sels: a secure e-mail list service himanshu khurana, adam slagell, rafael bonilla ncsa, university...

11
SELS: A S ecure E -mail L ist S ervice Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Upload: rosemary-haynes

Post on 17-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

SELS: A Secure E-mail List Service

Himanshu Khurana, Adam Slagell, Rafael Bonilla

NCSA, University of Illinois

Page 2: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Introduction to E-mail List Services E-mail List Services (ELSs) comprise

List Moderator (LM) – user/process that creates lists and controls list membership

List Server (LS) – maintains list and membership information, forwards e-mails, and optionally archives them

User/subscribers – subscriber to/ unsubscribe from lists with the help of LM, and send/receive e-mails with the help of LS

Increasingly popular for exchange of both public and private content security is an important concern

E.g., there are over 300,000 registered lists on LISTSERV while approximately 16% of them serve public content

Little or no work in providing security solutions for ELSs

We provide solutions for confidentiality, integrity, authentication, and anti-spamming

Page 3: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Confidentiality, Integrity, and Authentication with S/MIME for TPEE

Header inPlaintext

Alice Bob

PKI: Bob’s encryption key PKBPKI: Alice’s signature verification key PKA

Base-64 encoded message

• Other approaches for achieving confidentiality, integrity and authentication• PEM• PGP• Identity-based encryption and Identity-based mediated RSA

• Just provides confidentiality• Challenge: certificate distribution and validation

Encrypt(m, Sig(m)) w/ k

AES, 3DES

Encrypt (k)w/ PKB

RSA, El Gamal

Plaintext mSign h(m) with SKA

(RSA, DSA)

Page 4: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Confidentiality, Integrity and Authentication for ELSs Confidentiality

Possible Solutions Use cryptographic hardware to do decryption/encryption

Expensive, broken in the past (e.g., CCA application on IBM 4758) Use group key management to distribute symmetric key to list members

Members need to be online to execute operations for key update Our solution

Use software-based proxy re-encryption at LS to transform encrypted e-mail between sender and receivers without requiring access to plaintext

Inexpensive, does not require members to be online for updates Integrate (encryption) key distribution with user subscription

Integrity and Authentication Authentication goal includes notion that member must be a list

subscriber Our approach: Use digital signatures with LM providing signature key

validation (w.r.t. list membership)

Problem: Adversary can compromise LS to obtain e-mails

S LS R2

R1

Rn

EncPKLS(m)

Dec,EncPKRi

(m)

DecSKRi(c)

Page 5: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Anti-Spamming Many approaches proposed for TPEE; e.g., legal

Spam is a felony in VA In CA, PA sexually explicit emails must have pre-fix: “ADV:

ADLT” Congress passed CAN SPAM act effective Jan 2004

Appropriate labeling, opt-out options Challenge: Tracing, enforcement, jurisdiction

Digital Signatures for TPEE Reject e-mail if signature does not match Challenges

Large scale certificate distribution/revocation/enrollment Block use of e-mail for initiating communication/transactions

Making mass-mailing infeasible Use economic or computational deterrence Challenges

Difficult to get the masses to pay for e-mail now Spam sent in distributed manner, computational barrier

impractical

Page 6: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Contribution: SELS; Solutions for Confidentiality

Solution using proxy encryption techniques whereby the plaintext is not exposed at LS; instead, LS simply transforms encrypted messages

LS archives e-mails in encrypted form and provides access on-demand

User subscription process used to create and distribute keys without the need for a trusted third party

Integrity and authentication Solution using digital signatures where signature key

validation is provided by LM

Anti-spamming Use digital signatures with LM providing key validation Use HMACs as a cheaper alternative with LS participating

actively

Page 7: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

SELS Overview

LM LS

U1 U2 U3

Subscribe

EstablishPrivate key KU1

HMAC Key HU1

Establish CorrespondingPrivate key K’U1,HMAC Key HU1

Send signed,encrypted,and HMACdemail

Verify HMAC,transform andforward

Verify HMAC,decrypt andverify signature

• Assumptions• LM is an independent entity not controlled by LS• Subscription e-mails between user, LM, and LS can be secured (e.g., PGP, passwords)

Create Group

EstablishList Key KLM

Establish CorrespondingList Key KLS

LM, LS implicitly agreeKLK = KLM + KLS is list key

Page 8: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Sending E-mails

Base-64 encoded

EmailPlaintext m

Encrypt (m,Sig(m)) w/ k

(AES, 3DES)

Encrypt (k) w/ PKA

(SELS/El Gamal)

Email HeaderSig(m) w/ SKA

(RSA, DSA)

H(X) w/ HA

(SHA-1)

X

Base-64 encoded

Transform k w/ K’A, K’B

(SELS ProxyRe-encryption)

Email Header EmailPlaintext m

Encrypt (m,Sig(m)) w/ k

(AES, 3DES)

Sig(m) w/ SKA

(RSA, DSA)

H(Y) w/ HB

(SHA-1)

Y

Key Store: Members’ corresponding private keys K’Ui

and HMAC Keys HUi

Alice LS

Key Store: (SKA, PKA),HA

Bob LS

Key Store: (SKB, PKB), HB

Page 9: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Additional Protocol Operations Unsubscribing Users

User sends request to LM who cosigns request and sends to LS

LS deletes user’s corresponding private key Revocation Immediate

Signature key validation LM sends occasional (e.g., monthly) updates on invalid keys

Archiving and retrieval Archive after partial transformation; encrypted with KLK Complete transformation for user on request Analysis

If users have access to all e-mails, compromise of one user leads to compromise of all e-mails

Solution: Use key epochs Archive e-mails only for an epoch LM changes KLK every epoch

Page 10: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Recent Work: Formal Verification and Implementation Formal Verification with Proverif

Fully automated protocol verification tool based on pi calculus

Verified that SELS provides confidentiality and anti-spamming

Implemented SELS Prototype in Java Integrated with Eudora E-mail Client via command-

line interface Integrated with GnuPG Toolkit for standard Signature

and Encryption operations

Work in Progress Plugin for JavaMail, Eudora Integration with Majordomo list server software

Page 11: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois

Summary Increasing use of ELS for exchanging private

content security is important

Security for ELSs is significantly different from that for two-party e-mail exchange

Provide solutions for confidentiality, integrity, authentication, and anti-spamming

E-mail plaintext not exposed at LS via proxy encryption

Formal Verification with Proverif

Implementation work ongoing