Domain Name Systems-Based Electronic Mail Security
Total Page:16
File Type:pdf, Size:1020Kb
DRAFT NIST CYBERSECURITY PRACTICE GUIDE DOMAIN NAME SYSTEMS-BASED ELECTRONIC MAIL SECURITY How-To Guides For Security Engineers Scott Rose William Barker Santos Jha Chinedum Irrechukwu Karen Waltermire NIST SPECIAL PUBLICATION 1800-6C DRAFT NIST Special Publication 1800-6C NIST Cybersecurity Practice Guide DOMAIN NAME SYSTEMS- BASED ELECTRONIC MAIL SECURITY 1800-6C Scott Rose How-To Guides Information Technology Laboratory For Security Engineers National Institute of Standards and Technology William C. Barker Dakota Consulting Silver Spring, MD Santos Jha Chinedum Irrechukwu The MITRE Corporation McLean, VA Karen Waltermire National Cybersecurity Center of Excellence National Institute of Standards and Technology November 2016 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director DRAFT DISCLAIMER Certain commercial entities, equipment, products, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the entities, equipment, products, or materials are necessarily the best available for the purpose. National Institute of Standards and Technology Special Publication 1800-6C Natl Inst. Stand. Technol. Spec. Publ. 1800-6C, 144 pages (November 2016) CODEN: NSPUE2 Organizations are encouraged to review all draft publications during public comment periods and provide feedback. All publications from NIST’s National Cybersecurity Center of Excellence are available at http://nccoe.nist.gov. Comments on this publication may be submitted to: [email protected] Public comment period: November 2, 2016 through December 19, 2016 National Cybersecurity Center of Excellence National Institute of Standards and Technology 100 Bureau Drive Gaithersburg, MD 20899 Mailstop 2002 Email: [email protected] DNS-Based Email Security Practice Guide iii DRAFT NATIONAL CYBERSECURITY CENTER OF EXCELLENCE The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) addresses businesses’ most pressing cybersecurity problems with practical, standards-based solutions using commercially available technologies. The NCCoE collaborates with industry, academic, and government experts to build modular, open, end-to- end reference designs that are broadly applicable and repeatable. The center’s work results in publicly available NIST Cybersecurity Practice Guides, Special Publication Series 1800, that provide users with the materials lists, configuration files, and other information they need to adopt a similar approach. To learn more about the NCCoE, visit http://nccoe.nist.gov. To learn more about NIST, visit http://www.nist.gov. NIST CYBERSECURITY PRACTICE GUIDES NIST Cybersecurity Practice Guides (Special Publication Series 1800) target specific cybersecurity challenges in the public and private sectors. They are practical, user-friendly guides that facilitate the adoption of standards-based approaches to cybersecurity. They show members of the information security community how to implement example solutions that help them align more easily with relevant standards and best practices. The documents in this series describe example implementations of cybersecurity practices that businesses and other organizations may voluntarily adopt. The documents in this series do not describe regulations or mandatory practices, nor do they carry statutory authority. ABSTRACT This document proposes a reference guide on how to architect, install, and configure a security platform for trustworthy email exchanges across organizational boundaries. The project includes reliable authentication of mail servers, digitally signing and encrypting email, and binding cryptographic key certificates to sources and servers. The example solutions and architectures presented here are based upon standards-based and commercially available products. The example solutions presented here can be used by any organization implementing Domain Name System-based electronic mail security. KEYWORDS electronic mail, digital signature; encryption; domain name system; data integrity; authentication, named entities, internet addresses, internet protocols, privacy DNS-Based Email Security Practice Guide iv DRAFT ACKNOWLEDGMENTS We gratefully acknowledge the contributions of the following individuals and organizations for their generous contributions of expertise, time, and products. Name Organization Nate Lesser National Cybersecurity Center of Excellence Karen Waltermire National Cybersecurity Center of Excellence Doug Montgomery NIST ITL Advanced Networks Technologies Division Janet Jones Microsoft Corporation Paul Fox Microsoft Corporation Joe Gersch Secure64 Saksham Manchanda Secure64 Benno Overeinder NLnet Labs Ralph Dolmans NLnet Labs Willem Toorop NLnet Labs Bud Bruegger Fraunhofer IAO Victoria Risk Internet Systems Consortium Eddy Winstead Internet Systems Consortium DNS-Based Email Security Practice Guide v Contents Contents 1 Introduction........................................................................................................................... 1 1.1 Practice Guide Structure...............................................................................................................2 1.2 Build Overview ..............................................................................................................................3 1.3 Typographical Conventions ..........................................................................................................7 2 How to Install and Configure DNS-Protected Email Security Components.................... 8 2.1 Laboratory Set-up .........................................................................................................................9 2.2 How to Install and Configure Microsoft Server-Based DNS-Protected Email Security Components 18 2.3 How to Install and Configure BIND .............................................................................................18 2.4 NSD 4 Requirements, Installation, Setup, and Configuration Components................................24 2.5 How to Install and Configure OpenDNSSEC ..............................................................................29 2.6 Unbound .....................................................................................................................................34 2.7 How to Install and Configure a DNS Signer Platform .................................................................37 2.8 How to Install and Configure a DNS Authority Platform..............................................................37 2.9 How to Install and Configure DNS Cache...................................................................................37 2.10 How to Install and Configure a Dovecot/Postfix Mail Transfer Agent .........................................38 2.11 How to Install and Configure a Thunderbird Mail Client..............................................................50 3 Device Configuration and Operating Recommendations ............................................... 53 3.1 Using SSL for Cryptographic Certificate Generation ..................................................................54 3.2 Cryptographic Operations (User Actions) ...................................................................................60 3.3 Server-to-Server Encryption Activation and Use ........................................................................67 3.4 Utilities and Useful Tools ............................................................................................................67 Appendix A Acronyms .......................................................................................................... 70 Appendix B References ........................................................................................................ 72 Appendix C Platform Operation and Observations............................................................ 75 C.1 Operations Scenarios ...........................................................................................................75 C.2 Test Sequences ...................................................................................................................76 Appendix D Secure Name System (DNS) Deployment Checklist...................................... 89 Appendix E Overview of Products Contributed by Collaborators.................................... 94 E.1 Open Source MUA and MTA Components ..........................................................................94 E.2 Microsoft Windows-Based Components ..............................................................................96 E.3 NLnet Labs Name Server Daemon-Based Components .....................................................98 DNS-Based Email Security Practice Guide i DRAFT Contents E.4 ISC BIND Component ........................................................................................................100 E.5 Secure64 Component ........................................................................................................103 Appendix F Installation and Configuration Log for NSD4, Unbound, and OpenDNSSEC .. 106 Appendix G Microsoft Installation for the NCCoE ............................................................ 115 G.1 Microsoft Server