S/MIME

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public-key encryption and signing of MIME data. S/MIME is on an IETF standards track and defined in a number of documents, most importantly RFC 8551. It was originally developed by RSA Data Security, and the original specification used the IETF MIME specification[1] with the de facto industry standard PKCS #7 secure message format. Change control to S/MIME has since been vested in the IETF, and the specification is now layered on Cryptographic Message Syntax (CMS), an IETF specification that is identical in most respects with PKCS #7. S/MIME functionality is built into the majority of modern email software and interoperates between them. Since it is built on CMS, MIME can also hold an advanced digital signature.

Function

S/MIME provides the following cryptographic security services for electronic messaging applications:

S/MIME specifies the MIME type application/pkcs7-mime[2] (smime-type "enveloped-data") for data enveloping (encrypting) where the whole (prepared) MIME entity to be enveloped is encrypted and packed into an object which subsequently is inserted into an application/pkcs7-mime MIME entity.

S/MIME certificates

Before S/MIME can be used in any of the above applications, one must obtain and install an individual key/certificate either from one's in-house certificate authority (CA) or from a public CA. The accepted best practice is to use separate private keys (and associated certificates) for signature and for encryption, as this permits escrow of the encryption key without compromise to the non-repudiation property of the signature key. Encryption requires having the destination party's certificate on store (which is typically automatic upon receiving a message from the party with a valid signing certificate). While it is technically possible to send a message encrypted (using the destination party certificate) without having one's own certificate to digitally sign, in practice, the S/MIME clients will require the user to install their own certificate before they allow encrypting to others. This is necessary so the message can be encrypted for both, recipient and sender, and a copy of the message can be kept (in the sent folder) and be readable for the sender.

A typical basic ("class 1") personal certificate verifies the owner's "identity" only insofar as it declares that the sender is the owner of the "From:" email address in the sense that the sender can receive email sent to that address, and so merely proves that an email received really did come from the "From:" address given. It does not verify the person's name or business name. If a sender wishes to enable email recipients to verify the sender's identity in the sense that a received certificate name carries the sender's name or an organization's name, the sender needs to obtain a certificate ("class 2") from a CA, who carries out a more in-depth identity verification process, and this involves making inquiries about the would-be certificate holder. For more detail on authentication, see digital signature.

Depending on the policy of the CA, the certificate and all its contents may be posted publicly for reference and verification. This makes the name and email address available for all to see and possibly search for. Other CAs only post serial numbers and revocation status, which does not include any of the personal information. The latter, at a minimum, is mandatory to uphold the integrity of the public key infrastructure.

S/MIME Working Group of CA/Browser Forum

In 2020, the S/MIME Certificate Working Group[3] of the CA/Browser Forum was chartered to create a baseline requirement applicable to CAs that issue S/MIME certificates used to sign, verify, encrypt, and decrypt email. That effort is intended to create standards including:

  • Certificate profiles for S/MIME certificates and CAs that issue them
  • Verification of control over email addresses
  • Identity validation
  • Key management, certificate lifecycle, CA operational practices, etc.

Version 1 of the Baseline Requirements for the Issuance and Management of Publicly‐Trusted S/MIME Certificates was published on January 1, 2023 by the CA/Browser Forum. It defined four types of S/MIME certificate standards. Mailbox‐validated, Organization‐validated, Sponsor‐validated and Individual‐validated.[4]

Obstacles to deploying S/MIME in practice

  • S/MIME is sometimes considered not properly suited for use via webmail clients. Though support can be hacked into a browser, some security practices require the private key to be kept accessible to the user but inaccessible from the webmail server, complicating the key advantage of webmail: providing ubiquitous accessibility. This issue is not fully specific to S/MIME: other secure methods of signing webmail may also require a browser to execute code to produce the signature; exceptions are PGP Desktop and versions of GnuPG, which will grab the data out of the webmail, sign it by means of a clipboard, and put the signed data back into the webmail page. Seen from the view of security this is a more secure solution.
  • S/MIME is tailored for end-to-end security. Logically it is not possible to have a third party inspecting email for malware and also have secure end-to-end communications. Encryption will not only encrypt the messages, but also the malware. Thus if mail is not scanned for malware anywhere but at the end points, such as a company's gateway, encryption will defeat the detector and successfully deliver the malware. The only solution to this is to perform malware scanning on end user stations after decryption. Other solutions do not provide end-to-end trust as they require keys to be shared by a third party for the purpose of detecting malware. Examples of this type of compromise are:
    • Solutions which store private keys on the gateway server so decryption can occur prior to the gateway malware scan. These unencrypted messages are then delivered to end users.
    • Solutions which store private keys on malware scanners so that it can inspect messages content, the encrypted message is then relayed to its destination.
  • Due to the requirement of a certificate for implementation, not all users can take advantage of S/MIME, as some may wish to encrypt a message without the involvement or administrative overhead of certificates, for example by encrypting the message with a public/private key pair instead.

