Patterns are based on scientific sources.
Name | Track Recipients |
Sources | (Garfinkel, 2005) |
Synonyms | None |
Context | Although most Internet users can receive and decode S/MIME-signed mail, but not all of them can do it properly. |
Problem | How to ensure that emails can be decoded by any recipient? |
Solution | Ensure that cryptographically protected email can be appropriately processed by the intended recipient. |
Examples | Many organizations already keep a database of “mail preferences” stating whether customers wish to receive no mail, ASCII email, or HTML email. These databases can be extended to include other security properties. Source: (Garfinkel, 2005) |
Implementation | Keep a database of each mail recipient and the cryptographic capabilities of their mail clients. This database should include what was observed about each recipient, rather than the conclusions drawn from those observations. (i.e., retain the mail header that established the user had Outlook Express, rather than a database entry that says “Outlook Express”.) Give mail recipients the ability to override these settings with per-user mail preferences. |
Consequences | Using rules and a database of exceptions, it is possible to dramatically reduce the chance of sending signed mail to an individual who cannot decode it. |
Dependencies | None |
Relationships | [Send S/MIME-Signed Email] |
Principles | [No External Burden] |
Guidelines | None |
Check lists | None |
Use cases | None |
Tags | Track Recipients, Trust |
Log history | [01/18/2016]: Added to repository |
Garfinkel, S.L., 2005. Design principles and patterns for computer systems that are simultaneously secure and usable (PhD thesis). Massachusetts Institute of Technology.