Signing Email Phill Hallam-Baker. 2 What are the end goals?  Phishing –Organized crime sends email impersonating well known brands –Require means of.

Slides:



Advertisements
Similar presentations
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Authentication Approaches Phillip Hallam-Baker VeriSign Inc.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
© 2004 VeriSign, Inc. Web Services and the Old World Phillip Hallam-Baker Principal Scientist VeriSign Inc.
Lecture 23 Internet Authentication Applications
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 10 Securing Exchange Server 2003.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Security Jonathan Calazan December 12, 2005.
Guide to Operating System Security Chapter 10 Security.
PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
Windows 2003 and 802.1x Secure Wireless Deployments.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Masud Hasan Secue VS Hushmail Project 2.
Secure Socket Layer (SSL)
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Module 9: Fundamentals of Securing Network Communication.
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Windows 2000 Certificate Authority By Saunders Roesser.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Stroeder.COM TF-LSD Meeting S/MIME Certificate Collector  Motivation  Proposed Solution  Discussion.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
Security fundamentals Topic 9 Securing internet messaging.
Using Public Key Cryptography Key management and public key infrastructures.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
1 XML Key Management Specification XKMS Dr Phillip Hallam-Baker FBCS CEng. VeriSign Inc.
Key management issues in PGP
Electronic mail security
Internet Business Associate v2.0
Secure Sockets Layer (SSL)
S/MIME T ANANDHAN.
On the off chance that your business utilizes Roadrunner as your Internet specialist organization, you will have at least one accounts. While you.
Cryptography and Network Security
Presentation transcript:

Signing Phill Hallam-Baker

2 What are the end goals?  Phishing –Organized crime sends impersonating well known brands –Require means of authenticating messages to user  Security by default –Users expect to be secure –Reality must match expectation  Security for free –Only a minority of users are willing to pay for security

3 Facing the Brutal Facts  Security for Gear Heads  Security for Real People –Paranoid design leads to unusable user interfaces –Double ended deployment trap  Neither S/MIME or PGP have succeeded –S/MIME is supported by most clients –PGP has a significant advocacy base  End to End Security is Bogus –There is not even a canonical reference  The most widely used security protocol is SSL

4 Specific Complaints  Hard to distinguish secure from insecure –Clicking on icons to check security is futile –Trust chains are incomprehensible –Web of Trust is more so  A signed message is frequently presented unacceptably –Messages are frequently damaged in transit –Eudora creates stupid attachment files –MUAs with S/MIME 'support' show scary messages  No way to know if a message should be signed  Cost of S/MIME certificates –Need for interaction with a CA

5 Some Less Brutal Facts  Phishing creates major incentive for improvement  Very Large number of S/MIME clients are deployed –Most of application client user base –Web hosted mail only needs change in one place –Most Servers are S/MIME tolerant –While there are few users, there are important users  One stock exchange uses consumer certs for security  Standards Work –SMTP has an extension mechanism –Logotypes X.509v3 Extension is IETF standard –MARID working group really defines a DNS security policy –XKMS: XML Key Management Service 2.0 [W3C]

6 The PGP Situation  Secure has been hurt by PGP vs. S/MIME –PGP users are often influencers in sales process –Microsoft signs security bulletins using PGP  What does PGP community really want? –'Free' PKI –Total Autonomy and Control –Validation  Is Web of Trust a Show Stopper? – NO –Self Signed Certs are equivalent to PGP keys –Web of Trust support is equivalent to cross certificates –XKMS is designed to address this issue

7 Entity To Entity Security  Almost no Internet Security is end-to end –Enterprises manage security at the enterprise level –Firewalls are not going away  Domain to Domain security is valid –But so are End to Domain and Domain to End –Lets avoid mistake of over-reaction  Entity To Entity Security –The Domain sets the security policy  May override the user preference [e.g. a bank]  must be readable at edge server for compliance  May supplement the user configuration  Alice has no encryption key, use this one

8Confidentiality  Do we need confidentiality?  Is existing mail server support for SSL sufficient? –It is certainly desirable since it protects headers  Is Entity to Entity confidentiality required? –If so:  Domain Keys Message format is inadequate  Had better fix S/MIME Encryption  Encrypt the subject line & date  Domain level encryption for regulated industries  Key distribution mechanism (not LDAP!)

