Originally Posted by
TheFu
HTTS is broken. If you don't trust a CA, then anyone can act like you and spoof your server. If you do trust a CA, then governments and less-honest-CA providers can create certs that seem correct and spoof your server again. All of these can become MITM attacks, especially to an untrained/lazy end-user.
With ssh and fail2ban, that isn't possible unless the private key is not private any longer.
Doing secure email is hard. There are lots of little points in the process that can fail, while leaving an impression that everything is working perfectly. Which is worse, a system that doesn't work at all or a believed-to-be-secure system that isn't secure at all?
TOR is not as secure as people believe. Exit nodes see everything, so guess who runs the most exit nodes around the world? Governments. HTTPS has the government/rogue-CA flaw. Some MiTM SSL stuff has been available to enterprises and governments for over a decade - read up on Bluecoat. Attended an introductory session about a decade ago and was shocked at their capabilities. I think many of the features that original bluecoat systems provided are available as FLOSS for download today. Faster CPUs and GPUs make all that SSL math much quicker.
If your users cannot install GPG, setup keys, configure their email client to use them, then I suggest you run your own email server and give them all accounts. Then you can force TLS and HTTPS connections for all their clients. As soon as email leaves a known-secure "walled garden", all bets are off. Many email server systems don't even bother transmitting server-to-server email encrypted. That makes email, which humans think of as private, more like postcards. Actually, that is a really good analogy - a postcard. If the message goes through a system (any hardware or pipe), then those people/machines can read it.
I think GPG is the only trusted way to have encrypted email and KNOW who can and cannot read it. X.509 personal certs are a close second, but those were designed so that the certs can include access for others. I've worked places where my personal X.509 cert had a corporate cert attached, so they could read anything encrypted by it. In a corporate environment, that makes perfect sense - after all, it is their data, communications, not mine. What would happen if I quit or died. That information could be critical corporate assets. This is good for a corporate/government email system, but could be bad for end-users. The GPG team was approached to add this to their spec, but I understand they refused, which is why adding GPG to corporate email system is not built-in like x.509 certs are. At least that's my gut feeling.
The way that most companies handle secure communications with their users is by keeping the messages internal to systems that they run. Just look at your bank. They probably have a message system. The most we get is a notification email that a reply has been posted, so we need to login to our account to read it. That same setup is available for us - though I don't know if there is a FLOSS version. I've seen commercial addons for corporate email systems. Of course, these are all built on the broken HTTPS trust system, but I guess it is better than nothing ... if we can't make a gpg install easy enough to use for everyone. Hummmmm.
Bookmarks