Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME...

74
Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004

Transcript of Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME...

Page 1: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Internet SecurityEnhanced Security Services for S/MIME

Thomas Göttlicher

April 20, 2004

Page 2: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Agenda

• Basics

• Technical

• Signed receipts

• Security labels

• Secure mailing lists

• Signed certificates

Page 3: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

1Basics

Page 4: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Basics

• S/MIME = Secure MIME

• protect MIME e-mail

Page 5: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Basics

• S/MIME = Secure MIME

• protect MIME e-mail

text

Excel sheet

Word document

text

MIME e-mail

Page 6: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Basics

• S/MIME = Secure MIME

• protect MIME e-mail

text

Excel sheet

Word document

text

signed S/MIME e-mail

S/MIME digital signature

Page 7: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Basics

• S/MIME = Secure MIME

• protect MIME e-mail

text

S/MIME encrypted envelope

Excel sheet

Word document

text

encrypted S/MIME e-mail

Page 8: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

2Technical

• Internet Layer

• Compatibility

• Triple Wrapping

Page 9: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Internet Layer

application layer

transport layer

network layer

link layer

physical layer

S/MIME

Page 10: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Compatibility

• S/MIME v3 can read messages from S/MIME v2

• BUT: S/MIME v3 messages are unreadable by S/MIME v2

Page 11: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Triple Wrapping

• Message has been signed, encrypted and signed again

• Inside signature: content integrity

• Encrypted body: confidentiality

• Outside signature: integrity for information produced hop-by-hop

Page 12: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Triple Wrapping (continued)Content-type: multipart/signed; protocol="application/pkcs7-signature"; boundary=outerboundary

--outerboundaryContent-type: application/pkcs7-mime; smime-type=enveloped-data Content-type: multipart/signed; protocol="application/pkcs7-signature"; boundary=innerboundary --innerboundary Content-type: text/plain Original content --innerboundary Content-type: application/pkcs7-signature inner SignedData block (eContent is missing) --innerboundary--

--outerboundaryContent-type: application/pkcs7-signature

outer SignedData block (eContent is missing)

--outerboundary--

Page 13: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Triple Wrapping (continued)Content-type: multipart/signed; protocol="application/pkcs7-signature"; boundary=outerboundary

--outerboundaryContent-type: application/pkcs7-mime; smime-type=enveloped-data Content-type: multipart/signed; protocol="application/pkcs7-signature"; boundary=innerboundary --innerboundary Content-type: text/plain Original content --innerboundary Content-type: application/pkcs7-signature inner SignedData block (eContent is missing) --innerboundary--

--outerboundaryContent-type: application/pkcs7-signature

outer SignedData block (eContent is missing)

--outerboundary-- outer signature computed over

inner signature computed over

encrypted data

Page 14: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

3 Signed Receipts

Page 15: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts

• Proof of delivery of a message

• Before processing a receipt-request: the receiving agent must verify the signature => no receipt if signature is invalid

• Receiving user agent software should automatically create a signed receipt when requested

Page 16: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 17: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 18: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 19: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (continued)

• Receipts can be requested from

– all recipients

Page 20: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

D

Page 21: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

D

Page 22: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

D

Page 23: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (continued)

• Receipts can be requested from

– all recipients

– a specific list of recipients

Page 24: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

D

Page 25: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

D

Page 26: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

D

Page 27: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (continued)

• Receipts can be requested from

– all recipients

– a specific list of recipients

– first tier (= recipients that did not receive the message as members of a mailing list)

Page 28: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

Mail List

Page 29: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

Mail List

Page 30: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A C

B

Mail List

Page 31: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (continued)

• Receipts can be requested from

– all recipients

– a specific list of recipients

– first tier (= recipients that did not receive the message as members of a mailing list)

• Sender can indicate that receipts be sent to many places

– receipt not just to the sender

Page 32: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 33: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 34: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 35: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (continued)

• Receipts can be requested from

– all recipients

– a specific list of recipients

– first tier (= recipients that did not receive the message as members of a mailing list)

• Sender can indicate that receipts be sent to many places

– receipt not just to the sender

– not even to the sender

Page 36: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 37: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 38: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (Example)

A B

Page 39: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signed Receipts (continued)

• Receipts can be requested from

– all recipients

– a specific list of recipients

– first tier (= recipients that did not receive the message as members ofa mailing list)

• Sender can indicate that receipts be sent to many places

– receipt not just to the sender

– not even to the sender

• Multiple Receipt Requests: Each recipient should only return one receipt

• No singed receipt for a signed receipt

Page 40: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

4 Security Labels

Page 41: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels

• Set of security information regarding the sensitivity of the content that is protected by S/MIME encapsulation

• Access control: receiving agent examines the security labels and determines whether or not the recipient is allowed to see the contents

• Security Labels must be signed attributes

• Signature must be verified and valid, before processing a security label

• Classification: unmarked, unclassified, restricted, confidential, secret, top-secret; other values can be defined by any organization