Any message that an S/MIME email client stores encrypted cannot be decrypted if the applicable key pair's private key is unavailable or otherwise unusable (e.g., the certificate has been deleted or lost or the private key's password has been forgotten). However, an expired, revoked, or untrusted certificate will remain usable for cryptographic purposes. Indexing of encrypted messages' clear text may not be possible with all email clients. Neither of these potential dilemmas is specific to S/MIME but rather cipher text in general and do not apply to S/MIME messages that are only signed and not encrypted.

S/MIME signatures are usually "detached signatures": the signature information is separate from the text being signed. The MIME type for this is multipart/signed with the second part having a MIME subtype of application/(x-)pkcs7-signature. Mailing list software is notorious for changing the textual part of a message and thereby invalidating the signature; however, this problem is not specific to S/MIME, and a digital signature only reveals that the signed content has been changed.

Security issues

On May 13, 2018, the Electronic Frontier Foundation (EFF) announced critical vulnerabilities in S/MIME, together with an obsolete form of PGP that is still used, in many email clients.[5] Dubbed EFAIL, the bug required significant coordinated effort by many email client vendors to fix.[6] Mitigations for both Efail vulnerabilities have since been addressed in the security considerations section of RFC 8551.

See also

References

  1. ^ RFC 2045: Multipurpose Internet Mail Extensions (MIME). Part One was published in November 1996.
  2. ^ Balladelli, Micky; Clercq, Jan De (2001). Mission-critical Active Directory: Architecting a Secure and Scalable Infrastructure for Windows 2000. Digital Press. p. 550. ISBN 9781555582401. S/MIME adds new MIME content types that provide data confidentiality, integrity protection, nonrepudiation, and authentication services: application/pkcs7-mime, multipart/signed, and application/pkcs7-signature
  3. ^ CA/Browser Forum S/MIME Certificate Working Group https://cabforum.org/working-groups/smime-certificate-wg/
  4. ^ "CA/Browser Forum S/MIME Baseline Requirements" (PDF). CA/Browser Forum. Retrieved Apr 4, 2023.
  5. ^ Gebhart, Danny O'Brien and Gennie (2018-05-13). "Attention PGP Users: New Vulnerabilities Require You To Take Action Now". Electronic Frontier Foundation. Retrieved 2018-05-29.
  6. ^ Hansen, Robert (2018-05-20). "Efail: A Postmortem". Robert Hansen. Retrieved 2018-05-30.

Read other articles:

  提示:此条目页的主题不是中國—瑞士關係。   關於中華民國與「瑞」字國家的外交關係,詳見中瑞關係 (消歧義)。 中華民國—瑞士關係 中華民國 瑞士 代表機構駐瑞士台北文化經濟代表團瑞士商務辦事處代表代表 黃偉峰 大使[註 1][4]處長 陶方婭[5]Mrs. Claudia Fontana Tobiassen 中華民國—瑞士關係(德語:Schweizerische–republik china Beziehungen、法語:…

此條目需要补充更多来源。 (2021年7月4日)请协助補充多方面可靠来源以改善这篇条目,无法查证的内容可能會因為异议提出而被移除。致使用者:请搜索一下条目的标题(来源搜索:美国众议院 — 网页、新闻、书籍、学术、图像),以检查网络上是否存在该主题的更多可靠来源(判定指引)。 美國眾議院 United States House of Representatives第118届美国国会众议院徽章 众议院旗帜…

Israeli filmmaker and lecturer in film studies Dan WolmanDan Wolman, 2008Born (1941-10-28) 28 October 1941 (age 82)JerusalemOccupationFilm director Dan Wolman (born October 28, 1941) is an Israeli filmmaker and lecturer in film studies. Biography Dan Wolman was born in Jerusalem, in what was then the British Mandate of Palestine. His father was Moshe Wolman, a pioneering physician. He spent part of his childhood in Ethiopia.Wolman studied film at the Film Institute of City College New York …