9Observation  The weaknesses of S/MIME come from two sources –Inappropriate Doctrines  End to end obsession is bogus  Compare IPSEC and SSL VPNs  Firewalls provide real security  Bad security is better than no security after all  Design failures in SSL, WEP have not been critical –Partitioned Design Process  Neglects user interface considerations  Encourages silos  S/MIME group is only allowed to discuss message format  Academic focus on solving theoretical problems  Poor documentation

10 Rationalizing Requirements  Deployability –Deployment of secure mail must be seamless –Should not have negative impact on existing users  Security level should meet need –Most users do not require CA issued certs  Authentication through DNS is sufficient  Enterprises need domain level security –Security policy is managed at the network edge  'This comes from Very Big Bank'  Add disclaimers  Notice that is secure should be visual

11 Ideal Interaction  Sender –Does NOTHING  The infrastructure should work it out –MUA may allow sender to force use of legacy S/MIME  Receiver with no S/MIME support –Gets ordinary indistinguishable from normal  Receiver with legacy S/MIME support –May signed  Receiver with full revised secure – displayed with distinctive logo that shows authenticity.

12 Signed s  How to tell end user message is authentic –From Major Brand [Microsoft, E-Bay]  Show logo of brand –From Non Major Brand  Need surrogate brand  E.G VeriSign Site Seal  C.F MasterCard, Visa, Amex –Display of Logo  Use logotype embedded in X.509v3 certificate  VeriSign Logotype roots are already created

13 Technical Proposal  Setup: Make Support 'Out of the Box'  Transport: Core problem is knowing support level –Does this recipient understand S/MIME?  If so does the client understand domain signatures? –Should this received message have a signature? –Is this signature automatic or manual?  Edge servers are responsible for: –Making message acceptable to end user –Securing to highest level the channel will bear

14 Types of Signature  Automatic –Added by infrastructure without user intervention –May be stripped by any part of infrastructure  Make sure it does not confuse legacy client  Manual –Added at direct instigation of user  Domain Level Signatures –This message comes from Microsoft.com –Added at edge server gateway –Automatic

15 Signaling Support Level  Use SMTP Extension 'SMIME' to say: –This port accepts S/MIME –Signing a message will not negatively impact user –NB does NOT guarantee signature will be seen by user –Could use similar signaling for other content formats  Use DNS MARID Extension to say: –All outbound is signed –Describe the signing key  Certificate trust anchor is X  Certificate is Y  Signing key is Z

16 The Incoming Edge Server  Advertises SMTP SMIME extension –End user client supports S/MIME message format –Client does not provide acceptable support but edge will adapt  How do we know client capability? –Web hosted mail knows –Enterprises usually specify client for employee use  If you use Eudora support is your problem. –New servers/clients can ask client capability  May need to extend POP/ IMAP/ MAPI

17 The role of PKI and CAs  CA services provide premium authentication –Linkage to PKI hurt both S/MIME and PGP  Cost of CA infrastructure is significant  Web o' Trust infrastructure has huge hidden costs  Universal paranoia is a bogus threat model –Professional attackers hack where the money is  Not Aunt Meg's folder  Aunt Meg has different security needs to US Bank  Better strategy for CAs is to encourage free security –Premium consumer Certs for doctors, lawyers, etc. –Premium domain Certs on SSL model –Premium LogoCerts for banks

18 Using XKMS for Out of the Box Crypto  When installed client sets up crypto –Queries SRV record for domain  Is there an XKMS registration server for this domain? –If so Create key pair  Register with XKRSS using SOAP over SMTP  Enables reuse of existing authentication infrastructure  When client sends –Lookup SRV record to see if XKISS server for domain –If so query for crypto to use  What is the signing key for YASEP?  May be end to end OR end to domain

19 Traditional PKI Alice Bob Directory ASN1PKIX ASN1PKIX

20 XKMS PKI Interface Alice Bob Directory ASN1PKIX XKMS ASN1PKIX XML

21 XKMS Generalized Interface Alice Bob Directory ASN1PKIX XKMS ASN1PKIX XML DNS Keys PGP Keys Just Keys

22Conclusions  End to End security model is bogus –Domain to Domain, End to Domain, Domain to End are all legitimate goals. –When a model consistently fails, look for a new model  S/MIME solves the wrong 90% of the problem –There are many parts of the spec that can be saved –In particular message format is viable  Adding missing 10% is not difficult –Use existing extension hooks in protocols –Lack of policy information is principal challenge –XKMS has already addressed PKI issues