How to make Secure Easier to use

Similar documents
Views, Reactions and Impact of Digitally-Signed Mail in e-commerce.

BEST PRACTICES FOR PERSONAL Security

Cryptography and Network Security. Sixth Edition by William Stallings

Security Using Digital Signatures & Encryption

Chapter 5 Electronic mail security

Telemetry Data Sharing Using S/MIME

Cryptography III Want to make a billion dollars? Just factor this one number!

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Introduction and Overview. Why CSCI 454/554?

Public-Key Infrastructure NETS E2008

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Authenticating on a Ham Internet

Digital Signatures: Current Barriers. Simson L. Garfinkel Associate Professor, Naval Postgraduate School April 7, 2011

Internet Security Enhanced Security Services for S/MIME. Thomas Göttlicher

The DNS. Application Proxies. Circuit Gateways. Personal and Distributed Firewalls The Problems with Firewalls

Cryptography (Overview)

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

Comprehensive Setup Guide for TLS on ESA

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

Introduction to

Ralph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development

Application Firewalls

Electronic mail security

Information Security CS 526

Securing Internet Communication: TLS

Overview. SSL Cryptography Overview CHAPTER 1

CT30A8800 Secured communications

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Are You Avoiding These Top 10 File Transfer Risks?

PI Tom Grant says he. airs his suspicions on the Web in an attempt to keep teens from committing suicide in tribute to Cobain.

Crypto meets Web Security: Certificates and SSL/TLS

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

10EC832: NETWORK SECURITY

Contents. Management. Client. Choosing One 1/20/17

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Summary of PGP Services

Network Security and Cryptography. December Sample Exam Marking Scheme

Expires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Objectives CINS/F1-01

Secure XMaiL or How to get rid of legacy code in secure applications

Spam Protection Guide

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Computers and Security

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Cryptography and Network Security

Introduction to Computing

Digital signatures: How it s done in PDF

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Organising . page 1 of 8. bbc.co.uk/webwise/accredited-courses/level-one/using- /lessons/your- s/organising-

The evolving storage encryption market

(electronic mail) is the exchange of computer-stored messages by telecommunication.

Installation and usage of SSL certificates: Your guide to getting it right

secure communications

Orbital provide a secure (SSL) Mailserver to protect your privacy and accounts.

ONLINE SAFETY. Messaging, , Vlogging and Sexting

Security and Privacy

Diffie-Hellman. Part 1 Cryptography 136

Security: Focus of Control. Authentication

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Owner of the content within this article is Written by Marc Grote

Chapter 8 Information Technology

Managing Graymail. Overview of Graymail. Graymail Management Solution in Security Appliance

Outline. Tools

Secure Messaging Buyer s Guide

CipherMail encryption. CipherMail white paper

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

User Manual of Webmail Version 5

Internet Architecture

CS 356 Internet Security Protocols. Fall 2013

Security: Focus of Control

Pretty Good Privacy (PGP

PURCHASING AND USING A PERSONAL SECURE CERTIFICATE. Document issue: 12.1 Date of issue: March 2017

Chapter 4: Securing TCP connections

Best Practices in Securing a Multicloud World

ESP Egocentric Social Platform

Deploying a New Hash Algorithm. Presented By Archana Viswanath

BP115 Best Practices for Secure Messaging with S/MIME Marc Luescher IBM Technical Support Switzerland Daniel Nashed Nash!

Kurose & Ross, Chapters (5 th ed.)

