Prof. John A. Copeland 404 894-5177 fax 404 894-0035 Office: Klaus 3362 .

Slides:



Advertisements
Similar presentations
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Advertisements

Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
SMTP – Simple Mail Transfer Protocol
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh ( ) Vishal Parikh ( ) Ribhu Pathria( )
Guide to Operating System Security Chapter 10 Security.
Simple Mail Transfer Protocol
Architecture of SMTP, POP, IMAP, MIME.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Electronic Mail Security
SMTP, POP3, IMAP.
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Sending and Receiving Mails
FTP (File Transfer Protocol) & Telnet
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Chap 81 Electronic mail security. Chap 82 Outline Pretty good privacy S/MIME Recommended web sites.
Electronic mail security. Outline Pretty good privacy S/MIME.
File Transfer Protocol (FTP)
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Electronic mail security Ola Flygt Växjö University, Sweden
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Chapter 16: Distributed Applications Business Data Communications, 4e.
ECE-8813 / CS Prof. John A. Copeland fax Office:
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
SMTP - Simple Mail Transfer Protocol RFC 821
Chapter 16: Distributed Applications Business Data Communications, 4e.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
COMP 431 Internet Services & Protocols
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security. Outline Pretty good privacy S/MIME.
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Electronic mail security
Security is one of the most widely used and regarded network services
Selected Research Topics Electronic Mail Security
Electronic Mail Security
MAIL AND SECURITY PERTEMUAN 13
Simple Mail Transfer Protocol (SMTP)
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
William Stallings Data and Computer Communications
Chapter 7 Network Applications
Electronic Mail Security
Presentation transcript:

Prof. John A. Copeland fax Office: Klaus or call for office visit Chapter 5b - Secure/Multipurpose Internet Mail Extensions S/MIME 2/5/14

Simple Mail Transfer Protocol (SMTP, RFC 822) SMTP Limitations - Can not transmit, or has a problem with: executable files, or other binary files (jpeg image). “ national language ” characters (non-ASCII) messages over a certain size ASCII to EBCDIC translation problems lines longer than a certain length (72 to 254 characters) MIME Defined Five New Headers MIME-Version. Must be “ 1.0 ” -> RFC 2045, RFC 2046 Content-Type. More types being added by developers (application/word) Content-Transfer-Encoding. How message has been encoded (radix- 64) Content-ID. Unique identifying character string. Content Description. Needed when content is not readable text. Carnonical Form: Standard format for use between systems ( not a “ native ” format – e.g., JPG). 2

S/MIME - User Agent Role S/MIME uses Public-Key Certificates - X.509 version 3 signed by Certification Authority Functions: Key Generation - Diffie-Hellman, DSS, and RSA key-pairs. Registration - Public keys must be registered with X.509 CA. (Thawte (sub. of VeriSign), CAcert,...) offer free registration) Certificate Storage - Local (as in browser application) for different services. Signed and Enveloped Data: Various orderings for encrypting and signing. Example: Verisign ( Class-1 Buyer ’ s address confirmed by ing vital info. Class-2 Postal address is confirmed as well, and data checked against diectories. Class-3 Buyer must appear in person, or send notarized documents. 3

S/MIME History S/MIME was originally developed by RSA Data Security Inc. The original specification used the recently developed IETF MIME specification with the de facto industry standard PKCS #7 secure message format. Change control to S/MIME has since been vested in the IETF and the specification is now layered on Cryptographic Message Syntax, an IETF specification similar to PKCS #7 from Wikipedia 2/16/13 4 Today, S/MIME adds the use of S/MIME to PGP. PGP is a standard, GnuPG are open programs that implement PGP

S/MIME Certificates Before S/MIME can be used in any of the above applications, one must obtain and install an individual key/certificate either from one's in-house certificate authority (CA) or from a public CA such as one of those listed below. Encryption requires having the destination party's certificate on store (which is typically automatic upon receiving a message from the party with a valid signing certificate). While it is technically possible to send a message encrypted (using the destination party certificate) without having one's own certificate to digitally sign, in practice, the S/MIME clients will require you install your own certificate before they allow encrypting to others. from Wikipedia 2/16/09 5

General Problems SMTP Headers Can be used to check routing, but not reliable (spoofing, NAT,...) Can reveal your IP address, mail server to recipients Content Poisons: Attachments that are executable files (viruses, Worms, Back Doors,...) HTML encoded mail has all the threats of an untrusted Web site Links can execute code FTP links can give away your address, if used as password Hidden keys can identify the address of the message, ID of recipient Spammers use unwitting mail servers for exploding and relaying , hiding their identity This requires “ Relaying Prohibited, ” makes sending harder from the road 6

MS = Mail Server (e.g., mail.gatech.edu) *Unless user authenticates through TLS. 7 IP on earthlink.com gatech.edu aol.com MS MS or sender MS receiver Relaying (should be prohibited*) IP on earthlink.com gatech.edu aol.com MS sender MS receiver Allowed Forwarding receiver sender MS Bob logs on to the Internet from home, and is assigned an IP address in the Earthlink domain. Bob then sends mail to smtp.gatech.edu for alice.aol.com

>> YOU TYPE THIS. [COMMENTS] << WAIT FOR THIS REPLY FROM THE SMTP SERVER >> HELO c hsd1.ga.comcast.net [must be actual DNS name of host being used] << 220 mail.ece.gatech.edu ESMTP Sendmail /8.13.4; Wed, 28 Sep :34: (EDT) << 250 mail.ece.gatech.edu Hello ecevpn-021.ece-int.gatech.edu [ ], pleased to meet you >> MAIL FROM: [must be an actual user on this server] << Sender ok >> RCPT TO: [must not violate any anti-relay rule] << Recipient ok [this would be relaying, except for VPN] >> DATA << 354 Enter mail, end with "." on a line by itself >> 'hw1/hw1. graded on * * Sep 28, :49,’ >> 'Name on HW return: smith,_john' >> 'Date & Time submitted: Wed, 28 Sep :45: (EDT)' >> '- (at line 2) : Break the following ciphertext:' >> ' #1' >> '1 ok2 /N=N/ : [n] - Which cipher character' >> '2 ok2 /THIS_CODE_IS_W=THIS_CODE_IS_W/ : [this_code_is_w] - type in the' >> 'No. Graded = 10, Average Grade = 92' >>. [single period ends message text] << j8SLYiLA Message accepted for delivery >> QUIT sent with: > telnet mail.ece.gatech.edu 25 8 Today, all mail servers at GT require TLS authentication.