Patterns are based on scientific sources.
Name | Send S/MIME-Signed Email |
Sources | (Garfinkel, 2005) |
Synonyms | None |
Context | S/MIME signatures provide sender authentication which can be useful protection against spam and “phishing” attacks. Today’s most widely used mail clients support S/MIME signatures; programs that do not support S/MIME do not have significant usability problems when they receive signed mail. |
Problem | How to authenticate email senders? |
Solution | Send email signed with S/MIME signatures to increase confidence in email, allow recipients to detect mail with forged From: headers, increase familiarity with secure email through causal exposure and the resulting “passive learning”, and give web-mail providers incentive to support S/MIME. |
Examples | Amazon.com sends digitally signed VAT invoices to its merchants in Europe. Source: (Garfinkel, 2005) |
Implementation | Start with messages that are automatically-generated and sent with “do-not-reply” return addresses. Obtain a Digital ID from VeriSign or Thawte; use it with OpenSSL to write S/MIME signatures on all messages that are sent out automatically. Renew the key every year. Additional usability can be obtained by maintaining a database of the email client used by each user and only sending S/MIME-signed mail to those users who have support for S/MIME. Companies that receive email from customers can determine mail clients by examining the headers of incoming customer e-mail. Mail programs such as Outlook Express should not offer to send signed mail unless they can deliver on the promise—that is, unless the user has obtained and installed a Digital ID. |
Consequences | S/MIME Digital ID’s for organizations sending signed mail will be distributed, allowing them to receive mail that is sealed with cryptography from their customers. Some mail systems damage signed messages; these systems will only be fixed if they are exercised and the bugs are found. |
Dependencies | None |
Relationships | [Track Recipients] [Key Continuity Management] [Create Keys When Needed] |
Principles | [Indentifiablity] |
Guidelines | None |
Check lists | None |
Use cases | None |
Tags | Send S/MIME-Signed Email, Email, Authentication, Identification, Integrity, Authenticity, Accountability, Confidentiality |
Log history | [01/18/2016]: Added to repository |
Garfinkel, S.L., 2005. Design principles and patterns for computer systems that are simultaneously secure and usable (PhD thesis). Massachusetts Institute of Technology.