03/09/05Oregon State University X-Sig: An Email Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Digital Signatures and Hash Functions. Digital Signatures.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
SMTP – Simple Mail Transfer Protocol
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Electronic mail security
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security Jonathan Calazan December 12, 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 19 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Guide to Operating System Security Chapter 10 Security.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Cryptography 101 Frank Hecker
Electronic Mail (SMTP, POP, IMAP, MIME)
Secure Data Transmission EDI-INT AS1, AS2, AS3 Kevin Grant.
Electronic mail – protocol evolution. standards.
Electronic Mail Security
Simple Mail Transfer Protocol
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Wireless and Security CSCI 5857: Encoding and Encryption.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Masud Hasan Secue VS Hushmail Project 2.
Prof. John A. Copeland fax Office: Klaus
Secure Socket Layer (SSL)
Electronic mail security. Outline Pretty good privacy S/MIME.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Unit 1: Protection and Security for Grid Computing Part 2
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Electronic mail security Ola Flygt Växjö University, Sweden
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Pretty Good Privacy (PGP) Security for Electronic .
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Security fundamentals Topic 9 Securing internet messaging.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Key management issues in PGP
Misc. Security Items.
S/MIME T ANANDHAN.
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Using SSL – Secure Socket Layer
Social Media And Global Computing Sending
The Secure Sockets Layer (SSL) Protocol
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

03/09/05Oregon State University X-Sig: An Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05

Oregon State University Overview What is Signing? Motivation Previous Work Protocol Implementation Opportunities

03/09/05Oregon State University What is Signing? You receive an , but how do you know who it’s from? –Headers give clues, but they don’t tell whole story –Fact: there is no way reliable to determine who sent an An signature: –Uses Public Key Cryptography (RSA/DSA/etc.) –Text of is hashed –Hash is encrypted using sender’s private key –Encrypted hash is attached to the –Sender is verified by decrypting the hash using the sender’s public key and checking the decrypted hash vs. a recalculated hash –For added security, a random value may appended added to the encrypted text

03/09/05Oregon State University Headers Return-Path: Received: from SMTP.magnellmail.net (smtp.magnellmail.net [ ]) by acabar.cafwap.net (8.11.6/8.11.6) with SMTP id iAUBfYZ16904 for ; Tue, 30 Nov :41: Received: from mail pickup service by e3ssl002 with Microsoft SMTPSVC; Tue, 30 Nov :47: From: To: Subject: Your Newegg.com Order information Date: Tue, 30 Nov :47: Dear Robert Rose Thank you for shopping at Newegg.com. We are dedicated to providing customers with high quality merchandise at low prices and only the finest in customer service. Your purchase will be processed and shipped in approximately hours and your specific order details have been provided below for your convenience. magnellmail.net  newegg.com?

03/09/05Oregon State University Motivation Know exactly who is sending you Reduce/eliminate spam –Spammers rely on “open relays” and invalid return addresses to generate spam –If you could verify exactly where an is coming from, spamming would no longer be an anonymous practice We are NOT motivated to: –Protect (encrypt the message itself) –Create something that is complicated –Create something that is not backwards-compatible with everything out there today

03/09/05Oregon State University Previous Work S/MIME –IETF Secure Mail Standard based on PKC –Not backwards-compatible with existing clients S/MIME mail will appear as garbage –Not easy to implement, thus it’s mild acceptance –Does not address key distribution MS Exchange Secure –Microsoft’s proprietary secure mail standard based on PKC –Backwards-compatible with existing clients –Only implemented by Microsoft –Key distribution uses LDAP and/or Exchange Requires you to know the sender’s LDAP server or be on the same Exchange server

03/09/05Oregon State University X-Sig is… An header for the signature –New header “X-Sig:” contains the hash of the encrypted using the sender’s private key –Adding a single header is backwards-compatible Existing clients are free to ignore the header… the body of the is unmodified A key distribution mechanism –DNS MX records are leveraged as a means of retrieving a sender’s public key –An client need only look up the MX record of the sender’s [supposed] domain and retrieve the public key over HTTP from the MX server –Thus, the sender’s public key must reside on the mail server for the domain they claim to be from

