Internet Security
Enhanced Security Services for S/MIME
Thomas Göttlicher
April 20, 2004
Internet Security Enhanced Security Services for S/MIME Thomas - - PowerPoint PPT Presentation
Internet Security Enhanced Security Services for S/MIME Thomas Gttlicher April 20, 2004 Agenda Basics Technical Signed receipts Security labels Secure mailing lists Signed certificates 1 Basics Basics
Internet Security
Enhanced Security Services for S/MIME
Thomas Göttlicher
April 20, 2004
Agenda
Basics
Basics
MIME e-mail
Basics
signed S/MIME e-mail
S/MIME digital signatureBasics
encrypted S/MIME e-mail
Internet Layer
application layer transport layer network layer link layer physical layer S/MIMECompatibility
Triple Wrapping
Triple Wrapping (continued)
Content-type: multipart/signed; protocol="application/pkcs7-signature"; boundary=outerboundaryTriple Wrapping (continued)
Content-type: multipart/signed; protocol="application/pkcs7-signature"; boundary=outerboundarySigned Receipts
Signed Receipts (Example) A B
Signed Receipts (Example) A B
Signed Receipts (Example) A B
Signed Receipts (continued)
Signed Receipts (Example) A C B D
Signed Receipts (Example) A C B D
Signed Receipts (Example) A C B D
Signed Receipts (continued)
Signed Receipts (Example) A C B D
Signed Receipts (Example) A C B D
Signed Receipts (Example) A C B D
Signed Receipts (continued)
Signed Receipts (Example) A C B Mail List
Signed Receipts (Example) A C B Mail List
Signed Receipts (Example) A C B Mail List
Signed Receipts (continued)
Signed Receipts (Example) A B
Signed Receipts (Example) A B
Signed Receipts (Example) A B
Signed Receipts (continued)
Signed Receipts (Example) A B
Signed Receipts (Example) A B
Signed Receipts (Example) A B
Signed Receipts (continued)
Security Labels
Security Labels (Example) A B
Security Labels (Example) A B
Security Labels (Example) A B
Security Labels (Example) A B
Equivalent Security Labels
Security Labels (Example) A B
Security Labels (Example) A B
Security Labels (Example) A B
"unmarked" ⇒ "anyone"Security Labels (Example) A B
Security Labels (Example) A B
Mail List Management
Mail List Management - Mail Loops
Mail List Management - Mail Loops (Example) A MLA1 MLA2
Mail List Management - Mail Loops (Example) A MLA1 MLA2
expanded by MLA1Mail List Management - Mail Loops (Example) A MLA1 MLA2
expanded by MLA1 expanded by MLA2Mail List Management - Mail Loops (Example) A MLA1 MLA2
expanded by MLA1 expanded by MLA2Mail List Management - Mail Loops (Example) A MLA1 MLA2 Admin
Mail List Management - Receipts
Mail List Management - Receipts (Example) X A B
receipts to: XMail List Management - Receipts (Example) X A B
receipts to: XA's Policy: insteadOf: A
Mail List Management - Receipts (Example) X A B
receipts to: X receipts to: AA's Policy: insteadOf: A
Mail List Management - Receipts (Example) X A B
receipts to: X receipts to: AA's Policy: insteadOf: A B's Policy: none
Mail List Management - Receipts (Example) X A B
receipts to: X receipts to: AA's Policy: insteadOf: A B's Policy: none
receipts to: -Mail List Management - Receipts (Example) X A B
receipts to: X receipts to: AA's Policy: insteadOf: A B's Policy: none
receipts to: -Signing Certificate - Attacks
Signing Certificate - Attacks (continued)
Signing Certificate - Responses
Security Considerations
Security Considerations (continued)
Details: RFC 2634