On 03/25/2016 01:28 PM, Matthias Henze wrote:
> Hi,
> 
> I had several discussions with other vendors of mail encryption gateways
> and all told me that I'm wrong. But today Ciphermail did some thing I've
> predicted and proved that I was right.
> 
> This is what I think, please correct me if I'm wrong:
> 
> For me s/Mime (like PGP) is a encryption system based on public and
> private keys. If some one has access to the public key he can encrypt
> some thing which only can be decrypted with the private key. So, when
> some one sends an s/Mime signed mail to me I should be able to send a
> encrypted mail to him even if I do not have a s/Mime certificate for my
> e-mail address on my system.
> 
> Exactly this happened on my site with Ciphermail. I have a s/Mime
> certificate for my e-mail addresses imported in Ciphermail and some one
> else sent a signed mail to me. With this mail Ciphermail stored the
> public key of the third party. When I mail to him Ciphermail does what I
> would expect and encrypts the mails. Yesterday a other mail user of my
> site which has no certificate in Ciphermail received a mail from exact
> the same person and replied. The reply got encrypted by Chiphermail
> despite the sender has no certificate imported to Chiphermail. This was
> what I would expect to happen.
> 
> Bravo Ciphermail! :-) And thank you Ciphermail! You proved me right!
> 
> I had a discussion with the support of an other encryption gateway and
> asked them, why mail sent to me from the other site got not encrypted
> despite the system recorded my signature with my public key. They told
> me that the mail do not get encrypted because the *sender* does not have
> a certificate imported to their system and that it is impossible to send
> s/Mime encrypted mails without a certificate for the *sender*.
> 
> And now Cipher mail did exactly that.
> 
> Please tell me: Is this a misbehavior of Ciphermail and does it not
> conform to the standard? I don't think so.

This is basically how S/MIME works. If someone sends an S/MIME digitally
signed message typically the certificate of the sender (and intermediate
certificate) are included with the signed message. The gateway will
extract the certificate(s) from the digitally signed mail and store the
certificate into the certificates store. If you then reply to the
message, there will be a certificate available for the recipient. The
fact that there is a certificate does not imply that the gateway will
always automatically use the certificate. The certificate will only be
used if the certificate is trusted. Basically this means that the
certificate has to be issued by an issuing chain for which your gateway
trusts the root certificate, the certificate should not be expired, not
revoked, valid for S/MIME, the email address should match and some other
checks. The certificate will be used for encryption if all the checks
indicate no failure.

To make this process smooth, it's therefore required that you add the
roots which you and your communication partners trust. In principle more
roots means a bigger chance that the certificate will be trusted.
However, adding too many roots make it also more likely that you add a
root which might not be trustworthy. For example do you need to add the
root of the Mexican Notaries? Perhaps yes if you do business in Mexico,
but no if you only do business in Germany.

S/MIME trust level is a hierarchical trust based system. You trust the
issuing CAs to validate any certificate. As long as the chain is
trustworthy the system is relatively easy to use. With PGP things work a
bit different. With PGP trust is not inferred using a top-down
hierarchy. PGP supports a web-of-trust trust model. This is however
really difficult to manage unless you really know what you are doing. In
most cases, users just fall back to a single trust model, i.e., I trust
this key or I do not trust this key. PGP is therefore not as smooth as
S/MIME in most cases because you need to explicitly trust the key.

Kind regards,

Martijn Brinkers


> I think that when I use a MUA to send encrypted mail it is very
> important to have a certificate installed in the MUA because this is the
> only way to encrypt the mail to the recipient AND to myself so I'm also
> able to read what I've sent. But when a gateway doe the work it is not
> mandatory that the sender has a certificate to send an encrypted mail.



-- 
CipherMail email encryption

Email encryption with support for S/MIME, OpenPGP, PDF encryption and
secure webmail pull.

https://www.ciphermail.com

Twitter: http://twitter.com/CipherMail
_______________________________________________
Users mailing list
[email protected]
https://lists.djigzo.com/lists/listinfo/users

Reply via email to