lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040331013959.GB45024@blossom.cjclark.org>
From: cristjc at comcast.net (Crist J. Clark)
Subject: SMTP Encryption (S/MIME) for Outlook question

On Wed, Mar 24, 2004 at 05:17:36PM -0600, Fetch, Brandon wrote:
> No flames here please.  I've just been asked about running some form of
> encryption on our mail clients (Outlook) to send encrypted SMTP across the
> Internet and would like some opinions/directions.
> 
> Our userbase isn't that technical so we'd need something that is pretty user
> friendly (I know, divergent goals) but is still secure to a point.

Most email clients are pretty easy to use with respect to
S/MIME... Once you get the certificates installed. PKI. Managing
certificates for a decent-sized luser base is not fun.

> I don't know the exact details on their goals other than preventing random
> eavesdropping (sniffing) of clear-text SMTP traffic across the Internet to a
> remote, non-internal destination.
> 
> What do other Win/Exchange/Outlook IT admins use for S/MIME?  
> 
> BTW, if there's something that will run on top of the SMTP gateway server or
> the internal Exchange server to encrypt the message before being routed to
> the Internet, this is also acceptable.  I figure there must be something
> available that works like this.

To encypt the individual messages? You need, or maybe the people
laying this on you, need to think about this a bit more. For good
encryption you need two things: an eavsedropper cannot easily recover
the clear text and (people sometimes forget this part) the recipient
CAN easily recover the plain text. Since we're talking S/MIME, how
does the SMTP server figure out whose public keys to encrypt the
message with? The SMTP server has to have the certs for _every single
recipient your organization mails to?_

The problem here is that in order to send an encrypted message to
someone, they have to be using S/MIME (i.e. have their own cert and
private keys). You cannot unilatterally just encrypt your outgoing
email[0]. The recipients have to want to play along. And good luck
forcing your security policies on all of the external organizations
you deal with.

Someone else mentioned TLS for the SMTP connetion. This doesn't
encrypt the message per sae, but the communication channel (to the
next server anyway, who knows where they might relay it next)
is. Still, the remote server has to be willing to play (certs 'n' all)
to do this.

The bottom line, for external groups you can talk or coerce into this,
it could work, but if you still want to be able to send an email to
joe.user@...-internet.net, it's going to be going in clear text.

[0] I suppose you could, but then you need to make the keys easily
available, and if you do that, what's the point in encrypting?
-- 
Crist J. Clark                     |     cjclark@...m.mit.edu
                                   |     cjclark@....edu
http://people.freebsd.org/~cjc/    |     cjc@...ebsd.org


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