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Naming and Certificates

A Review Paper on Network Security Attacks and Defences

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Sample excerpt. Virtual Private Networks. Contents

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

STAUNING Credit Application Internet Sales Process with /Voic Templates to Non-Responsive Prospects 2018 Edition

Ref:

Network Security and Cryptography. 2 September Marking Scheme

Applied Cryptography Protocol Building Blocks

Security in ECE Systems

Introduction to Public-Key Cryptography

MAKING SENSE OF MULTICHANNEL MARKETING

If you like this guide and you want to support the community, you can sign up as a Founding Member here:

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Chapter 8 Web Security

CYBERSECURITY SAVE YOUR BOTTOM LINE IBC Annual Convention Anne Benigsen, Bankers Bank of the West

One of the fundamental kinds of websites that SharePoint 2010 allows

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

An Overview of Secure and Authenticated Remote Access to Central Sites

WITH INTEGRITY

Transcription:

How to make Secure Email Easier to use Simson L. Garfinkel (MIT) Jeffrey I. Schiller (MIT) Erik Nordlander (MIT) David Margrave (Amazon) Robert C. Miller (MIT) http://www.simson.net/smime-survey.html/ 1

Public key cryptography was invented nearly 30 years ago to secure electronic mail. 1976 Public Key Cryptography (Diffie & Hellman) 1977 RSA Encryption (Rivest, Shamir & Adelman) 1978 Certificates (Kornfelder) 1987 Privacy Enhanced Mail 1992 PGP 1998 S/MIME With so much work and investment, why don t we use this exciting technology? 2

Most mail sent over the Internet isn t secure. Why not? Theories of Disuse #1 People don t have the software #2 The software is too hard to use #3 People don t want to use it!

Most mail sent over the Internet isn t secure. Why not? Theories of Disuse Solution #1 People don t have the software Distribute with the OS #2 The software is too hard to use #3 People don t want to use it!

Most mail sent over the Internet isn t secure. Why not? Theories of Disuse Solution #1 People don t have the software Distribute with the OS #2 The software is too hard to use Make it automatic #3 People don t want to use it!

Most mail sent over the Internet isn t secure. Why not? Theories of Disuse Solution #1 People don t have the software Distribute with the OS #2 The software is too hard to use Make it automatic #3 People don t want to use it! Automate & Educate

Most mail sent over the Internet isn t secure. Why not? Theories of Disuse Solution #1 People don t have the software Distribute with the OS #2 The software is too hard to use Make it automatic #3 People don t want to use it! Automate & Educate This is what the industry did with SSL/TLS, and it worked pretty well. 3

Email Security means different things to different people.

Email Security means different things to different people. Email security traditionally meant: Preventing Eavesdropping. Sealed for the recipient

Email Security means different things to different people. Email security traditionally meant: Preventing Eavesdropping. Sealed for the recipient Today email security means: Stopping Spam and Phishing. Signed by the Sender This creates an opportunity for advancement, because there are some senders that send a lot of mail. 4

S/MIME was standardized in the 1990s... To: simsong@acm.org From: simsong@mit.edu Subject: Message subjects are not signed, either Content-Type: multipart/signed; boundary="---xxx---" Message Header (RFC 822) ---xxx--- Content-Type: text/plain This is a signed message. Message Body ---xxx--- Content-Type: application/pkcs7-signature; name=smime.p7s Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMI AGCSqGSIb3DQEHAQAAoIIGQTCCAvowggJjoAMCAQICAw0E 2zANBgkqhkiG9w0BAQQFADBiMQswCQYDVQQGEwJaQTElMC... LjEsMCoGA1UEAxMjVGhhd3RlIFBlcnNvbmFsIEZyZWVt S/MIME Signature and Digital ID (43 lines; not to scale) ---xxx--- Signed Message 5

