April 2004 CSO Magazine




 

Signed, Sealed and Delivered

Coping with insecure e-mail

BY SIMSON GARFINKEL

FEW ORGANIZATIONS send confidential information on postcards. Credit card statements, medical records, job offers and personal correspondence are invariably sealed in envelopes before they are sent. Likewise, most important correspondence is put on letterhead—a practice that, prior to the wide deployment of color ink-jet printers, was actually pretty good at deterring casual attempts of fraud or forgery.

But few organizations have adopted similar measures for protecting mail sent over the Internet. Techniques for digitally signing and sealing electronic communications have existed for nearly two decades, yet their adoption has been wretchedly inadequate.

Security professionals frequently compare the sending of Internet mail to a postcard sent through the postal service; just as others can see the contents of the postcard you got from Aunt Carol, so too can network administrators read or even change the contents of your e-mail messages.

Privacy Enhanced Mail (PEM) was the first attempt by the Internet Engineering Task Force at standardizing how encrypted mail is sent and received. But while hundreds of engineers created standards and demonstration software, the system was never widely deployed.

That's when Phil Zimmermann, a computer programmer in Boulder, Colo., decided to take matters into his own hands and create his own e-mail encryption system. Called Pretty Good Privacy (PGP), it was released on the Internet in 1991, just as the U.S. Senate was considering legislation that would have made it illegal for citizens to use strong cryptography to shield their personal communications from the prying eyes of employers, police and even oppressive governments. Zimmermann hoped his program would make cryptography so widely available that it could never be eliminated—even if it were temporarily outlawed.

Techniques for digitally signing and sealing electronic communications have existed for nearly two decades, yet their adoption has been wretchedly inadequate.
PGP quickly gained traction among academics, Civil Libertarians and even computer security professionals. The program was fairly hard to use, but it was the best thing going—a single system that provided for signing and sealing messages, as well as for managing encryption keys. Minutes after downloading a copy of PGP, for example, a human rights worker in Honduras could send an encrypted report of political repression to Amnesty International's office in New York with a code that was effectively unbreakable.

But the problem with PGP went far beyond the program's clunky user interface. Exporting the program from behind U.S. borders was a felony violation of U.S. export controls, punishable by a $10,000 fine and 10 years in jail. Inside the United States, use or distribution of the program violated civil law, since the public-key encryption technology on which PGP relied was patented by RSA Data Security (now just RSA Security). As the 1990s proceeded, RSA crossed both legal and political swords with Zimmermann and his PGP program. Most companies were afraid to touch it.

RSA was best known as a purveyor of encryption toolkits—its software was at the basis of the SSL encryption built into Netscape's first Web browser and used a system called S/MIME. Unlike PGP, S/MIME was designed for use worldwide. Messages sent within the United States were sealed with unbreakable 128-bit encryption. But when used internationally, it downshifted to the exportable 40-bit encryption that could be cracked by the U.S. intelligence services. This combination of a strong supporting company and worldwide legitimacy all but assured S/MIME's success.

Today, S/MIME has emerged as the standard of choice for e-mail encryption. Support for S/MIME is built directly into Microsoft's Outlook and Outlook Express programs, Lotus Notes, and Apple's Mail applications. Plug-ins from Entrust and others bring S/MIME support to most other systems on the market as well.

With most S/MIME-enabled mail clients, you can simply click a button labeled "sign" and the message will be signed with the certificate in your private key. Click "encrypt" and the message is automatically encrypted with the public key of the recipient. What could be easier?

But despite the apparent simplicity of today's S/MIME implementations, most e-mail is not encrypted. In fact, brokerage companies won't even consider using it for sending out monthly statements; instead, they send out an unencrypted message to their customers with a link that takes the customer to a "secure" website, which asks for a user name and password, and then downloads the statement with encryption using SSL.

Why has encryption caught on for websites but generally failed when it comes to e-mail? One theory is that people just don't need to secure e-mail—if they did, they'd use it. Given the millions of dollars that financial and health-care institutions have spent to develop secure Webmail, that explanation just doesn't make sense. Most companies would much rather send out statements by e-mail if regulatory bodies would let them. They can't because their customers' systems aren't set up to receive encrypted mail.

It's not that the customers don't have the necessary software; programs that support e-mail encryption are now ubiquitous. What customers are missing is personal certificates.

With any encryption system based on the RSA encryption algorithm, before you can send somebody an encrypted message, you need to have that person's public key. The problem with S/MIME is that creating your own key is not enough—you also need to have it digitally signed by a so-called certification authority that can assert that your public key actually belongs to you.

Many of the original S/MIME proponents thought it was far worse to use encrypted mail with uncertified keys than to use no encryption at all. With an uncertified key, you might be tricked into sending confidential information to the wrong person; without encryption you would know better than to send it in the first place. Remember that the original incentive for encrypted mail was to secure military secrets from the eyes of repressive governments.

Sadly, this emphasis had the effect of creating a system that is harder to use for everybody else. But even organizations that have deployed personal certificates as part of a broad PKI initiative have run into problems with S/MIME.

