Secure Internet EmailUsing x509 certificates and PKI to secure message transmission
by Mark Foster We all know the virtues of a secure webserver - the "lock" icon in our browser gives us the confidence to send our most personal information (namely credit card numbers) over an insecure medium (the Internet) knowing that are information is secure. But what does this really mean, and how can this same mechanism be reused to secure our most personal information sharing mechanism - email? What the lock symbol in your browser really means is that the owner of the website (https://www.example.com/) has installed with is commonly called an SSL certificate or x509 certificate. This certificate, in turn, is used to secure the data transmission between your browser and the web server such that the data is encrypted (cannot be read by casual observers) and authenticated (well at least in one direction, we'll get to that later). Now it's worth noting at this point that there's really nothing "web-specific" about this SSL certificate technology. All of it falls under the umbrella term PKI (Public Key Infrastructure) which has been in development for quite some time (30 years?). Now there's not much about PKI that I'm going to regurgitate for anyone, since there are plenty of references about the technology. The important things which make this technology ripe for exploitation on the email front are:
How would it work?Consider the vilified spammer who takes it upon themself to obtain one of these SSL certificates in order to play mailbomb on the newly-secured email network. Said spammer's email message is all that would be needed as evidence to revoke their certificate, and blam! They are out of business. Now that's saying alot, and there are alot of assumptions that need to be addressed before we really can put that (and most) spammers out of business...let's step through these assumptions one-by-one so that we haven't missed anything.
ConclusionIn conclusion, the table is set for deploying a widely-recognized, stable and scalable solution for securing one of our most important communication mechanisms. Email is here to stay, and almost everyone is using it. Now is the time to fix it.Next time, I'll look at some of the popular MTAs being used on the Internet to gauge their readiness for this solution. Stunnel comes to mind as another piece of software that could play a huge role. Also I will setup a prototype CA to show how easy that aspect of the process can be. Until next time! -mdf Notes[2]eMail Server Survey[3] DNSBL - DNS black list - a mechanism utilitizing DNS that has been seen recently. By performing a DNS lookup on the address of a connecting client, a mail server determines whether to accept the connection based in the response of the DNSBL. There are no DNS white lists that I am aware of. Resourceshttp://amtp.bw.org/docs/draft-weinman-amtp-02.txtAnti-Spam Research Group RFC 2487 - SMTP Service Extension for Secure SMTP over TLS Certificate Authority Services Certificates and PKI
Update 2004/01/31I've taken my follow-up research on this matter over to Credentia - including instructions on enabling certificate verif ication and using STARTTLS on various MTAs.
![]()
$Id: secure-email.html,v 1.8 2005/11/12 16:36:00 mdf Exp $
|
|
|