Author: Colin Robbins
Within certain industry sectors the use of electronic mail as a primary means of business communication is increasing rapidly. Not only is electronic mail being used for the transfer of textual messages, but the transfer of documents and spreadsheets. As the use of electronic mail increases the sensitivity of the data transferred also increases, however the integrity of this data is rarely questioned. This is clearly a problem; the door is open for eaves dropping on details of contracts between rival companies. Even worse, there is the potential for malicious modification or falsification of messages. There have been numerous reported cases of such attack, it is a certainty that even more go undetected or reported.
One well known set of asymmetrical functions that use this technique are the RSA algorithms. RSA is often used in conjunction with the data encryption standard DES to provide a complete security system, providing electronic mail with security services such as:
In the PGP system, a mail user decides upon an name and then generates a public and private key pair using publicly available software for the chosen name. The private component is obviously kept secret to the user. The public key is widely published, although no formal publication procedure is in place. Typically it is posted on bulletin boards, and transferred amongst colleagues.
When a PGP message is sent, it can be signed or encrypted using the private key, with the security information being attached to the message itself in a textual format. On receipt it is validated by recovering the appropriate public key (from somewhere) and verifying the signature on the message.
This simple model has lead to a quickly growing, pragmatic secure mail community, mainly on the Internet. However the informal nature does lead to problems of scale. Names are not guaranteed unique, so there is the potential for using the wrong key to encrypt data for a particular user. More importantly, as the key publication mechanism is ad-hoc, there is no fully controlled method of recalling a key if the private key is accidentally or maliciously revealed.
Using this model, PEM secures a message in a similar way to PGP - the security information is contained within the text of the message, for example:
-----BEGIN PRIVACY-ENHANCED MESSAGE----- Proc-Type: 4, MIC-CLEAR Content-Domain: RFC822 Originator-ID-Asymmetric: MCExCzAJBgNVBAYTAkdCMRIwEAYDVQQKEwlORVhPUiBMdGQ=,2c9ee165 MIC-Info: RSA-MD5, RSA, RlOWSKAGcQZpSmLcfHJYUdu4ZjrIOpci/0MhG6rzy4gsjFEjHHzMxZAL5pcBme4m W+jAP9JCnbFW32Xi7/pJ4w== This is an example clear text PEM message. Above are the security headers, used to validate this message. -----END PRIVACY-ENHANCED MESSAGE-----X.400 is rather different to PGP and PEM. In X.400 the digital signature is contained in the envelope of an X.400(88) message in ASN.1 (non-text) format. Putting the signature in the envelope adds extra functionality, as the whole message including subject line can then be secured, and not just selected body parts. As the format is non-text, however, the message has to be passed end to end on an X.400(88) system, it cannot be gatewayed to non-X.400(88) systems, which is currently a major practical problem.
Using the X.509 framework as a key part of the X.400 and PEM security systems does present a pragmatic problem. An X.509 certification infrastructure and X.500 directory infrastructure is required. This has the effect that systems using this technology will take longer to become established than the PGP model.
The infrastructure set up was then used to pilot X.400 and PEM in Europe and beyond; the software has been used worldwide, including pilots at NASA and the US Navy. PASSWORD as a project has now ended, but the infrastructure still remains, and is likely to be used as the basis for projects under the new Framework 4 initiative.
Within PASSWORD, the main use of secure mail was based upon PEM, use of secure X.400 was a little less common. The major reason for this is the secure X.400 model requires use of X.400(88) end to end, however within the selected pilot communities, X.400 is often gatewayed onto the Internet, for delivery using SMTP mail. PEM however will traverse these gateways. This is unfortunate as the security service offered by X.400 has higher functionality than the PEM model, but it is a common problem.
Requiring the use of X.400(88) end to end is not a problem in specific communities where X.400(88) end to end is available, or where the gateways are capable of adding the relevant security. One such community is the US Defence community where DMS (Defence Messaging System) has been proposed. In this project there are gateways to existing systems, however, these gateways are trusted to add the required X.400 security components. NEXOR is using experience gained in PASSWORD to be a lead technical authority and software supplier in one of the DMS bids, work done by NEXOR has lead to a number of revisions to the system specification.
The X.500 standard itself has mechanisms to prevent such attacks, using the X.509 model. Directory operations can all be signed so the originator of a query, and the validity of a response can be checked. In addition, using access control, the Directory can be structured to present different information sets to different categories of user. This is major component of the DMS project.
This approach is being pushed hard in the US Federal market, and is being closely monitored within Europe as can be seen from the European Commission green paper on security.
There are however, some question over its acceptability publicly and commercially. The security algorithms are implemented in hardware, and kept a closely guarded secret. To implement a system, you buy a card from a trusted source, unaware of the exact security mechanism it uses. Will industry trust unpublished security algorithms?
Once hardware solutions, such as Tessera or smart cards, are brought into being a security requirement, the cost of products inevitably goes up. This is being seen in many communities as one of the major blocking factors to the deployment of secure electronic mail. One of NEXORs key aims is to produce "affordable security" - to coin a phrase used by the UK Ministry of Defence in the definition of its Technology Development Program for security. Traditionally security products have been bespoke developments for specific requirements, if security is to become common, this has to turn around. Security enabling will have to be a key part of vendor product strategy.
So far, pilot security projects have clearly shown the technology can be made to work. Unfortunately the availability of technology is not the only issue, there are legal issues to resolve. There is confusion over what can and cannot be imported or exported across national borders. Within the US some algorithms fall under patent control. In some countries use of encryption technology is not allowed over public networks.
Despite these problems, it is looking increasing likely that a commercially based security infrastructure is not too far away. Products are starting to appear from a number of vendors. Can your company trust its unprotected electronic mail for much longer? The time is now right to start planning how secure protocols can be integrated.
Colin Robbins is a Networking Consultant for NEXOR.