Smime
Smime
Secure Multipurpose Internet Mail Defines a format for text messages that are
Extension (S/MIME) is a security sent using electronic mail.
enhancement to the MIME Internet e-mail Messages are viewed as having an
envelope and contents.
format standard.
– Envelope contains all the information needed to
Based on technology from RSA. accomplish transmission and delivery.
– Contents comprise the objects to be delivered to the
Prerequisites to understanding S/MIME:
recipient.
– Traditional email format standard RFC 822.
The RFC 822 standard applies only to the
Still in common use.
contents.
– Underlying email format – MIME. – Also contains a set of header fields that can be used to
create the envelope.
Overall structure of a message that Cannot transmit executable files or other binary
conforms to the standard: objects.
– May use some scheme to convert binary files into text
– Header – separated from body by a blank form.
line. – No agreed standard –e.g. UNIX UUencode/UUdecode.
– Body – unrestricted ASCII text. Cannot transmit text data that contains
Most frequently used key words include: national language characters.
From To Subject Date Message-ID – These normally use 8-bit codes with values 128 decimal
or higher.
Message-ID contains a unique – Limited to 7-bit ASCII codes.
identifier associated with the
SMTP servers may reject mail message over
message. a certain size.
1
RFC 822 Limitations MIME
MIME-Version Content-Transfer-Encoding
– Must have value 1.0. – Indicates the transformation used to
– Indicates that message conforms to RFCs represent the body of the message.
2045 and 2046. Content-ID
Content-Type – Identify MIME entities uniquely in multiple
– Describes data contained in the body contexts.
to ensure appropriate action by the Content-Description
receiving user agent. – A text description of the object with the
body.
– Useful when the object is not readable.
2
SHOULD use the same encryption
algorithm as was used in the last signed
and encrypted message received from the
intended recipient.
S/MIME Functionality
Clear-signed data
– Only the digital signature is encoded using
base64.
– Hence recipients without S/MIME capability
can view the message content (but cannot
verify the signature).
Signed and enveloped data
– Signed-only and encrypted-only entities may be
nested.
– Implies that encrypted data may be signed
and signed or clear-signed data may be
encrypted.
3
Securing a MIME
S/MIME Content Types Entity
4
SignedData MIME Entity Clear Signing MIME Entity
To recover the signed message and Achieved by using the multipart content type
with a signed subtype.
verify the signature:
A multipart/signed message has two parts:
– Recipient strips off the base64 encoding. – Any MIME type but must be prepared such as it is
– Signers public key used to decrypt the not alterable during transfer from source to
destination.
message digest.
Encoded using base64 or quoted-printable, if
– Recipient independently computes message required.
digest and compares it to decrypted – An application type MIME part with sub-type pkcs7-
message digest to verify signature. signature.
This is the result of processing the first part as
SignedData.
The object with SignedData format is created
with an empty message content field.
This object is a detached signature.
It is encoded using base64.
The receiver can verify the signature by An application/user will apply to a CA for a
taking the message digest of the first public key certificate.
part and comparing this to the message An application/pkcs10 -mime S/MIME entity
is used to transfer a certification request.
digest recovered from the signature in
The request includes a
the second part.
CertificationRequestInfo block, an identifier of
the public key encryption algorithm and
signature of the CertificationRequestInfo
block made using the sender’s private key.
The CertificationRequestInfo block
includes a name of certificate subject and
user’s public key.
Certificates-Only Message
5
User Agent Roles VeriSign Certificates
Signed Receipts
– Provides proof of delivery to the originator of a
message.
Security Labels
– Is a set of security information regarding the
sensitivity of the content.
– The labels may provide access control indicating
which users are permitted access to an object.
Secure Mailing Lists
– Some sort of per recipient processing required
when user sends message to multiple recipients.
VeriSign Levels of Security
– User relieved of the task by employing S/MIME
Mailing List Agent (MLA).
– Performs recipient specific encryption and
forwards the message.
References