16. Email Security

Email Security Requirements

SMTP (Single Message Transfer Protocol, RFC 5321) used to transmit email.

Message user agent (MUA) connects client to a mail system, using POP/IMAP to retrieve mail from message store (MS) and SMTP to send mail to a message submission agent (MSA).

The message handling system (MHS) transfers messages from the MSA to the MS via one or more message transfer agents (MTAs).

 Message Transfer    ...     Message Transfer
   Agent (MTA) 1   -------->   Agent (MTA) n
        ^                            |
        |                            | (Local SMTP)
        |                            v
Message Submission             Mail Delivery
    Agent (MSA)                 Agent (MDA)
        ^                            |
        |      Message Handling      |
        |        System (MHS)        |
- - - - - - - - - - - - - - - - - - - - - - - - - - -
        |                            | (Local SMTP)
        |                            v
        |                         Message
        |                       Store (MS)
        |                            |
        |                            | (IMAP/POP)
        |                            v
   Message User                Message User
    Agent (MUA)                 Agent (MUA)

Email content should be confidential and/or authenticated. The email service should also have a high level of availability.

Spam:

DomainKeys Identified Mail (DKIM)

Domain-to-domain security.

Standard which provides email authentication. RFC 6376.

Sending mail domain signs outgoing emails with its RSA signatures, verified by receiving domain.

Public key of sending domain stored in a DNS record.

Widely used to prevent email spoofing, spam, phishing.

The email contains:

STARTTLS

Extension of SMTP/POP (RFC 2595) and IMAP (RFC 3207) to run over TLS.

Link-by-link security; not end-to-end. However, use of TLS means forwards secrecy may availlable, although this doesn’t help if an attacker controls on of the links.

Link-to-link security allows metadata information (e.g. email destination) to be protected since most nodes provide transmit email for many users (ala VPN), making it hard to determine where a specific email is going from observing network traffic.

Opportunistic use of TLS; use if possible, continue if not available. This makes it vulnerable to STRIPTLS attacks where an attacker interrupts TLS negotiations, making it fail and fall back to plaintext.

End-to-End Security

Client-to-client security.

Pretty Good Privacy (PGP)

Email authentication and encryption for message contents.

Hybrid encryption:

Optional authentication:

Then packaging: content encoded with radix-64 so that binary strings can be sent.

Web of Trust:

Usability:

Criticisms:

Secure/Multipurpose Internet Mail Extension (S/MIME)

Has similar features to PGP, providing authentication, integrity, non-repudiation and confidentiality of the message body, but it cannot interoperate with PGP.

It includes the sender’s public key in each message, keys being X.509 certificates issued by CAs. It is supported by most popular mail clients.

Authentication:

Confidentiality:

The use of symmetric cryptography makes the process more efficient. By using a new ‘session key’ each time (one-time-mechanism), the encryption approach can be strengthened.