03/09/05Oregon State University X-Sig Header Algorithm: –Generate MD5 hash for entire body of –RSA encrypt this string using the sender’s private key –Encode the ciphertext as Base64 –Insert this string into the headers of the Example: –Body of is “sent by rob\n” –MD5 is 865a2d220cadb041e25aeb6af250c5c6 X-Sig-Version: 1.0 (MD5-RSA) X-Sig: IRtKF2YO5EC0D85imV5FYCzgK5NK7DkvJ0uDQHKm/XaipIvfgec lTyi/RDBWisllgGkKz6EKGTbGFmS6xhUiRw==

03/09/05Oregon State University X-Sig Verification Algorithm: –Generate MD5 hash of the body of the –Query the sender’s mail server for public key Lookup MX record (mailhost) Get public key from –Decrypt the X-Sig header using the public key –Check generated MD5 vs. MD5 in plaintext Example: –Sender is –Get MX: dig MX mydomain.com returns mail.mydomain.com –Get pub key: –Check decrypted MD5 versus generated MD5

03/09/05Oregon State University Prototype Implementation X-Sig implemented using: –SquirrelMail: Open source PHP webmail application –OpenSSL: Used for it’s simple open source RSA library –Java: Java used as front-end for OpenSSL –Perl: Key retrieval implemented in Perl User’s private key stored on mail server in ~/.sig.priv User’s public key stored on mail server in ~/.sig.pub When composing an , SquirrelMail uses the user’s private key to encrypt the hash of the When reading an , SquirrelMail attempts to retrieve the public key for the sender and check the hashes

03/09/05Oregon State University Demo: Composing an

03/09/05Oregon State University Demo: X-Sig Headers Return-Path: Received: from acabar.cafwap.net (acabar.cafwap.net [ ] (may be forged)) by acabar.cafwap.net (8.11.6/8.11.6) with ESMTP id iB11XvZ20663 for ; Tue, 30 Nov :33: Received: from (SquirrelMail authenticated user usera); by acabar.cafwap.net with HTTP; Tue, 30 Nov :33: (PST) Message-ID: Date: Tue, 30 Nov :33: (PST) Subject: Demo From: To: X-Sig-Version: 1.0 (MD5-RSA) X-Sig: IRtKF2YO5EC0D85imV5FYCzgK5NK7DkvJ0uDQHKm/XaipIvfgeclTyi/RDBWisllgGkKz6EKGTbGFmS6xhUiRw== User-Agent: SquirrelMail/1.4.3a X-Mailer: SquirrelMail/1.4.3a MIME-Version: 1.0 Content-Type: text/plain;charset=iso Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal Hey Rob, how's it going? I thought you might enjoy some Thomas Jefferson quotes: Banking establishments are more dangerous than standing armies.

03/09/05Oregon State University Demo: X-Sig Verification Mail is from so retrieve their public key: acabar dig MX cafwap.net cafwap.net IN MX 10 mail.cafwap.net. acabar curl -----BEGIN PUBLIC KEY----- MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAMi5WRl5HDIngpNzysAUzjR1WYuQ7Nki j09086z85X25nnKT7dFw1f/PB4YoiYn9ChV+WrUSk0vjYbtXor7GBEcCAwEAAQ== -----END PUBLIC KEY----- Decrypt the X-Sig header using this public key and check it against our own MD5 that we calculated

03/09/05Oregon State University Demo: Reading an

03/09/05Oregon State University How does X-Sig Fight Spam? must be sent from a valid address –Spam mail is typically sent from an invalid address –Invalid addresses are immediately recognized as forged is verified who it was actually sent by –DNS MX records are used to retrieve the sender’s public key –The public key is used to check the signature of the –Invalid signatures are immediately recognized as forged If a large enough portion of Internet users adopt X-Sig: with an invalid signature or a forged address is spam

03/09/05Oregon State University Opportunities Server-side signature generation –If the connection between the client and the SMTP server is secured (e.g., Secure SMTP), then the server can generate the signature for the client Server-side signature verification – gateways (SMTP servers) can perform signature verification before the arrives at the client Automated key generation –If signature generation and verification occurs only on the server then the server could automatically generate keys for the user If all three of these things are done… X-Sig becomes completely transparent to the user!