Ch7-Electronic Mail Security
Ch7-Electronic Mail Security
29/12/2024
WEB TRAFFIC SECURITY APPROACHES
INTERNET MAIL ARCHITECTURE
❑Message User Agent (MUA): Operates on behalf of user actors and user
applications. It is their representative within the email service. Typically, this
function is housed in the user’s computer and is referred to as a client email
program or a local network email server.
❑ As with POP3, Internet Mail Access Protocol (IMAP) also enables an email client to access
mail on an email server. IMAP also uses TCP, with server TCP port 143. IMAP is more
complex than POP3. IMAP provides stronger authentication than POP3 and provides other
functions not supported by POP3.
MULTIPURPOSE INTERNET MAIL EXTENSION (MIME)
❑ As justification for the use of MIME, lists the following limitations of the SMTP scheme.
1. SMTP cannot transmit executable files or other binary objects. A number of schemes are in
use for converting binary files into a text form that can be used by SMTP mail systems.
2. SMTP cannot transmit text data that includes national language characters, because these are
represented by 8-bit codes with values of 128 decimal or higher, and SMTP is limited to 7-
bit ASCII.
3. SMTP servers may reject mail message over a certain size.
4. SMTP gateways that translate between ASCII and the character code EBCDIC do not use a
consistent set of mappings, resulting in translation problems.
5. Some SMTP implementations do not adhere completely to the SMTP standards defined in
RFC 821. Common problems include: —Deletion, addition, or reordering of carriage return
and linefeed —Truncating or wrapping lines longer than 76 characters —Removal of trailing
white space (tab and space characters) —Padding of lines in a message to the same length —
Conversion of tab characters into multiple space characters
THE MIME SPECIFICATION
1. Five new message header fields are defined, which may be included in an
RFC 5322 header. These fields provide information about the body of the
message.
2. A number of content formats are defined, thus standardizing
representations that support multimedia electronic mail.
3. Transfer encodings are defined that enable the conversion of any content
format into a form that is protected from alteration by the mail system.
THE FIVE HEADER FIELDS DEFINED IN MIME
❑MIME-Version: Must have the parameter value 1.0. This field indicates that
the message conforms to RFCs 2045 and 2046.
❑Content-Type: Describes the data contained in the body with sufficient detail
that the receiving user agent can pick an appropriate agent or mechanism to
represent the data to the user or otherwise deal with the data in an appropriate
manner.
❑Content-Transfer-Encoding: Indicates the type of transformation that has
been used to represent the body of the message in a way that is acceptable for
mail transport.
❑Content-ID: Used to identify MIME entities uniquely in multiple contexts.
❑Content-Description: A text description of the object with the body; this is
useful when the object is not readable (e.g., audio data).
MIME CONTENT
TYPES
MIME TRANSFER ENCODINGS
EMAIL THREATS AND COMPREHENSIVE
EMAIL SECURITY
❑ Authenticity-related threats: Could result in unauthorized access to an enterprise’s email system.
❑ Availability-related threats: Could prevent end users from being able to send or receive email.
EMAIL STANDARDIZED PROTOCOLS FOR SECURITY
❑ STARTTLS: An SMTP security extension that provides authentication, integrity, non-repudiation
(via digital signatures) and confidentiality (via encryption) for the entire SMTP message by running
SMTP over TLS.
❑ S/MIME: Provides authentication, integrity, non-repudiation (via digital signatures) and
confidentiality (via encryption) of the message body carried in SMTP messages.
❑ DNS Security Extensions (DNSSEC): Provides authentication and integrity protection of DNS data,
and is an underlying tool used by various email security protocols.
❑ Sender Policy Framework (SPF): Uses the Domain Name System (DNS) to allow domain owners
to create records that associate the domain name with a specific IP address range of authorized
message senders
❑ DomainKeys Identified Mail (DKIM): Enables an MTA to sign selected headers and the body of a
message. This validates the source domain of the mail and provides message body integrity.