 烏克蘭總理Прем'єр-міністр України烏克蘭國徽現任杰尼斯·什米加尔自2020年3月4日任命者烏克蘭總統任期總統任命首任維托爾德·福金设立1991年11月后继职位無网站www.kmu.gov.ua/control/en/(英文) 乌克兰 乌克兰政府与政治系列条目 宪法 政府 总统 弗拉基米尔·泽连斯基 總統辦公室 国家安全与国防事务委员会 总统代表(英语:Representatives of the President of Ukraine) 总理…

Serbian singer-songwriter (born 1992) Mirna RadulovićMirna Radulovic at Eurovision Song Contest 2013 with Moje 3Background informationBirth nameMirna RadulovićBorn (1992-07-05) 5 July 1992 (age 31)Subotica, FR YugoslaviaGenresPop, dance-pop, R&BOccupation(s)Singer-songwriterInstrument(s)Vocals, violin, piano, guitar[1]Years active2012–presentLabelsPrva Records, PGP RTSMusical artist Mirna Radulović (Serbian Cyrillic: Мирна Радуловић) is a Serbian singer and so…

Leaders of Santhal rebellion (1855–1856) Sido Kanhu Memorial Park in Ranchi Sido Murmu and Kanhu Murmu were the leaders of the Santhal rebellion (1855–1856), the rebellion in present-day Jharkhand and Bengal (Purulia, Birbhum and Bankura)[citation needed] in eastern India against both the British colonial authority and the corrupt zamindari system.[1] Rebellion Main article: Santhal rebellion Santals lived in and depended on forests. In 1832, the British demarcated the Damin-…

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (أبريل 2021) إعلان الولايات المتحدة الحرب على إيطاليا شعار الولايات المتحدة الأمريكيةشعار الولايات المتحدة الأمريكية العنوان الطويل القرار المشترك الذي يعلن وجود حالة ح…

2009 video game 2009 video gameHearts of Iron IIIDeveloper(s)Paradox Development StudioPublisher(s)Paradox InteractiveProducer(s)Johan AnderssonDesigner(s)Johan AnderssonChristopher KingProgrammer(s)Thomas JohanssonArtist(s)Jonas JakobssonFredrik TollComposer(s)Andreas WaldetoftSeriesHearts of IronEngineClausewitz EnginePlatform(s)Microsoft Windows, OS XReleaseMicrosoft WindowsNA: August 7, 2009[1]UK: August 14, 2009AU: September 24, 2009OS XWW: December 7, 2009Genre(s)Grand strategyMode…

 本表是動態列表,或許永遠不會完結。歡迎您參考可靠來源來查漏補缺。 潛伏於中華民國國軍中的中共間諜列表收錄根據公開資料來源,曾潛伏於中華民國國軍、被中國共產黨聲稱或承認,或者遭中華民國政府調查審判,為中華人民共和國和中國人民解放軍進行間諜行為的人物。以下列表以現今可查知時間為準,正確的間諜活動或洩漏機密時間可能早於或晚於以下所歸類…

习近平 习近平自2012年出任中共中央总书记成为最高领导人期间,因其废除国家主席任期限制、开启总书记第三任期、集权统治、公共政策与理念、知识水平和自述经历等争议,被中国大陸及其他地区的民众以其争议事件、个人特征及姓名谐音创作负面称呼,用以恶搞、讽刺或批评习近平。对习近平的相关负面称呼在互联网上已经形成了一种活跃、独特的辱包亚文化。 权力類 …

伊斯兰合作组织Organisation of Islamic Cooperation(英語)Organisation de la Coopération Islamique(法語)منظمة التعاون الإسلامي(阿拉伯語) 旗帜格言:To safeguard the interests and ensure the progress and well-being of Muslims  成员国  观察国  暂停会籍行政总部 沙地阿拉伯吉达 官方语言阿拉伯语英语法语类型宗教成员国57个在籍成员国(英语:Member states of the Organisation of …

Larva of a butterfly or moth For other uses, see Caterpillar (disambiguation). Euthalia aconthea (baron butterfly) caterpillar found in India Caterpillar of Papilio machaon A monarch butterfly (Danaus plexippus) caterpillar feeding on an unopened seed pod of swamp milkweed Caterpillars (/ˈkætərpɪlər/ KAT-ər-pil-ər) are the larval stage of members of the order Lepidoptera (the insect order comprising butterflies and moths). As with most common names, the application of the word is arbitrar…

