Lecture 20: Email security Flashcards
What are the two types of link security?
DKIM
STARTTLS
What are the two types of end-to-end security?
PGP
S/MIME
What does DKIM stand for?
Domain Keys Identified Mail
What does S/MIME stand for?
Secure/Multipurpose Internet Mail Extension
What does SMTP stand for?
Single message transfer protocol
What is SMTP?
a mail transmission protocol to send an email from a source to a destination
What are POP and IMAP?
mail access protocols to allow a message user agent (MUA) to download an email from a message transfer agent (MTA)
What does MUA stand for?
message user agent
What does MTA stand for?
message transfer agent
What does the MUA do?
connects a client to a mail system
What does the MUA when using SMTP?
to send a mail to a message submission agent (MSA)
What is a MSA?
message submission agent
What does the MUA do when using POP or IMAP?
to retrieve the mail from the message store (MS)
What does MS stand for?
message store
What does MHS stand for?
message handling system
What does the MHS do?
transfers a message from MSA to MS via one or more message transfer agents(MTAs)
Give the diagram for the architecture i.t.o email security requirements
IMPORTANT
See slide 7 in set 20
Comment on potential security threats i.t.o email security
Considering threats in the usual CIA categories
- -> Email content may require confidentiality and/or authentication
- -> Email service availability may be threatened
Metadata in the header is a significant source of information for an attacker
What is spam?
Unsolicited bulk email (UBE)
A cheap form of advertising?
Common vector for phishing attacks
What do countermeasures of span typically use?
email filtering
Comment on the proposals to implement proof of work for preventing spam
The email sender must solve a moderately hard puzzle in order to have the mail accepted into MHS
e.g. Hashcash
What kind of basis is security provided between different agents in the mail system on? What protocols are used?
link-by-link basis
STARTTLS and DKIM
What kind of basis is security provided from client to client in the mail system on? What protocols are used?
end-to-end basis
PGP and S/MIME
In terms of link and end-to-end security, what is the ideal situation?
both are used
What standard is DKIM in?
RFC 6376 (2011)
What does DKIM allow?
the sending mail domain to sign an outgoing mail using RSA signatures
What can verify the origin of mail in DKIM?
receiving domain
What uses DKIM?
Widely used by prominent email providers, including Gmail
What does DKIM help to prevent?
email spoofing, and so to reduce spams and phishing