534
Chapter 12
■
Secure Communications and Network Attacks
Opportunistic TLS
for SMTP Gateways (RFC 3207)
A lot of organizations are using
Secure SMTP over TLS nowadays; however, it’s not as widespread as it should be because
of a lack of awareness. Opportunistic TLS for SMTP will attempt to set up an encrypted
connection with every other email server in the event that it is supported. Otherwise, it will
downgrade to plaintext. Using opportunistic TLS for SMTP gateways reduces the opportu-
nities for casual sniffing of email.
Sender Policy Framework (SPF)
To protect against spam and email spoofing, an organi-
zation can also configure their SMTP servers for Sender Policy Framework. SPF operates by
checking that inbound messages originate from a host authorized to send messages by the
owners of the SMTP origin domain. For example, if I receive a message from
mark.nugget@
abccorps.com
, then SPF checks with the administrators of
smtp.abccorps.com
that
mark.nugget
is authorized to send messages through their system before the inbound
message is accepted and sent into a recipient inbox. There are pros and cons of using it, so
you’ll need to balance the needs of this extensive service prior to including SPF.
Free PGP Solution
PGP started off as a free product for all to use, but it has since splintered into various
divergent products. PGP is a commercial product, while OpenPGP is a developing
standard that GnuPG is compliant with and that was independently developed by the
Free Software Foundation. If you have not used PGP before, we recommend downloading
the appropriate GnuPG version for your preferred email platform. This secure solution
is sure to improve your email privacy and integrity. You can learn more about GnuPG at
http://gnupg.org
. You can learn more about PGP by visiting its pages on Wikipedia.
By using these and other security mechanisms for email and communication transmis-
sions, you can reduce or eliminate many of the security vulnerabilities of email. Digital
signatures can help eliminate impersonation. The encryption of messages reduces eaves-
dropping. And the use of email filters keep spamming and mail-bombing to a minimum.
Blocking attachments at the email gateway system on your network can ease the threats
from malicious attachments. You can have a 100 percent no-attachments policy or block
only attachments that are known or suspected to be malicious, such as attachments with
extensions that are used for executable and scripting files. If attachments are an essential
part of your email communications, you’ll need to train your users and use antivirus tools
for protection. Training users to avoid contact with suspicious or unexpected attachments
greatly reduces the risk of malicious code transference via email. Antivirus software is
generally effective against known viruses, but it offers little protection against new or
unknown viruses.
Unwanted emails can be a hassle, a security risk, and a drain on resources. Whether
spam, malicious email, or just bulk advertising, there are several ways to reduce the impact