Page 42: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B

Page 43: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B

Page 44: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B

Page 45: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B

Page 46: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Equivalent Security Labels

• Organizations are allowed to define their own security policies, many different security policies will exist=> Equivalences between different security policies of different organizations

• Receiving agents have the option to process EquivalentLabels attributes

• Receiving agent processes equivalent labels only if it trusts the signer

• If the receiving agent understands the security label, it must ignore all equivalent labels

Page 47: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B

Page 48: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B

Page 49: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B"unmarked" ⇒ "anyone"

Page 50: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B

Page 51: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Labels (Example)

A B

Page 52: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

5 Secure Mailing Lists

• Mail List Management

• Mail Loops

• Receipts

Page 53: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management

• Sending agents must create recipient-specific data structures for each recipient of an encrypted message.

• Large number of recipients => resources needs

• Mail List Agents (MLA) can take a singe message and perform the recipient-specific encryption

Page 54: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Mail Loops

• One mailing list is member of a second and the second is member of the first.

• MLA have to prevent Mail loops

– Each Time a MLA expands a message it adds its own identifier to the history

– If own unique identifier is in the history => Mail loop

• Don't send the message to the list again

• Warning to a human mail list administrator

Page 55: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Mail Loops (Example)

AMLA1 MLA2

Page 56: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Mail Loops (Example)

AMLA1 MLA2

expanded by MLA1

Page 57: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Mail Loops (Example)

AMLA1 MLA2

expanded by MLA1expanded by MLA2

Page 58: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Mail Loops (Example)

AMLA1 MLA2

expanded by MLA1expanded by MLA2

Page 59: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Mail Loops (Example)

AMLA1 MLA2

Admin

Page 60: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Receipts

• Mail List Agent Signed Receipt Policy Processing

– A MLA often needs to propagate forward the receipt policy

– Any MLA adds "insteadOf", "inAdditionTo", "none" to the history

– Only last recipient needs to process

• No receipt, if originator has not requested

• If originator has requested, but MLA supersedes request: MLA may inform the originator

Page 61: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Receipts (Example)

X

A

B

receipts to: X

Page 62: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Receipts (Example)

X

A

B

receipts to: X

A's Policy: insteadOf: A

Page 63: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Receipts (Example)

X

A

B

receipts to: X

receipts to: A

A's Policy: insteadOf: A

Page 64: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Receipts (Example)

X

A

B

receipts to: X

receipts to: A

A's Policy: insteadOf: A

B's Policy: none

Page 65: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Receipts (Example)

X

A

B

receipts to: X

receipts to: A

A's Policy: insteadOf: A

B's Policy: none

receipts to: -

Page 66: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Mail List Management - Receipts (Example)

X

A

B

receipts to: X

receipts to: A

A's Policy: insteadOf: A

B's Policy: none

receipts to: -

Page 67: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

6 Signed Certificates

• Attacks

• Responses

Page 68: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signing Certificate - Attacks

• Substitution Attack

– Simple substitution of one certificate for a another

– issuer and serial number in the SignerInfo is modified to refer to a new certificate

• DoS-Attack where an invalid certificate is substituted for the valid=> message is unverifiable, as the public key no longer matches the public key used to sign

• Substitution of one valid certificate for the original valid certificate where the public keys match=> Message is validated under different constraints the originator intended

Page 69: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signing Certificate - Attacks (continued)

• Reissue of Certificate Attack

– Attack deals with a certificate authority (CA) re-issuing the signing certificate

– may become more frequent as CA reissue their own root certificates

• Duplicate CA Attack

– Setting up a CA that attempts to duplicate an existing CA

– Issue a new certificate with the same public keys as the signer used

Page 70: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Signing Certificate - Responses

• Substitution Response

– DoS cannot be prevented

– No way to automatically identify the attack because it is indistinguishable from a message corruption.

– No practical way to prevent users from getting new certificates with the same public key.

• Reissue of Certificate Response

– A CA should never reissue a certificate with different attributes

• Duplicate CA Response

– Only way: Never trust a duplicate CA

Page 71: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

7 Conclusion

• Security Considerations

Page 72: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Considerations

• Mailing lists

– Mailing lists that encrypt their content my be targets for DoS-Attacks if they to not prevent Mail-Loops. Using simple RFC822-Header spoofing it is easy to subscribe on encrypted mailing list to another, thereby setting up an infinity loop.

– Ciphertext Attacks: MLAs should notify an admin if a large number of undecryptable messages are receives

Page 73: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Security Considerations (continued)

• Signed Receipts

– Recipient must not send back a reply if it cannot validate the signature.

– Senders should encrypt receipts to prevent a passive attacker from gleaning information

• Security Labels

– Senders must not rely on recipients' processing software to correctly process security labels

• some S/MIME clients may not understand security labels but display a labeled message

• Error response sent to originator and that error bounces back=> unlike that the bounce message will have a proper security label

Page 74: Internet Security - th-nuernberg.de · Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004. Agenda • Basics • Technical ... (= recipients

Details: RFC 2634