Guide to Using DoD PKI Certificates in Outlook 2000



Similar documents
Guide to Using DoD PKI Certificates in Outlook 2000

Guide to Using DoD PKI Certificates in Outlook

Guide to Securing Microsoft Windows 2000 DHCP

Guide to Securing Windows NT/9x Clients in a Windows 2000 Network

Guide to Securing Microsoft Windows 2000 Encrypting File System

Overview Presented by: Boyd L. Summers

EAD Expected Annual Flood Damage Computation

John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011

Report Documentation Page

Integrated Force Method Solution to Indeterminate Structural Mechanics Problems

DEFENSE CONTRACT AUDIT AGENCY

DCAA and the Small Business Innovative Research (SBIR) Program

An Application of an Iterative Approach to DoD Software Migration Planning

Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management

Asset Management- Acquisitions

Activelock Customer Management 1.0

Exostar LDAP Proxy / Secure Setup Guide. This document provides information on the following topics:

Installing your Digital Certificate & Using on MS Out Look 2007.

HEC-DSS Add-In Excel Data Exchange for Excel

Microstructural Evaluation of KM4 and SR3 Samples Subjected to Various Heat Treatments

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

RT 24 - Architecture, Modeling & Simulation, and Software Design

ELECTRONIC HEALTH RECORDS. Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions

Installation Guide Supplement

Guide to the Secure Configuration and Administration of Microsoft Exchange 2000

Intelligence Community Public Key Infrastructure (IC PKI)

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

REPORT DOCUMENTATION PAGE *

NAVAL POSTGRADUATE SCHOOL

Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX)

An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation

Headquarters U.S. Air Force

Open Source Used In Cisco Instant Connect for ios Devices 4.9(1)

How To Send An Encrypted In Outlook 2000 (For A Password Protected ) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Saf ) On An Iphone Or

Third Party Software Used In PLEK500 (Utility for Win) v1.x.xx.xxx

EVault Endpoint Protection 7.0 Single Sign-On Configuration

Security whitepaper. CloudAnywhere.

Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency. May 11, 2011

Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center

Retina CS: Using Strong Certificates

Guide to Securing Microsoft Windows 2000 Group Policy

Job Status Guide 3.0

Symantec Managed PKI. Integration Guide for ActiveSync

User Guide May Using Certificates in Outlook Express

Installation and Configuration Guide

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

AFRL-RX-WP-TP

RealShot Manager Compression Server software

CERT Virtual Flow Collection and Analysis

IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND. Ready. Resourceful. Responsive!

Using Entrust certificates with Microsoft Office and Windows

PKI Contacts PKI for Fraunhofer Contacts

How To Use The Programs Of Ancient.Org

Military Health System Conference

Microsoft Dynamics GP. Electronic Signatures

Administration Guide Certificate Server May 2013

THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP

ANZ TRANSACTIVE MOBILE for ipad

Dell InTrust Preparing for Auditing Microsoft SQL Server

Staff Training Database User Manual

User Guide. BES12 Self-Service

73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

COM Port Stress Test

PRODUCT GUIDE. N u c l e u s D a t a R e c o v e r y. C o m P riv a t e L i m i t e d

VERITAS NetBackup 6.0 Encryption

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

IMX Mobile Proxy Administration

Mylex Online RAID Expansion Enhancement for DACCF Utilities 4.4 and Global Array Manager Part Number D01

Cancellation of Nongroup Health Insurance Policies

PointCentral Subscription Agreement v.9.2

Contents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts

with PKI Use Case Guide

Advanced Planning PDP Client for Microsoft Excel 1.3 Install PeopleBook

Simulation of Air Flow Through a Test Chamber

RSA Two Factor Authentication

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.

SECURE USER GUIDE OUTLOOK 2000

User Guide for Paros v2.x

Integrated Citrix Servers

Extracting an S/MIME certificate from a digital signature

TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples

Wireless Client Configuration Guide. for third-party wireless Ethernet adapters

MultiOne. Getting started

SecureW2 Client for Windows User Guide. Version 3.1

BlackBerry Desktop Manager Version: User Guide

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista

RED HAT SECURE WEB SERVER 3.0 DEVELOPER EDITION FOR COBALT NETWORKS SERVERS

FOR WINDOWS FILE SERVERS

ANZ TRANSACTIVE - MOBILE

Transcription:

Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group Author: Margaret Salter Updated: April 6, 2001 Version 1.0 National Security Agency 9800 Savage Rd. Suite 6704 Ft. Meade, MD 20755-6704 W2Kguides@nsa.gov

REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burder for this collection of information is estibated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burder to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 16-04-2001 2. REPORT TYPE 3. DATES COVERED (FROM - TO) xx-xx-2001 to xx-xx-2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Guide to Using DoD PKI Certificates in Outlook 2000 5b. GRANT NUMBER Unclassified 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Salter, Margaret ; 7. PERFORMING ORGANIZATION NAME AND ADDRESS National Security Agency 9800 Savage Road, Suite 6704 Ft. Meade, MD20755-6704 9. SPONSORING/MONITORING AGENCY NAME AND ADDRESS National Security Agency 9800 Savage Road, Suite 6704 Ft. Meade, MD20755-6704 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 8. PERFORMING ORGANIZATION REPORT NUMBER 10. SPONSOR/MONITOR'S ACRONYM(S) 11. SPONSOR/MONITOR'S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT APUBLIC RELEASE, 13. SUPPLEMENTARY NOTES 14. ABSTRACT The purpose of this guide is to provide detailed information on the configuration of Office 2000 in order to permit the use of DoD PKI Certificates and the checking of Certificate Revocation Lists (CRLs). 15. SUBJECT TERMS IATAC Collection; information security; configuration management 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Public Release a. REPORT Unclassified b. ABSTRACT Unclassified c. THIS PAGE Unclassified 18. NUMBER OF PAGES 17 19. NAME OF RESPONSIBLE PERSON Fenster, Lynn lfenster@dtic.mil 19b. TELEPHONE NUMBER International Area Code Area Code Telephone Number 703767-9007 DSN 427-9007 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39.18

REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 4/16/2001 3. REPORT TYPE AND DATES COVERED Report 4/16/2001 4. TITLE AND SUBTITLE Guide to Using DoD PKI Certificates in Outlook 2000 (Report Number: C4-017R-01) 5. FUNDING NUMBERS 6. AUTHOR(S) Salter, Margaret 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER National Seucrity Agency 9800 Savage Road, Suite 6704 Ft. Meade, MD 20755-6704 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING AGENCY REPORT NUMBER National Security Agency 9800 Savage Road, Suite 6704, Ft. Meade, MD 20755-6704 11. SUPPLEMENTARY NOTES 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; Distribution unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (Maximum 200 Words) The purpose of this guide is to provide detailed information on the configuration of Office 2000 in order to permit the use of DoD PKI Certificates and the checking of Certificate Revocation Lists (CRLs). 14. SUBJECT TERMS IATAC Collection, information security, configuration management 15. NUMBER OF PAGES 15 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT 18. SECURITY CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION OF ABSTRACT 20. LIMITATION OF ABSTRACT UNLIMITED NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-18 298-102

REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 4/16/2001 3. REPORT TYPE AND DATES COVERED Report 4/16/2001 4. TITLE AND SUBTITLE Guide to Using DoD PKI Certificates in Outlook 2000 (Report Number: C4-017R-01) 5. FUNDING NUMBERS 6. AUTHOR(S) Salter, Margaret 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER National Seucrity Agency 9800 Savage Road, Suite 6704 Ft. Meade, MD 20755-6704 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING AGENCY REPORT NUMBER National Security Agency 9800 Savage Road, Suite 6704, Ft. Meade, MD 20755-6704 11. SUPPLEMENTARY NOTES 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; Distribution unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (Maximum 200 Words) The purpose of this guide is to provide detailed information on the configuration of Office 2000 in order to permit the use of DoD PKI Certificates and the checking of Certificate Revocation Lists (CRLs). 14. SUBJECT TERMS IATAC Collection, information security, configuration management 15. NUMBER OF PAGES 15 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT 18. SECURITY CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION OF ABSTRACT 20. LIMITATION OF ABSTRACT UNLIMITED NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-18 298-102

This Page Intentionally Left Blank ii

Warnings Do not attempt to implement any of the settings in this guide without first testing in a non-operational environment. This document is only a guide containing recommended security settings. It is not meant to replace well-structured policy or sound judgment. Furthermore this guide does not address site-specific configuration issues. Care must be taken when implementing this guide to address local operational and policy concerns. The security changes described in this document only apply to Microsoft Windows 2000 systems and should not be applied to any other Windows 2000 versions or operating systems. SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE EXPRESSLY DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This document is current as of April 6, 2001. See Microsoft's web page http://www.microsoft.com/ for the latest changes or modifications to the Windows 2000 operating system. Warnings iii

This Page Intentionally Left Blank iv

Trademark Information Microsoft, MS-DOS, Windows, Windows 2000, Windows NT, Windows 98, Windows 95, Windows for Workgroups, and Windows 3.1 are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A. and other countries. All other names are registered trademarks or trademarks of their respective companies. Trademark Information v

This Page Intentionally Left Blank vi

Table of Contents Warnings...iii Table of Contents Trademark Information...v Table of Contents...vii Table of Figures...viii Introduction...1 Getting the Most from this Guide...1 About the Guide to Using DoD PKI Certificates in Outlook 2000...1 Outlook 2000 Certificate Configuration...3 DoD PKI Certificates...3 Suppress Name Checking...3 Choose the DoD PKI Certificates...3 Enable Service Release Features...5 Get and Check the CRL...5 References...7 vii

Table of Figures Table of Figures Figure 1 -- Dialog Box1...4 Figure 2 -- Dialog Box2...5 viii

