Network Security: Lab#4-1 E-mail Security J. H. Wang Dec. 3, 2013.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 10 Securing Exchange Server 2003.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Management lifecycle summary Mobile Device Management with Windows Intune or 3 rd Party tools Simplified and flexible device enrollment, using.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security Jonathan Calazan December 12, 2005.
Guide to Operating System Security Chapter 10 Security.
DePaul Information Security
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
By: Surapheal Belay ITEC ABSTRACT According to NIST SP : “ Mail servers are often the most targeted and attacked servers on an organization’s.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
Principle, utilization and limitations for secure electronic mail systems FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO Segurança em Sistemas Informáticos.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Module 9: Fundamentals of Securing Network Communication.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
IMPLEMENTATION OF OUTLOOK EXPRESS
1 AHM -2-4 Sept 2003 e-Science Centre Running SRB Ananta Manandhar.
Security fundamentals Topic 9 Securing internet messaging.
Go to Start >> Programs >> Outlook Express ( as shown)
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
Network Security: Security. Objectives To learn to use security tools –PGP To learn the availability of security libraries –S/MIME.
Network Security: Lab#2 J. H. Wang Oct. 9, Objectives To learn to use message digests –MD5 To learn to use secure hash functions –SHA-1, SHA-2 To.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
July 19, Secure Messaging Models Co-existence and Interoperability Russell W. Chung New York, NY July 19, 2005.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
and File Security With GnuPG Matt Brodeur
` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary
Chapter 5a - Pretty Good Privacy (PGP)
Key management issues in PGP
upport number.outlook.
Internet Business Associate v2.0
Security is one of the most widely used and regarded network services
Unit 3 Section 6.4: Internet Security
GnuPG The GNU Privacy Guard
MICROSOFT OUTLOOK and Outlook service Provider
Installation & User Guide
Misc. Security Items.
CS 465 Secure Last Updated: Nov 30, 2017.
Security at the Application Layer: PGP and S/MIME
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Installation & User Guide
DIGITAL ENCRYPTION INSTRUCTIONS FOR MICROSOFT OUTLOOK 2007
Exercise 8: Securing Pretty Good Privacy
Presentation transcript:

Network Security: Lab#4-1 Security J. H. Wang Dec. 3, 2013

Objectives To learn to use security tools –PGP To learn the availability of security libraries –S/MIME –DKIM

Packages & Libraries in this Lab Packages –GPG4win: for Windows Libraries –OpenDKIM

Experiment Scenario Signing/verification of files using certificates –Create a new certificate –Encrypt/sign the file “original.txt” into another file “enc.txt” (using sender’s certificate) –Then, we decrypt/verify it and get another file “dec.txt” (using sender’s certificate), and check if the decrypted file is the same as the original file Sending/receiving s with certificates –Set up account –Read mails –Send mails

GnuPG Privacy Guard Homepage: Version: – (portable standalone version) – (enhanced version, harder to build) Platforms: Linux/FreeBSD/Windows/MacOS X An implementation of OpenPGP Installation steps –(skipped)

GPG4win Homepage: Latest version: OpenPGP: an open standard for security (RFC 4880) –S/MIME also included Installation steps: –Simply follow the instructions on screen

Other Tools Included in GPG4win Kleopatra: GnuPG certificate manager –New certificate –Encrypting/Signing a file –Decrypting/Verifying a file Claws Mail: a mail reader –Setting up your mail account –Reading mails –Sending mails

Microsoft Outlook Support in GPG4win PGP for Outlook –GpgOL 1.0 can support OpenPGP and S/MIME

Configuring Outlook for S/MIME Configure Your Personal Certificates Send a Signed Message Read a Signed Message Check the Credentials of a Signed Message Send an Encrypted Message Read an Encrypted Message Get Certificates for Other Users

OpenDKIM Homepage: –Latest version: opendkim –C library for DKIM service: libmilter –Also a milter-based filter application: opendkim Can plug in to any milter-based MTAs: Sendmail, PostFix An open source implementation for IETF DKIM standard (RFC 6376) based on dkim-milter from Sendmail –Library: libdkim –Milter: dkim-milter (plugins to sendmail) Also includes implementations of –ADSP (Author Domain Signing Practises): RFC 5617 –VBR (Vouch by Reference): RFC 5518

Configuration and Installation Compilation of opendkim –Download opendkim tar.gz – tar -xzvf opendkim tar.gz – cd opendkim –./configure – make – make install Configuration of opendkim –For signing and verification Install opendkim and configure your MTA

Summary security –PGP –S/MIME –DKIM