Why we need pc-to-pc email encryption
- email transfers across the internet from one domain to another
- traditional vs modern way
- picture on page 79 and beyond
o This is the traditional way that email was invented – this connection is unencrypted and because gmail connects to a bunch of email servers everyday – if you are to authenticate then every mail server needs to know the username and password for every other mail server in the world – the encrypt and decryption can only happen if the key is on the same system, meaning every mail server in the world would need the keys of every other server in the world
o Today, many organizations implement a newer version of SMTP that offers password authentication and SSL/TLS-based encryption
o Likewise, when POP3 protocol first came out, there was no encryption. The protocol required password authentication, but the username and password passed across the wire in plaintext. Again, today, there are new versions of both POP3 that encrypt the data, including the password, using SSL/TLS encryption
o Note: in some instances you may find an authenticated and encrypted server-to-server communication, which is new but partner companies can exchange cryptographic certificates and set their servers up to authenticate and encrypt to each other – but even with that in place, the securky only happens between those two servers – more and more we are seeing opportunistic TLS encryption is used in the server-to-server communication – notice that the email would be in plaintext while on those servers, which is why it doesn’t solve the problem (the key point – when you don’t encrypt from alice to sans mail server it is still within your company, but when you send it to giac mail server, your data is on a public domain so you cannot protect patent and proprietary information unless you do end-to-end encryption – encrypting on the source computer and never decrypting until the destination computer, and if you do it that way, whether other steps in the connection are encrypted doesn’t even matter)
Secure multipurpose internet mail extensions (S/MIME)
Email encryption: PGP/GPG
Remote access and file transfer: Secure Shell (SSH)
Secure transfer of data: SSL and TLS
Secure web: HTTPS
IPsec and virtual private networks (VPNs)
- the authentication header
- the encapsulating security payload
VPN ESP modes:
- transport mode
- tunnel mode
- how do we route the packet
- rules to determine if we should use transport or tunnel mode
VPN scenario #1: site-to-site tunnel mode
- picture on page 86
VPN scenario #2 client-to-site tunnel mode
- a split tunnel
- a non split tunnel
- a split tunnel becomes a malware funnel
VPN scenarion #3: public VPN providers
- picture on page 87