With an uncertified key, you might be tricked into sending confidential information to the wrong person, whereas without encryption you would know better than to send the information in the first place.
The U.S. Department of Defense is creating one of the largest PKI deployments on the planet. When it's done, every member of the armed services will have a common access card containing three certificates: one for single sign-on, one for writing digital signatures, and one for decrypting incoming mail. But this intensive use of S/MIME has revealed another problem with today's secure e-mail implementations. Programs such as Outlook and Ximian's Evolution decrypt messages only when they're displayed; the actual mail itself is left encrypted on the computer's hard disk. You'd think that keeping the messages encrypted with the original key would increase security, but it actually has the reverse effect. Keeping the messages encrypted means that the private key needed to decrypt these messages can never be thrown away. That's a requirement that's in direct conflict with policies that require creating new keys on a regular basis and expiring old ones.

A better solution would be to have the e-mail automatically decrypted when it is received and then re-encrypted with a second key. As an added benefit, this re-encryption could be performed for every e-mail message, both those that had been sent with encryption and those that had been sent without. You can automatically re-encrypt your unencrypted mail by keeping your message store on an encrypted file system such as Windows EFS or Macintosh FileVault. But the solution isn't perfect, since messages received with S/MIME encryption are still kept encrypted with the original key.

Two companies have created secure messaging appliances that take a different approach to solving the usability problem. These appliances are effectively super-trusted third parties that automatically create a key whenever you try to send an e-mail message to somebody who is not in the system. PGP Corp.'s PGP Universal does this with both S/MIME and OpenPGP formats, while Voltage Security uses a new encryption algorithm called Identity-Based Encryption.

I believe that encrypted e-mail will become ubiquitous once these basic usability problems have been worked out, just as "secure" websites are now commonplace. What's needed is making the sending of sealed electronic mail as easy as sending an electronic postcard.end


Simson Garfinkel, CISSP, is a technology writer based in the Boston area. He is also CTO of Sandstorm Enterprises, an information warfare software company. He can be reached at machineshop@cxo.com.

Toolbox:
Defensive Investments
Scott Greiper says eight out of every 10 security purchases in 2004 will be access control products.
Read More






Most Recent Responses:

Check out Brad Templeton's essay http://www.templetons.com/brad/crypt.html for a description of the level of usability we need to aim for in order for encryption to be used, if not the technical details involved in getting it to work. Any "cognitive excise" will stop encryption from being used. If it involves button clicks then it will ignored. The users will click send without a second though.

Ray Ozzie has understood this -- Groove uses invisible encryption. It's always there and you don't have to do anything to make it work.

Christian Mogensen
Product Developer
SuperOffice ASA
Email
Print

Simson, Your article addresses a key concern that has gone unaddressed by the commercial and government agencies, with the exception of miltary, for too long. My view as to why users don't demand secure email because many are unaware of the vulnerabilities and exploaits associated with email. The contents of email are quite vulnerable to spyware and a long list of proven "sniffing" tools. Unlike hackers who transmit viruses and those who send SPAM, hackers who are motivated to capture emails for identity theft or for sensitive corprate data, they want to go unnoticed. So, users continue to trust email at the same level as SSL-enabled websites. This is apparent by the vast amounts of confidential information that travels relatively unprotected. While PKI is no walk in the park, the benefits go well beyond just secure email. Legally binding, digital documents signed with digital signatures are the next wave for eBusiness proficiency. PKI is more hindered by the business process of defining trust for business partners and customers than it is by the deployment of the digital certificates-albeit non-trivial. Additionally, legislation such HIPAA and SB-1386 make it more difficult to continue to push back on encrypting sensitive information over public networks.

Glen Day
Chief Privacy Officer
Los Angeles County
Email
Print

Where did the information that supports S/MIME emerging as the standard of choice come from?

"Keeping the messages encrypted means that the private key needed to decrypt these messages can never be thrown away. That's a requirement that's in direct conflict with policies that require creating new keys on a regular basis and expiring old ones."

This is not a bad thing. There are many publications on key management why this is good and re-encryption is a bad idea.

R. Duncan
Security Engineer, IDS
Print

On an enterprise level, we've found Tovaris'Email Security System to be easy to use for both the sender and the recipient and works with all other Certificate Authorities whether personal or enterprise levels. Those who do not have S/MIME capabilites are able to retrieve their secure message with a standard 128-bit encrypted SSL connection. International users may find a problem, though, due to 40-bit vs. 128-bit internet browsers.

Michael Anderson
IT Specialist
AHCCCS
Email
Print

Add a Comment: Your comment will be displayed at the bottom of this page, at the discretion of CSOonline.

Name:
Title:
Corp:
Email:
Subject *
Your Comment: *

* Required fields.
We do not post comments promoting products or services.
Comments are owned by whomever posted them. CSO is not responsible for what they say.
Selected comments may be published in CSO magazine.
We will neither sell nor display your personal information.







All content copyright CXO Media Inc., 1994-2002. All rights are reserved. No material may be reproduced electronically or in print without written permission from CXO Media, 492 Old Connecticut Path, Framingham, MA 01701.

Dated: April 2004


http://www.csoonline.com/read/040104/shop.html