Securing email to Gmail

Tue 22 December 2015

I've been working on securing my postfix configuration to enforce certificate validation and encryption on some known, higher-volume, or more sensitive connections between SMTP servers (port 25).

On many of the connections I've setup for secure transport there have been no problems (assuming proper TLS certificates are used). Unfortunately Gmail™ has been a problem.  Sometimes it verifies and validates the certificate and other times it doesn't... for days.

After conferring with Google Security I believe I've come up with a solution.  In my tls_policy file I've added the following:       secure ciphers=high protocols=TLSv1.2

So far this is working[STRIKEOUT:but I'll continue to test].

If you run your own SMTP server and wish to maintain a secure connection with Gmail this is an easy way to enforce encryption as well as validate the certificate.  Of course this doesn't protect the message while it's being stored on the server or workstation (or on Google's internal network). To protect messages at rest (on a server) one should use GPG or S/MIME.  Using both TLS over the network between servers and GPG or S/MIME is beneficial to provide protection of the messages going over the Internet.


[STRIKEOUT:This configuration is applicable with the OpenSSL version shipped with CentOS 6/RHEL 6.  Implementing this on CentOS 7/RHEL7 or another flavor of Linux may require a different/better configuration.]
The policy has been updated for CentOS 7/RHEL 7 which supports TLSv1.2 on Postfix.  Other services can also be setup similarly:    secure ciphers=high protocols=TLSv1.2    secure ciphers=high protocols=TLSv1.2    secure ciphers=high protocols=TLSv1.2    secure ciphers=high protocols=TLSv1.2

By Sparks, Category: Information Security

Tags: OpenPGP / Confidentiality / Integrity / RHEL 7 / S/MIME / email /

Other articles

Secure E-mail

Thu 29 May 2014

E-mail is inherently insecure.  Just as sending a post card, any message sent by e-mail can be read by any number of people, including those monitoring the network path, the servers that process the message along its route, or anyone with access to the distant computer.  Basically you should consider …

By Sparks, Category: Information Security

Continue reading …