signing alg. id.>, <protected MIC> Recipient-ID-Asymmetric: Key-Info: Id. of Receiver and Receiver s key <protected DEK>, <protecting alg. id.>

Example of PEM letter -----BEGIN PRIVACY-ENHANCED MESSAGE----- Proc-Type:4,CRL CRL: MIHeMIGJMA0GCSqGSIb3DQEBAgUAMEgxRjAJBgNVBAYTAlNFMAsGA1UEChMEQ09T VDAsBgNVBAsTJUxvdyBBc3N1cmFuY2UgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkX Czk1MDMwMjA5MDJaFws5NTA0MDIwOTAyWjASMBACAQAXCzk1MDMwMjA4Mzha8yAw DQYJKoZIhvcNAQECBQADQQAolGV3ahJWeOSL7bFhOl9BIOmhiqtnIAIHjoInFdM1 NM6PjFZMdcE11nOFf8nnh24obKYm/q2y5ZMV8MKdF78B Originator-Certificate: MIIBgjCCASwCBQEXVNaqMA0GCSqGSIb3DQEBAgUAMFIxUDAJBgNVBAYTAnVzMBcG A1UEChMQSW50ZXJuZXQgU29jaWV0eTAqBgNVBAsTI0ludGVybmV0IFBDQSBSZWdp c3ryyxrpb24gqxv0ag9yaxr5mboxczk1mdmwmja5mdjafws5njazmdiwotaywjbi MUYwCQYDVQQGEwJTRTALBgNVBAoTBENPU1QwLAYDVQQLEyVMb3cgQXNzdXJhbmNl IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MFowDQYJKoZIhvcNAQEBBQADSQAwRgJB ALk7mQW6uHi9BuyhqTk1rXRpbWefB6eBlUuNZTLrsV99puwroTNeAt7udJnKfADY YSqzfGZi8cQBIjrZOcS+tZ0CAQMwDQYJKoZIhvcNAQECBQADQQAdwL4R/R0j829o +YTGFDZq114hjKIOvrvJwj0eSiECk/JTYMPPg7+/1Namu8lkV4/IjjDQhIDmZCeP steg28c9 -----END PRIVACY-ENHANCED MESSAGE-----

Secure Email - Pretty Good Privacy (PGP) Some text Some text Some text Some text Muftic Muftic Muftic Plaintext uncertified document Digital signature added (MD5/RSA) Document with signature compressed Session key used to encrypt file (IDEA)

Pretty Good Privacy (PGP) Some text Muftic Some text Muftic Some text Muftic Session key used to decrypt file to compressed format File uncompressed and signature verified

PGP Trust model YOU A B C D E? F G H I

Secure Email - S/MIME Features : - Based on PKCS #7 security services - Combination of MIME messages and PKCS objects - Suitable for binary data (multimedia) - Includes message formatting and certificate handling - International standard (interoperability) - Available with major browsers and mailers

S/MIME general format Standard header PKCS-7 object PKCS-7 object

S/MIME format example Content-Type: multipart/mixed; boundary=bar --bar Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable A1Hola Michael! How do you like the new S/MIME standard? I agree. It's generally a good idea to encode lines that begin with From=20because some mail transport agents will insert a greaterthan (>) sign, thus invalidating the signature. Also, in some cases it might be desirable to encode any =20 trailing whitespace that occurs on lines in order to ensure =20 that the message signature is not invalidated when passing =20 a gateway that modifies such whitespace (like BITNET). =20 --bar Content-Type: application/wally-wiggle iqcvawubmjrrf2n9owbghpdjaqe9uqqatl7lurvndbjrk4eqybib3h5qxix/lc// jjv5bnvkzigpicemi5ifd9boegvpirhtireeqlqrkynobactfbzmh9gc3c041wgq umbrbxc+nis1tikla08rvi9ig/2yh7lfrk5ein57u/w72vgsxlhe/zhdfolt9brn HOxEa44b+EI= =ndaj --bar--

S/MIME file extensions S/MIME Type application/pkcs7-mime (signeddata, envelopeddata) application/pkcs7-mime (degenerate signeddata "certs-only" message) application/pkcs7-signature File Extension.p7m.p7c.p7s application/pkcs10.p10

S/MIME signed message Content-type: application/mime; content-type="multipart/signed"; protocol="application/pkcs7-signature"; micalg=rsa-md5; name=smime.aps Content-disposition: attachment; filename=smime.aps Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=rsa-md5; boundary=boundary42 --boundary42 Content-Type: text/plain This is a very short clear-signed message. However, at least you can read it! --boundary42 Content-Type: application/pkcs7-signature Content-Transfer-Encoding: base64 ghyhhhuujhjhjh77n8hhgtrfvbnj756tbb9hg4vqpfyf467ghigfhfyt6 4VQpfyF467GhIGfHfYT6jH77n8HHGghyHhHUujhJh756tbB9HGTrfvbnj n8hhgtrfvhjhjh776tbb9hg4vqbnj7567ghigfhfyt6ghyhhhuujpfyf4 7GhIGfHfYT64VQbnj756 --boundary42--

Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System 3. Secure applications based on secure E mail

Problems in Current Email Systems Problems : Weak Authentication Protection of mail boxes and email letters on email server from SPAM email Unauthorized email (SPAM) Contents of address book Email confirmation E mail is main source for distribution of malicious and dangerous content

Requirements for Secure Email Requirements: Efficient Handling of attachments Current status of email letter (Confirmations) Handling of certificates Integration with smart cards Sending and receiving authorization Cross domain bilateral or multilateral arrangements

Layers: Secure Email Systems Secure E-Mail Infrastructure Credential Server Secure E-Mail Server Secure E-Mail Client

Layer-1: Secure E-Mail Client Standard Mailing Functions Handling of Certificates Standard Security Services Secure Address Book Confirmations Strong Authentication With SEM Server Handling of Attachments Management of Authorizarion

Layer 2: Secure E Mail Servers Handling of Certificates Handling of Address Book Encryption Keys Confirmations Strong Authentication Handling of Attachments Management and Enforcement of Authorizations

Issuing PKI Server SAML Policy Server Layer 3: Credentials Servers

Layer 4: PKI and SMI Servers PKI Servers SMI Servers Federation Validation

Secure Email System: Design and Implementation SMTP/POP3 Standard Email Server Email user User Interface A C T I O N S Email Handler L I S T E N E R S Strong Authentication Session management Message Handler Address book Manager T R A N S P O R T E R T R A N S P O R T E R Strong Authentication Session management Message Handler Email Handler L I S T E N E R S A C T I O N S User Interface Server Admin Address book Manager Security Manager Storage Manager Symmetric Key SMIME Cert proto PKCS7 DistinguishedName Certificate Hash Storage Manager Symmetric Key SMIME Cert proto PKCS7 DistinguishedName Certificate Hash Header SessionID Data(PKCS7)

Graphical User Interface

Graphical User Interface

S/MIME Message: SignedAndEncrypted Return-Path: <aghafoor@130.237.158.247> Message-ID: <15206040.11225246288906.JavaMail.sead@sec-office> MIME-Version: 1.0 Delivered-To: aghafoor@130.237.158.247 Received: from l884.dsv.su.se ([130.237.158.18]) by sec-office (JAMES SMTP Server 2.3.1) with SMTP ID 184 for <aghafoor@130.237.158.247>; Tue, 28 Oct 2008 19:11:28-0700 (PDT) Content-Disposition: attachment; filename="smime.p7m" Content-Type: application/x-pkcs7-mime; name="smime.p7m" Content-Transfer-Encoding: base64 From: aghafoor@130.237.158.247 To: aghafoor@130.237.158.247 Subject: Signed and encrypted message Date: Tue, 28 Oct 2008 18:14:04 +0100 (CET) MIIoOwYJKoZIhvcNAQcDoIIoLDCCKCgCAQAxggE7MIIBNwIBADCBnzCBmTELMAkGA1UEBhMCVVMx

S/MIME Message: Signed Return-Path: <aghafoor@130.237.158.247> Delivered-To: agha@130.237.158.247 Received: from l884.dsv.su.se ([130.237.158.18]) by sec-office (JAMES SMTP Server 2.3.1) with SMTP ID 175 for <agha@130.237.158.247>; Tue, 28 Oct 2008 19:10:47-0700 (PDT) Date: Tue, 28 Oct 2008 18:13:23 +0100 (CET) From: aghafoor@130.237.158.247 To: agha@130.237.158.247 Message-ID: <31936094.11225214003474.JavaMail.aghafoor@L884> Subject: Signed message MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------dsvseclab-sem-agent384282" Content-Transfer-Encoding: 7bit This is a cryptographically signed message in MIME format. --------------dsv-seclab-sem-agent384282 Content-Type: text/plain; charset=iso-8859-1; format=flowed Content-Transfer-Encoding: 7bit This is a signed message from aghafoor to agha --------------dsv-seclab-sem-agent384282 MIME-Version: 1.0 Content-Disposition: attachment; filename="smime.p7m" Content-Type: application/x-pkcs7-mime; name="smime.p7m" Content-Transfer-Encoding: base64 MIIbcwYJKoZIhvcNAQcCoIIbZDCCG2ACAQExCzAJBgUrDgMCGgUAMEEGCSqGSIb3

MS Outlook Security Configuration

Mozilla Thunderbird Security Configuration

Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System 3. Secure applications based on secure E mail

Business applications based on secure E mail

Questions Demonstration