S/MIME was standardized in the 1990s... To: simsong@acm.org From: simsong@mit.edu Subject: Message subjects are not encrypted Content-Type: application/pkcs7-mime; name=smime.p7m Content-Disposition: attachment; filename=smime.p7m Message Header (RFC 822) MIAGCSqGSIb3DQEHA6CAMIACAQAxggGFMIIBgQIBADBpMG IxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxUaGF3dGUgQ29u c3vsdgluzyaouhr5ksbmdgqumswwkgydvqqdeynuagf3dg UgUGVyc29uYWwgRnJlZW1haWwgSXNzdWluZyBDQQIDDQTb MA0GCSqGSIb3DQEBAQUABIIBALdHEexS9RbvmCo5G0nWZ4 HaQSCzgDDljjgvW7+4M0iPkuec+XE1nn4p5x+++2C0gReY XvGC3ZEKgPsgFoQPGr0YXKHh3AHc1FN5DABcyVFwtc9xlq VwZHNXJd24ltAq0V0oiX8rmJK1t3sn1haWwgSXNzdWluZy BDQQIDDQTbMA0GCSqGSIb3DQEBAQUABIIBALdHEexS9Rbv mco5g0nwz4haqsczgddljjgvw7+4m0ipkuec+xe1nn4p5x +++2C0gReYXvGC3ZEKgPsgFoQPGr0YXKHh3AHc1FN5DABc yvfwtc9xlqvwzhnxjd24ltaq0v0oix8rmjk1t3sns8ujjx 1dt2g+JZx9wMCZkKsu3b+6OOup4WGHYE6NxLLGzJWc6yTh graizs4kus8ujbm9rtiqc4vz1+kjekwbcc0ueumzdcogcu vpczkpr5c1xyuidy6jwyjf2haeuj7ecu12db4u1oyljtvf... flqrouon1ia2p5ftp6fqfnnjntoijnzpqwmmav7jt2t98d 2mBAhklyg9h/6e4gAAAAAAAAAAAAAAAAAAAAAAAAAAAAA= S/MIME Message Encrypted MIME (75 lines; not to scale) Sealed Message 6

S/MIME is built into many modern email programs. Just click sign to sign and encrypt to seal. 7

You need a Digital ID to send signed mail or receive mail that s sealed... You have to get this from a trusted web site. 8

We think S/MIME clients are widely used...... but until now, we didn t have answers to some important questions: Can people receive S/MIME-signed messages? Do they understand what a signed message means? What other security measures are possible today? 9

Outline of this talk Background on Email Security. Survey Results: Merchants understand and can use technology that s already deployed. Improving Web Mail Security. Moving forward with Key Continuity Management. 10

Mail Security Survey. In June 2003, Amazon.COM started using S/MIME to sign the VAT invoices sent to its European Marketplace Sellers. EU Directive 99/93/EU calls for the use of advanced digital signatures for certain kinds of electronic messages. Amazon sent signed mail to Europeans, but not to other merchants. This created an excellent opportunity for survey research. 11

We created a web survey and posted links to it in the Amazon Sellers Forums: 5 web pages; 40 questions 2 minutes per page URLs posted in: US Seller s Forum European Seller s Forum Europe Sellers had received signed messages from Amazon. US Sellers had not! 12

Survey respondents: 1083 sellers clicked on the link 470 submitted the first web page. 417 (89%) completed all five pages. Sellers were very educated: 26% advanced degree 35% college degree Sellers were very computer literate: 18% very sophisticated computer user 68% comfortable using computers 13

Survey Outline Experience with sending and receiving secure mail. Mail clients used. Questions testing knowledge and understanding of encryption. Kinds of computers used. Appropriate use of signing and sealing. [FC 05 paper] Opinions of companies that send signed mail. Metaphors for digital signatures. Lots of comments. 14

More than half of our respondents read their mail with programs that support S/MIME Which computer programs do you use to read your email? Check all that apply: Outlook Express 42% Outlook 31% AOL 18% Netscape 10% Eudora 7% Apple Mail 3% Mozilla Mail 3% Lotus Notes 2% Evolution 1% Any S/MIME 54% Total Responding 435 No Response (19) 15

But most people who have S/MIME support don t know it! Does your email client handle encryption? Yes 27% +S/MIME 34% *** -S/MIME 14% *** No 5% I don t know 59% +S/MIME 54% * -S/MIME 66% * What s encryption? 9% +S/MIME 7% ** -S/MIME 14% ** Any S/MIME 54% p <.05; p <.01; p <.001 16

