You can even use PGP (content encryption) and TLS to encrypt on network
layer at the same time.
Although,
if you encrypt the email content with PGP every receiver needs to have
your distributed key in order to decrypt the message. It is more secure
but not user friendly.
Assuming you want to use your ISP as a email relay you configure postfix
as a smarthost.
Using TLS is not recommended. TLS encryption is initialised during the
communication. The client (postfix) sends a command (starttls) and if
the server (ur ISP) doesn't support TLS the communication will be
continued unencrypted. That behaviour can be tweaked to enforce TLS
usage. Due to support issues most email providers do not enforce TLS on
the client side. That also means, if someone sits in the middle
(MITM-attack), intercepts the traffic and suppresses the starttls
command the email will be send unencrypted.
It is better to use SSL on port 465. Unfortunately, postfix doesn't
support SSL from scratch, you will need a little workaround via stunnel.
First you need to check if your email provider supports SSL:
telnet EMAIL-SERVER 465
Sample config for stunnel4, /etc/stunnel/stunnel.conf:
[ssmtp]
accept = 127.0.0.1:26
connect = ISP-MAIL-SERVER-SECURE-HOSTNAME:465
Furthermore, it is recommended to set-up a dedicated system user
(adduser stunnel4):
setuid = stunnel4
setgid = stunnel4
also to activate chroot:
chroot = /var/run/stunnel4/
Performance improvements:
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
And you need to determine your OSs certificate root path, with RHEL it
would be:
CApath = /etc/ssl/certs
Also use at least the root certificate verification:
verify = 2
(not 1, would have the same effect as TLS)
Then you open your postfix config file (/etc/postfix/main.cf) and change
your relay host to:
relayhost = 127.0.0.1:26
If you need to activate smtp auth you also need to add:
smtp_sasl_auth_enable = yes
smtp_sasl_security_options = noanonymous
smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
Do not mix that up with the lines starting with "smtpd_...". That is for
the postfix server part, not the client settings.
Then you need to create the login password map, nano
/etc/postfix/sasl_passwd:
127.0.0.1 username:password
Then rehash the auth file:
postmap /etc/postfix/sasl_passwd
Voila! The advantage is:
If someone sits in the middle and tries to fake the SSL certificate,
sends back the faked certificate to the client and again he could
intercept the traffic (because its the attackers certificate and he can
decrypt), it would fail. Stunnel would drop the communication
immediately because stunnel verifies the certificate before letting pass
any traffic. It is not likely that the attacker is able to get a signed
certificate matching your providers hostname. Depending on your email
provider's SSL certificate provider you might need to import the
according root certificate in order to let the system know that the
certificate is valid. (look in the log file if you see funny certificate
validation errors)
If you have control to both sites you could also create your own
certificate and use verify=3 in the stunnel config file (plus the
cert/key options). Then, only the server or person who possess this very
certificate would be able to intercept the traffic. But you wouldn't
send the certificate around and keep it somewhere safe.
Best regards,
Rocco
On 21/01/2010 22:32, sanga collins wrote:
I just finished setting up a zimbra email server for a new client.
They are in the health care industry so there are tons regulations and
rules to follow related to keeping patient information secure. Id like
to here what some of the other Lug are using for encrypting their
emails sent out from their servers and get a general idea of what is
out there in the open source world that i should look into using.
--
Sanga M. Collins
Network Engineering
~~~~~~~~~~~~~~~~~~~~~~~
Google Voice: (954) 324-1365
E- fax: (435) 578 7411
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
The above comments and data are owned by whoever posted them (including
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
The above comments and data are owned by whoever posted them (including
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------