T2-Presentation-Electronic Mail Security
T2-Presentation-Electronic Mail Security
MSI
2017/2018
Encapsulates an email
message in an envelope and
Simple Mail Transfer is used to relay the
Protocol encapsulated messages from
source to destination
through multiple MTAs
Is a text-based client-server
protocol
POP3 IMAP
• Internet Mail Access Protocol
• Post Office Protocol
• Enables an email client to access
• Allows an email client to
mail on an email server
download an email from an email
server (MTA) • Also uses TCP, with server TCP
port 143
• POP3 user agents connect via TCP
to the server • Is more complex than POP3
Defines a format for text messages that are sent using electronic mail
The content standard includes a set of header fields that may be used
by the mail system to create the envelope
Best regards,
Xpto person
• The client and server first greet each • The sender's email address and name
other with a HELO command is specified in the FROM header
• Client uses MAIL FROM to represent • The sender's email address can be
the sender's address. different from the envelope's MAIL
email address using the RCPT TO • An email client will only display the
command. FROM header, the user will never
• It is very easy to specify a fake/forged know what was the value for the
• SMTP cannot transmit text data that includes national language characters
• SMTP gateways that translate between ASCII and the character code EBCDIC
do not use a consistent set of mappings, resulting in translation problems
• Five new message header fields are defined, which may be included in an RFC
5322 header
• Transfer encodings are defined that enable the conversion of any content
format into a form that is protected from alteration by the mail system
MIME-Version
Content-Type
• Describes the data contained in the body with sufficient detail that the receiving user agent
can pick an appropriate agent or mechanism to represent the data to the user or otherwise
deal with the data in an appropriate manner
Content-Transfer-Encoding
• Indicates the type of transformation that has been used to represent the body of the message
in a way that is acceptable for mail transport
Content-ID
Content-Description
• A text description of the object with the body; this is useful when the object is not readable
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved. © 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Table 19.2
MIME Transfer Encodings
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved. © 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Example MIME message structure
Authenticity-related threats
Integrity-related threats
Confidentiality-related threats
Availability-related threats
• Could prevent end users from being able to send or receive mail
• STARTTLS
• An SMTP security extension that provides authentication, integrity, non-repudiation and confidentiality for
the entire SMTP message by running SMTP over TLS
• Provides authentication, integrity, non-repudiation and confidentiality of the message body carried in
SMTP messages
• Provides authentication and integrity protection of DNS data, and is an underlying tool used by various
email security protocols
• Is designed to overcome problems in the certificate authority (CA) system by providing an alternative
channel for authenticating public keys based on DNSSEC, with the result that the same trust relationships
used to certify IP addresses are used to certify servers operating on those addresses
• Uses the Domain Name System (DNS) to allow domain owners to create records that associate the
domain name with a specific IP address range of authorized message senders.
• Enables an MTA to sign selected headers and the body of a message. This validates the source domain
of the mail and provides message body integrity
• Lets senders know the proportionate effectiveness of their SPF and DKIM policies, and signals to
receivers what action should be taken in various individual and bulk attack scenarios
A security enhancement to the MIME Internet e-mail format standard based on technology from
RSA Data Security
• Alternative email security protocol which has essentially the same functionality as S/MIME
• PGP was created by Phil Zimmerman and implemented as a product first released in 1991
• It was made available free of charge and became popular for personal use
• The initial protocol was proprietary and used some encryption algorithms with intellectual
property restrictions
• OpenPGP was developed as a new standard protocol based on PGP version 5.x
• When any user signs another’s key, he or she becomes an introducer of that key.
• Is used by MUAs and MTAs to find the address of the next hop server for
mail delivery (MTAs query DNS for MX Resource Records of the recipient’s
domain)
• DNS database
• Name servers
• Resolvers
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
DNS Database
• Distributed database
• Provides end-to-end protection through the use of digital signatures that are created
by responding zone administrators and verified by a recipient’s resolver software
• Avoids the need to trust intermediate name servers and resolvers that cache or route
the DNS records originating from the responding zone administrator before they reach
the source of the query
• Consists of a set of new resource record types and modifications to the existing DNS
protocol
• Trust in the public key of the source is established by starting from a trusted zone and
establishing the chain of trust down to the current source of response through
successive verifications of signature of the public key of a child by its parent
• The public key of the trusted zone is called the trust anchor
• SPF addresses a problem with the current email infrastructure any host can
use any domain name for various identifiers in the mail header (a major
cause of spam).
• This means that SPF checks can be applied before the message content is
received from the sender
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Example SMTP envelope vs message header
A sending domain identifies all the senders (MTAs) via appropriate SPF DNS records
At a receiver, the SMTP envelope MAIL FROM: address and the IP address of the
sender are used to query an SPF TXT RR
jgranjal$ nslookup
> set query=txt
> dei.uc.pt
Server:10.0.1.254
Address:10.0.1.254#53
Non-authoritative answer:
dei.uc.pt text = "v=spf1 ip4:193.137.203.253 ip4:193.137.203.234 mx ?all"
dei.uc.pt text = "U.C. Dep. Eng. Informatica"
dei.uc.pt text = "MS=ms12952510"
>
• Allows email senders to specify policy on how their mail should be handled, the
types of reports that receivers can send back, and the frequency those reports
should be sent
• DMARC reporting provides the sender’s feedback on their SPF, DKIM, Identifier
Alignment and message disposition policies, which enable the sender to make these
policies more effective
• Two type of reports are sent: aggregate reports and forensic reports
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
DMARC functional flow
S/MIME (Secure/Multipurpose Internet Mail Extension) is a security enhancement to the MIME Internet e-
mail format standard, and provides authentication, confidentiality, compression and email compatibility
What is the basic difference between X.509 and PGP in terms of key hierarchies and key trust?
In X.509 there is a hierarchy of Certificate Authorities. Another difference is that in X.509 users will only trust
Certificate Authorities while in PGP users can trust other users.
Email threats and comprehensive email security • DNS-based authentication of named entities
• Functional flow
https://www.wired.com/2014/10/laura-poitras-crypto-tools-made-snowden-film-possible/