DKIM Signature & Verification
Total Page:16
File Type:pdf, Size:1020Kb
Tech Events – Sep 2020 Email Security Peter Rusanovski Sales Engineer © 2020 Forcepoint Forcepoint Proprietary © 2020 Forcepoint Products Email Security CASB Data Guard Web Security SD-WAN & NGFW FIT DLP UEBA Insider Threat DEP Boldon James RBI DUP Classification Isolation DDP © 2020 Forcepoint Agenda • Email Hybrid / Cloud • Azure deployments • Security Hardening (Settings & Filters) o DKIM o SPF o DMARC • Business Email Compromise • Sandbox (File & URLs) • URL wrapping • Phishing Education • System Health Check • Troubleshooting steps • Tips and Tricks • End Of Life Products Status © 2020 Forcepoint 3 Forcepoint Email Security Add Classification Label: Forcepoint Private | Forcepoint Proprietary | Public © 2020 Forcepoint 4 FORCEPOINT OFFERS THE MOST COMPREHENSIVE EMAIL SECURITY Inbound Outbound • Anti-Malware, Anti-Spam, • Email Encryption • Anti-Spoofing (DKIM & DMARC) • Incident Risk Ranking • Phishing Defenses • DLP for free • Content Filtering • Content Filtering • Attachment Filters • Lexical Rule • DLP inbound • Disclaimer • Exploited Document Discovery • Attachment Filters • Advanced Malware Detection • Drip DLP (Stateful) • Phishing Education • Anti-Malware, • URL Wrapping • Anti-SPAM, • Inappropriate Image Filter • OCR (Optical Character • Spam Controls Analysis Tools Recognition) • ACE Analytics • ThreatSeeker Intelligence Cloud • Sandboxing / Forensic Reporting • High Risk User Behavior • Yara definitions © 2020 Forcepoint Email Deployment Add Classification Label: Forcepoint Private | Forcepoint Proprietary | Public © 2020 Forcepoint 6 Deploy How, Where, and When You Want IaaS, PaaS SAAS On-Premises Hybrid Cloud Three Options, One SKU Start anywhere – and move to the cloud when you’re ready © 2020 Forcepoint The Right Appliances For Your Needs Virtual Appliance V5000 V10000 V20000 ~2000 ~8000 20,000+ Users Users Users © 2020 Forcepoint CLOUD EMAIL SECURITY - SAAS NEW VIEW, NEW FEATURES MORE SECURE © 2020 Forcepoint FORCEPOINT EMAIL CLOUD DEPLOYMENT © 2020 Forcepoint FORCEPOINT EMAIL HYBRID DEPLOYMENT AND ADDITIONAL PROTECTION LAYER • HYBRID –“BEST OF BOTH WORLDS”, • GOOD SPAM/VIRUS EFFICACY, • SAME DEPLOYMENT REQUIREMENTS AS ON PREM, INCLUDES FULL EMAIL DLP © 2020 Forcepoint Azure Deployment © 2020 Forcepoint ESG is available in Azure The cloud deployment installation is now standardized with Forcepoint Email Security installation, meaning that the installed product is identical for both cloud and on-premises deployment. There is an option to also install the management in Azure (FSM). © 2020 Forcepoint ESG is available in Azure Install is done from Azure Market © 2020 Forcepoint Hardening DKIM & DMARC © 2020 Forcepoint Brief introduction to DKIM DKIM(Domain Keys Identified Mail) is an email authentication technology based on digital signatures to help protect both email receivers and email senders from forged and phishing email. A DKIM-compliant must provide one or more pairs of asymmetric keys, then installs private keys into the signing MTA, and publishes public keys on the DNS. The DNS labels are structured as “selector._domainkey.example.com”, where “selector” identifies the key pair, and “_domainkey” is a fixed keyword, followed by the signing domain's name (example.com, in this example) © 2020 Forcepoint DKIM signing process • The signing MTA uses stored private key to generate a digital signature that covers selected fields of the message header and body, such as “From:”, “To:”, “Date:”, and “Subject:” • Insert the digital signature into the message as a header • Deliver the message to next hop as normal Note: In ESG, smtp service generates DKIM signature and insert it into message as header before deliver to next hop. Add Classification Label: Forcepoint Private | Forcepoint Proprietary | Public © 2020 Forcepoint 17 DKIM verification process • The DKIM-enabled receiving email server extracts the domain from message header “From:” • Query DNS and retrieve the public key, for example: “test1._domainkey.es.com” • The receiving email server then uses this public key to decrypt the hash value in the header field and recalculates the message hash value (headers and body) • If the two values match, it indicates that the mail was truly sent from and the content has not been modified during transport • Receiving email server applies local policies based on the DKIM verification result (content filter) Note: In ESG, filter service is responsible for DKIM verification Add Classification Label: Forcepoint Private | Forcepoint Proprietary | Public © 2020 Forcepoint 18 DKIM Diagram Add Classification Label: Forcepoint Private | Forcepoint Proprietary | Public © 2020 Forcepoint 19 DKIM signature & verification Signature