Introduction The purpose of this guide is to provide detailed information on the configuration of Office 2000 in order to permit the use of DoD PKI Certificates and the checking of Certificate Revocation Lists (CRLs). Getting the Most from this Guide Introduction The following list contains suggestions to successfully use the Guide to Using DoD PKI Certificates in Outlook 2000: WARNING: This list does not address site-specific issues and every setting in this book should be tested on a nonoperational network. Read the guide in its entirety. Omitting or deleting steps can potentially lead to an unstable system and/or network that will require reconfiguration and reinstallation of software. Perform pre-configuration recommendations: Perform a complete backup of your system before implementing any of the recommendations in this guide. Ensure that the latest Windows 2000 service pack and hotfixes have been installed. For further information on critical Windows 2000 updates, see the Windows Update for Windows 2000 web page. Follow the security settings that are appropriate for your environment. About the Guide to Using DoD PKI Certificates in Outlook 2000 This document consists of the following chapters: Chapter 1, Outlook 2000 Certificate Configuration, contains information on configuring DoD PKI certificates, suppressing name checking, enabling service release features, and checking Certificate Revocation Lists (CRLs). Appendix A, References, contains a list of resources cited. 1

This Page Intentionally Left Blank 2

Chapter 1 Outlook 2000 Certificate Configuration Previous versions of Outlook are compatible with S/MIME version 2. In S/MIME version 2, certificates for email are required to have the correct email address in the certificate. In S/MIME version 3, the email address is not required to be in the certificate. Microsoft Outlook 2000 can be configured to conform to S/MIME version 3 and use any valid certificate for email. In addition, Outlook 2000 can be configured to check Certificate Revocation Lists (CRLs) for the entire certificate chain of an email certificate. This paper shows the changes that need to be made to the configuration of Office 2000 to permit the use of DoD PKI Certificates and the checking of CRLs. Chapter 1 Outlook 2000 Certificate Configuration DoD PKI Certificates The DoD PKI intends to issue two certificates to all users - one certificate to be used for encryption and one to be used for signing. These certificates will not contain any user information that changes frequently. The email address of the user, for instance, will not be in the certificate. Both of these certificates are used for email, one to sign outgoing messages and one to decrypt incoming encrypted email. The certificates will contain an extension called the Certificate Revocation List Distribution Point (CDP). This extension should contain a URL that is used to obtain the latest CRLs from the DoD. Suppress Name Checking To use a certificate without an email address in Outlook 2000, you need to have your system administrator add the following registry key: HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Office/9.0/Outlook/Security Then add a new DWORD value called SupressNameChecks and set it to 0x1. The conscientious spellers out there will want to note the misspelling of the word Supress in this key. Make sure that it is spelled exactly as above (with only one p in Supress). This will allow the use of certificates without the email address check being applied. Choose the DoD PKI Certificates To use your DoD PKI Certificates to sign and receive encrypted email (See Figure 1): Open Outlook 2000 Click on the Tools menu and select Options. 3

Select the Security tab Click on the Settings button. Chapter 1 Outlook 2000 Certificate Configuration Click on the New button to create a new set of security settings. Give the setting a name. If you wish to use this setting as default for all email messages, check the default buttons. Use the Choose button to select the certificates to be used for signing and encryption. In this window you should also choose SHA1 as the hash and 3DES for encryption. These certificates will now be used to sign and encrypt your email. Figure 1 Changing the Security Settings Dialog Box For any given message that you are sending, you can check that these settings are the ones being applied to the message (See Figure 2): In the message composition window under the File menu, choose Properties. Select the Security tab. Choose the Security Setting that you created using the window above. Make sure that you have chosen to encrypt and/or sign the message. 4

Chapter 1 Outlook 2000 Certificate Configuration Figure 2 Checking Security Setting Dialog Box Enable Service Release Features Outlook can be configured to display more information about the certificates being used in the email tool. Specifically, the status of the CRLs for the certificates can be displayed. To enable these extra security displays, you need to have your system administrator edit the following registry key: HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Office/9.0/Outlook/Security Then add a new DWORD value called EnableSRFeatures, and set it to 0x1. Once this setting is added, you will see that the displays of information are different when you click on either the certificate icon or the lock icon on any signed or encrypted email. Get and Check the CRL Outlook does not currently download the CRL without some modification to the registry. The system administrator needs to add the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\{7801ebd0- cf4b-11d0-851f-0060979387ea} 5

Then add a new DWORD value called PolicyFlags and set it to 0x00010000. This causes Outlook to actually download the CRL. Verify that the CRL was downloaded by opening Internet Explorer and performing the following steps: Chapter 1 Outlook 2000 Certificate Configuration In the Internet Explorer menu, select Tools Options Click the General tab Click Settings. This will present you with another dialog box. Select View Files and you should see the CRLs in the Temporary Internet Files. Unfortunately, the Outlook 2000 display still indicates that the CRL s were not checked. To get the results of the CRL checking displayed by the Outlook software, you must also apply a hotfix. The number of the hotfix is Q269784, but you must obtain it by directly contacting Microsoft. 6

Appendix A References Microsoft s Web Page, http://www.microsoft.com/ Appendix A References Windows Update for Windows 2000 Web Page, http://www.microsoft.com/windows2000/downloads/default.asp 7