Not surprisingly, few merchants digitally sign their mail. I always send my email digitally signed. 2% I sometimes send email that is digitally signed 4% I rarely... because it is not necessary for the kind of 19% mail that I send. I usually don t because I don t care enough... 10% I don t ever... because I don t know how. 45%...don t understand what you mean by digitally 24% signed. Other 4% Total Responses 453 No Response (17) 17

Likewise, few merchants seal their mail with encryption. I always send email that is sealed for the recipient. 1% I sometimes send email that is sealed. 4% I rarely... because it is not necessary for the kind of 17% mail that I send. I rarely... because I just don t care. 8% I don t... because it is too hard to do. 6% I don t... because I don t know how. 41% I don t... because I am worried that the recipient 14% won t be able to read it. I don t understand what you mean by sealed or 22% encrypted. Other 3% Total Responses 454 No Response (16) 18

But Amazon s merchants think business-related email should be signed and sealed! What should be digitally signed? Bank or credit-card statements 65% Receipts from online merchants 59% What should be sealed with encryption? Bank or credit-card statements 79% Tax returns or complaints to regulators 74% Receipts from online merchants 47% (After we explained what signed and sealed meant.) 19

More than a third of the merchants know how sign their mail and think it is necessary, but they don t it anyway! I don t because I don t care. I doubt any of my usual recipients would understand the significance of the signature. Never had the need to send these kinds of emails. I don t think it s necessary to encrypt my email & frankly it s just another step & something else I don t have time for! This was a surprise: most security professionals don t think that users are this sophisticated. Full survey details at http://www.simson.net/smime-survey.html 20

Outline of this talk Background on Email Security. Survey Results: Merchants understand and can use technology that s already deployed. Improving Web Mail Security. Digital signatures need to be more smoothly integrated. Walled Gardens and webmail systems can provide stronger sender authentication. Moving forward with Key Continuity Management. 21

S/MIME signatures are well-integrated in some mail clients. Apple Mail: Outlook Express: 22

S/MIME signatures appear as attachments on non-s/mime clients: I couldn t open that file you sent me. What is it? This is a problem results directly from the use of MIME multipart for signatures. 23

Mail that is signed with a Digital IDs issued by unknown CA generates a scary warning. Security Warning: You have not yet made a decision about whether to trust the digital ID used to sign this message Recommendation: Don t use self-signed Digital IDs or private CAs 24

Occasionally, signed mail gets corrupted Mailing lists add postscripts and advertisements. Virus scanners Firewalls strip signatures Security Warning: Message has been tampered with Recommendation: Put pressure on YahooGroups and other providers to fix these problems! 25

Signed mail is the first step to secure mail. Sealed mail is the second step. But we aren t ready for it! 40% of people using cryptography in our survey didn t know they needed to keep their private key! Keeping your private key is hard. Must move private key when you switch machines. Must not delete expired keys. Recommendation: Mail programs should unseal before storing. 26

Walled Gardens: Today s web mail systems can provide significantly more security than they do. AOL s anti-phishing blue mail is official mail from AOL. 27

AOL distinguishes between inside-mail and outside mail: inside AOL outside AOL AOL should also: Distinguish internal mail from external. Verify S/MIME signatures Send messages signed. 28

Bridging the Gap with Key Continuity Management. FIRST TIME OKAY! CHANGED. KCM automates what a security expert would do when faced with a self-signed certificate. (SSH Model) 29

We ve actually tested KCM in the lab. No KCM KCM Works against some attacks, not others. Paper in the works. We re making the testing protocol available to others. Complete details in [Garfinkel 05] 30

In Summary, here s how to make secure email easier to use: Start sending signed mail now, especially bulk-mailers. Fix systems that break S/MIME signatures. Clients should store messages unsealed by default. Web mail providers should: Start verifying S/MIME signatures. Visually distinguish inside mail from external mail. Digitally-signing outgoing mail (S/MIME, not Domain Keys). Questions? 31