Anatolian beylik The Beylik of Menteshe (blue) in 1300 Part of a series on the History of Turkey PrehistoryPrehistory of Anatolia Palaeolithic Anatolia c. 500,000– 10,000 BC Mesolithic Anatolia c. 11,000– 9,000 BC Neolithic Anatolia c. 8,000– 5,500 BC Bronze AgeTroy 3000–700 BCHattians 2500–2000 BCAkkadian Empire 2400–2150 BCLuwians 2300–1400 BCAssyria 1950–1750 BCKussara 1780–1680 BCAchaeans (Homer) 1700–1300 BCKizzuwatna 1650–1450 BCHittites 1680–1220 BCA…

Architectural feature of mosques For other uses, see Minaret (disambiguation). Minaret at the Umayyad Mosque in Damascus A minaret (/ˌmɪnəˈrɛt, ˈmɪnəˌrɛt/;[1] Arabic: منارة, romanized: manāra, or Arabic: مِئْذَنة, romanized: miʾḏana; Turkish: minare; Persian: گل‌دسته, romanized: goldaste) is a type of tower typically built into or adjacent to mosques. Minarets are generally used to project the Muslim call to prayer (adhan) from a muezzin,…

American women's magazine Good HousekeepingJanuary 2015 cover featuring Julie WaltersEditor-in-chiefJane FranciscoCategoriesLifestyle and product reviewsFrequencyBi-monthlyPublisherHearst MagazinesTotal circulation(2020)4,014,028[1]First issueMay 2, 1885; 139 years ago (1885-05-02)CountryUnited StatesBased inNew York CityLanguageEnglishWebsitewww.goodhousekeeping.comISSN0017-209X Good Housekeeping is an American and British lifestyle media brand that covers a wide range…

2014 television miniseries This article is about the 2014 TV series. For the 1960 TV series, see Klondike (TV series). KlondikeGenreHistorical dramaBased onGold Diggers: Striking It Rich in the Klondikeby Charlotte GrayScreenplay byPaul ScheuringJosh GoldinRachel AbramowitzDirected bySimon Cellan JonesStarringAbbie CornishMarton CsokasIan HartGreg LawsonConor LeslieRichard MaddenTim Blake NelsonAugustus PrewJohnny SimmonsTim RothSam ShepardTheme music composerAdrian JohnstonCountry of originUnit…

Untuk kegunaan lain, lihat Dunia bawah (disambiguasi). Yggdrasil, suatu upaya modern untuk merekonstruksi pohon dunia Nordik yang menghubungkan langit, dunia, dan dunia bawah. Kedua kaki Dewa Wisnu sebagai Manusia Kosmis yang menggambarkan bumi dan tujuh alam dari Patala, dunia bawah Hindu. Kedua kakinya bersandar pada ular kosmis Shesha. Dunia bawah (bahasa Inggris: underworld, netherworld) adalah suatu dunia lain yang dianggap berada jauh di kedalaman atau di bawah permukaan dunia ini dala…

1948 Maine gubernatorial election ← 1946 September 13, 1948 1950 →   Nominee Frederick G. Payne Louis B. Lausier Party Republican Democratic Popular vote 145,956 76,544 Percentage 65.60% 34.40% County resultsPayne:      60–70%      70–80%      80–90% Lausier:      50–60% Governor before election Horace A. Hildreth Republican Elected Governor Frederick G. Pay…

Species of true bug Macrosiphum euphorbiae Winged and wingless potato aphids and cast skins Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Arthropoda Class: Insecta Order: Hemiptera Suborder: Sternorrhyncha Family: Aphididae Genus: Macrosiphum Species: M. euphorbiae Binomial name Macrosiphum euphorbiae(Thomas, 1878) Synonyms[1] Illinoia solanifolii Macrosiphon solanifolii Ashmead Macrosiphum amygdaloides Macrosiphum cyprissiae var. cucurbitae del Guercio Macro…

Championnats du monde d'athlétisme 2017 Logo des Championnats du monde d'athlétisme 2017.Généralités Sport Athlétisme Organisateur(s) IAAF, UKA Édition 16e Lieu(x) Londres, Royaume-Uni Date 4 au 13 août 2017 Nations 205 Participants 2 038 athlètes (1 080 hommes et 958 femmes) Épreuves 48 (24 masc. et 24 femin.) Site(s) Stade olympique de Londres Palmarès Meilleure nation États-Unis (30 m.) Records 1 record du monde Navigation 1983 • 1987 • 1991 • 1993 …