added by MTA Public key stored on DNS © 2020 Forcepoint 20 DKIM signature & verification ▪The DKIM signature consists of a list of “tag=value” parts. ▪ v is the DKIM version. ▪ a is the signing algorithm. ‘rsa-sha1’ means use SHA-1 as the cryptographic hash and RSA as the public key encryption scheme. The encrypted result is encoded using Base64. ▪ c is the canonicalization algorithm(s) for header and body ▪ d is the signing domain ▪ s is the selector. In this example, the FQDN of the DNS is “test1._domainkey.es.com” ▪ t is the signature timestamp ▪ bh is the body hash ▪ l is the length of the canonicalized part of the body that has been signed ▪ h is the list of signed header fields. The DKIM-Signature header field itself is always implicitly included in h, with the value of tag b treated as though it were an empty string. ▪b is the actual digital signature of the contents (headers and body) of the mail message. © 2020 Forcepoint 21 DKIM Configuration on ESG ▪ There is a new setting page to configure the DKIM on Triton Email. (Settings -> Inbound/Outbound -> DKIM Settings) ▪ From this page, we can manage private keys and public keys. ▪ And manage DKIM rules for how to sign the mail messages ▪ We can also enable or disable DKIM for inbound, outbound or internal messages separately. © 2020 Forcepoint 22 DKIM Configuration on Email Cloud Cloud Email Security Policy > Antispoofing > DKIM © 2020 Forcepoint 23 DKIM Cloud Email records These are the Forcepoint CNAME records you must publish in order to enable DKIM signing. Map fpkey11-1._domainkey and fpkey11-2._domainkey to the corresponding values in out.mailcontrol.com. The same DKIM signing domain can be used for all sender domains. © 2020 Forcepoint 24 Brief introduction to DMARC DMARC stands for “Domain-based Message Authentication, Reporting and Conformance”. It is an email validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is authorized by that domain’s administrator and that the email has not been modified during transport. It expands on two existing mechanisms, the well-known Sender Policy Framework (SPF) and DKIM, coordinating their results on the alignment of the domain in the “From:” header field, which is often visible to end users. It allows specification of policies and provides for reporting of actions performed under those policies. The DMARC reporting consists in supplying feedback to the author domain on how its authentication methods do, thereby providing for informed policy crafting. DMARC is specified in RFC 7489. © 2020 Forcepoint 25 DMARC and email authentication process © 2020 Forcepoint 26 DMARC Configuration on ESG ▪ There is a new setting page to configure DMARC on Triton Email (Settings -> Inbound/Outbound -> DMARC Settings) ▪ We can configure the DMARC verification for the 3 directions separately. The direction is relative to the recipients. ▪ If there are multiple recipients, it’s possible that some recipients can’t receive the message due to violate DMARC checking © 2020 Forcepoint 27 DMARC Configuration on Cloud Email Select Filter inbound messages that spoof external domains using DMARC to detect spoofed incoming messages that appear to be sent from legitimate external domains, but which fail DMARC validation checks. This option validates both the Mail From sending address and the From address. DMARC is built on SPF and DKIM validation and allows the owner of a domain to publish a policy (via DNS TXT records) that defines how the receiver should deal with spoofed messages. © 2020 Forcepoint 28 Business Email Compromise Internal Executive Spoofing © 2020 Forcepoint CLOUD EMAIL - INTERNAL EXECUTIVE SPOOFING The Internal Executive Spoofing feature provides protection against spear phishing attacks targeting individuals within your organization. Such emails may come from legitimate (non-spoofed) email addresses, thereby passing other spoofing checks, but use the display name of a known user (often an executive), with the intention of tricking employees into sending money or information. © 2020 Forcepoint ESG - INTERNAL EXECUTIVE SPOOFING ➢ Protect your self from finance scammers asking to transfer $ while spoofing themselves to C level employee ([email protected]) ➢Very easy to do in our email cloud / doing it on the local ESG nee to create a new filter & regex to identify this C level users. © 2020 Forcepoint ESG – ANTISPOOF Rule Antispoof analysis helps determine the validity of message senders. Select the relevant sender address combinations you want to compare. With Advanced Options, use SPF, DKIM, and SIDF authentication results to determine the message validity. The filter is triggered when at least one address comparison fails or one authentication result is met. If both address comparison and authentication