Lecture 11-Email Security
Lecture 11-Email Security
Email Security
08/14/2021
Overview
• How email really works
• What are the real security issues?
• What solutions exist?
• How you can avoid security risks.
08/14/2021 2
What is an email
08/14/2021 4
Sending an Email Message - Process
08/14/2021 5
Email Security characteristics
•Authentication
•Confidentiality
•Non-repudiation
08/14/2021 6
Email Fundamentals
• Typical path of an email message:
Mail Server
Client
Mail Server
b) SMTP
• SMTP does not encrypt messages (unless the servers in
question support opportunistic TLS encryption).
• Communications between SMTP servers may send your
messages in plain text for any eavesdropper to see.
• Additionally, if your email server requests that you send your
username and password to “login” to the SMTP server in
order to relay messages to other servers, then these are also
sent in plain text, subject to eavesdropping.
• Finally, messages sent via SMTP include information about
which computer they were sent from and what email program
was used. This information, if available to all recipients, may
be a privacy concern.
08/14/2021 11
The Lack of Security in Email contd:..
:
08/14/2021 13
The Lack of Security in Email contd…
d) BACKUPS
• Email messages are generally stored on SMTP
servers in plain, unencrypted text.
• Backups of the data on these servers may be
made at any time and administrators can read
any of the data on these machines.
• The email messages you send may be saved
unexpectedly and indefinitely and may be read
by unknown persons as a result.
08/14/2021 14
Security threats for email communication
a) Eavesdropping
b) Identity Theft:
• If someone can obtain the username and password
that you use to access your email servers, they can
read your email and send false email messages as
you.
• Very often, these credentials can be obtained by
eavesdropping on SMTP, POP, IMAP, or Webmail
connections, by reading email messages in which
you include this information.
08/14/2021 15
Security threats for email communication cont.
c) Message Modification
• Anyone who has system administrator
permission on any of the SMTP Servers that
your message visits, can read, delete or alter
the message before it continues on to its
destination.
• Your recipient has no way to tell if the email
message that you sent has been altered!
• If the message was merely deleted they
wouldn’t even know it had been sent.
08/14/2021 16
Security threats for email communication cont..
d) False Messages
• It is very easy to construct messages that
appear to be sent by someone else.
• Many viruses take advantage of this situation to
propagate themselves.
• In general, there is no way to be sure that the
apparent sender of a message is the true
sender – the sender’s name could have been
easily fabricated
08/14/2021 17
Security threats for email communication cont..
e) Message Replay
• Just as a message can be modified, messages can
be saved, modified, and re-sent later!
•You could receive a valid original message, but
then receive subsequent faked messages that
appear to be valid.
08/14/2021 18
Security threats for email communication cont..
f) Unprotected Backups
• Messages are usually stored in plain text on
SMTP Servers.
• Thus, backups of these servers’ disks usually
contains plain text copies of your messages.
• As backups may be kept for years and can be
read by anyone with access to them, your
messages could still be exposed in insecure
places even after you think that all copies have
been “deleted”.
08/14/2021 19
Security threats for email communication contd.
g) Repudiation
• Because normal email messages can be forged,
there is no way for you to prove that someone
sent you a particular message.
• This means that even if someone DID send you
a message, they can successfully deny it.
• This has implications with regards to using
email for contracts, business communications,
electronic commerce
08/14/2021 20
Solution - Encryption
Asymmetric encryption lets you do the following:
i. Send an Encrypted Message
•To send a secure message to someone, all you have
to do is encrypt it with their public key!
•Only the intended recipient who has the matching
private key will be able to decrypt and read the
message.
•This solves the problem of eavesdropping and the
problem of sending secret keys that is inherent in
symmetric key encryption.
08/14/2021 21
Solution – Encryption contd …
ii. Prove You Sent A Message
• To prove to someone that you sent a message,
you can encrypt the message (or just a piece of
it) with your private key.
• Then, anyone can decrypt it with your public
key and read the contents.
• The fact that your public key decrypts the
message proves that only you could have sent it
(or someone who has your private key).
08/14/2021 22
Solution – Encryption contd ...
iii. Sign a Message
•A message signature proves that you sent the
message AND allows the recipient to determine if
the message was altered in transit.
•This is done by using your private key to encrypt a
digest of a message at the time of sending.
•The recipient can decrypt this digest and compare
it to a digest of the received message.
• If they match, then the message is unaltered and
was sent by you.
08/14/2021 23
Solution – Encryption contd ...
iv. Encrypted, Signed Messages:
• The most secure form of communication is to
first add a signature to the message and then to
encrypt the message plus signature with the
recipient’s public key.
• This combines all of the benefits of all of the
techniques: security against eavesdropping and
unexpected storage, proof of sender, and proof
on message integrity.
08/14/2021 24
Securing Your Email With SSL or TLS
08/14/2021 25
Securing Your Email With SSL or TLS contd…
08/14/2021 26
Benefits of SSL
The benefits of SSL are twofold:
1. You can determine if you are connecting to the
right server
2. You and the server can communicate securely.
08/14/2021 27
Security offered by SSL
•If you get any warning messages when connecting to a server using
SSL, you should think twice about ignoring them.
•The warnings can be due to a small technical problem or an
indication that your communications are being intercepted.
•These warnings usually indicate one of the following:
i. The server’s SSL “certificate” (i.e. public/private key pair) has
expired.
ii. Some of the information in the certificate doesn’t match the
information you expect — i.e. the certificate was issued for a
different server name than the one you are trying to connect to.
(You could be inadvertently connecting to the wrong server.)
iii. The certificate was issued by an un-trusted agency.
08/14/2021 28
Security offered by SSL
•If you get any warning messages when connecting to a server using
SSL, you should think twice about ignoring them.
•The warnings can be due to a small technical problem or an
indication that your communications are being intercepted.
•These warnings usually indicate one of the following:
i. The server’s SSL “certificate” (i.e. public/private key pair) has
expired.
ii. Some of the information in the certificate doesn’t match the
information you expect — i.e. the certificate was issued for a
different server name than the one you are trying to connect to.
(You could be inadvertently connecting to the wrong server.)
iii. The certificate was issued by an un-trusted agency.
08/14/2021 29
SSL + Asymmetric key encryption
•Asymmetric key encryption should be used in combination with SSL
•SSL only protects the message path between you and your SMTP
Server and stops there.
•Asymmetric key encryption provides message signatures and/or
encryption. This completely solves the issues of:
i. Eavesdropping (everything is always encrypted)
ii. Message modification (message digests are used)
iii. Message replay (you can include a timestamp in the
signature)
iv. Repudiation (signatures allow proof of who sent the
message)
v. Unprotected backups (everything is always encrypted)
08/14/2021 30
Email threats and countermeasures
Threats Countermeasures
Viruses Antivirus software,
Hoaxes User education
Email Educating users,
Spoofing
Phishing Firewalls,
Spams Spam filters, user education
08/14/2021 31
Questions
1) How does the speed of virus/worm transmission
impact things?
2) Do you think spam is a fixable problem?
3) When can we send attachments securely?
4) Suggest solutions to the problem of identity
spoofing
5) Can we detect spam and delete it before it
gets to the user?
08/14/2021 32
Spam
Write notes
08/14/2021 33