OPS345 Lab 8 Newversion: Difference between revisions

From Littlesvr Wiki
Jump to navigation Jump to search
(Replaced content with "Latest version is at OPS345_Lab_8 Category:OPS345")
Tag: Replaced
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
= SMTP Encryption =
Latest version is at [[OPS345_Lab_8]]
 
One thing we haven't spent time on last week is the connection from your email client to your email server. This will very often be on a very untrusted network, such as a free wifi network you found in some random place.
 
In this lab we'll set up your MTA to accept encrypted incomming connections, so that it won't matter what sort of network your workstation computer or phone is connected to.
 
[[File:Email-servers.png|800px|border|center]]
 
Sadly today there is still no widespread means to encrypt MTA->MTA SMTP connections, which means that fundamentally you cannot trust that your email hasn't been read or modified in transit. This is a problem we can't solve in this course, but we don't need to because it's a very large, global problem. A fix would require every single email server out there to comply with a brand new specfication which hasn't even been developed yet.
 
== Generate encryption keys ==
 
You can't use the keys you've generated in [[OPS345_Lab_5 | lab 5]] because they were tied to the hostname youruserid.ops345.ca, and the email server has a different FQDN: email.youruserid.ops345.ca.
 
* Use certbot again on your workstation to generate a key pair for email.youruserid.ops345.ca. Look at the lab 5 notes if you need a reminder for how to do it. But don't overwrite your web server's keys by mistake.
* Copy your new private key to ~yourusername/ops345/keys/certbot/'''email.yourusername.ops345.ca.key.pem''' on the workstation, for safekeeping.
* Copy your new certificate to ~yourusername/ops345/keys/certbot/'''email.yourusername.ops345.ca.cert.pem''' on the workstation, for safekeeping.
** Make sure the keys are owned by your regular user, not root.
* Copy the two keys into the appropriate directories (/etc/pki/tls/certs/ and /etc/pki/tls/private/) on your email server.
 
== Configure Postfix ==
 
As you did with Apache: you need to tell the email server (Postfix) to use your keys for encryption.
 
* Make the following changes in main.cf: '''smtpd_tls_cert_file''' and '''smtpd_tls_key_file''' need to point to your certificate and key.
 
* After you restart Postfix and make sure it hasn't crashed due to a typo in the config file: test it. Use telnet to connect to it and look for 250-STARTTLS in its reply to your EHLO:
 
{{Admon/important|Lame ISPs|I only know one ISP lame enough to block outgoing connections to port 25 for their customers (Rogers). But there may be others. If you're having a problem establishing the following connection: try connecting to Seneca's SMTP server first. If that doesn't work: skip this test.}}
 
[[File:AWSPostfix250Starttls.png|border|center]]
 
That implies that your Postfix server is capable of setting up encrypted connections (though it doesn't tell you which keys are being used). We will test this later in the lab using Thunderbird.
 
= IMAP server: Dovecot =
 
SMTP is used for sending and receiving email. But eventually you want to read your emails, move them to another folder, delete them, etc. To do that you need to use another protocol, and the most common one for that purpose is IMAP.
 
We'll use Dovecot as an IMAP server. You already installed it on your email server in the previous lab, now you'll configure it. It doesn't take much, you need to edit just a couple of files:
 
* /etc/dovecot/dovecot.conf:
** Set '''protocols''' so that Dovecot provides IMAP service only.
* /etc/dovecot/conf.d/10-ssl.conf:
** Set '''ssl_cert''' to point to your certificate
** Set '''ssl_key''' to point to your pricate key
 
Note that these are the same keys you used for Postfix. Sharing keys beteween services is not a problem - they are tied to each other and the FQDN, not the service that uses them.
 
* Start the Dovecot service and make sure it starts automatically on boot.
* Use '''ss''' to confirm that Dovecot listens on ports 143 and 993, not 110 or 995 (those are POP3 ports).
* Fix the appropriate firewall to allow your IMAP service to be accessed from anywhere on the internet via port 993 only. Port 143 is for plain-text IMAP.
* Confirm with telnet on your workstation that you are able to connect to port 993. No need to type in any commands into that test connection.
 
= Email client: Thunderbird =
 
Now that you have both an SMTP and an IMAP server running: it's time to set up an email client, we're going to use Thunderbird.
 
* Install Thunderbird on your workstation.
* Set a password for your regular user on the email VM. Remember that this is a live system on the internet, and that you're responsible for keeping it secure. So don't use P@ssword1! or any other weak password.
 
== Reading email ==
 
* Create a new account in Thunderbird. You'll need to do a manual/advanced setup. Note that:
** Your email address is @youruserid.ops345.ca but the email servers are email.youruserid.ops345.ca
** TLS over port 993, with normal password authentication is used for IMAP. Remember to check that your firewall access to this port.
** STARTTLS over port 25, with normal password authentication is used for SMTP
** Your username does not include the @youruserid.ops345.ca part
 
[[File:AWSThunderbirdSetup.png|border|center]]
 
* Don't accept any security exceptions. Your certificates are supposed to be signed by Let's Encrypt, whose public key comes with Thunderbird.
* If you make a mistake: you can always remove the account you created (and the SMTP server) from Thunderbird and start over again.
* There should be an email or two in your inbox from the previous email lab. You can delete it and see that it goes in the Trash folder. Try to find this message in your Maildir. It's in a hiden directory.
* For example in this screenshot I looked at my Maildir after I deleted the email with the subejct "test2" but left "test1" in the inbox:
 
[[File:AWSMaildirTrash.png|600px|border|center]]
 
== Sending email ==
 
Currently your Postfix setup does not require authentication. That means Postfix has no idea who you are when you connect to it via Thunderbird, and it will refuse to send email for you.
 
* Run '''journalctl -u postfix -f''' on your email server and try to send an email from Thunderbird to an external address. That way you can see in the logs why it didn't work:
 
[[File:AWSThunderbirdSendFailed.png|600px|border|center]]
 
[[File:AWSPostfixRelayDenied.png|600px|border|center]]
 
The fact that your connection is encrypted does not imply that you have been authenticated. There is more than one way to accomplish the needed authentication, we're going to link it to Dovecot SASL as described in [https://www.xmodulo.com/enable-user-authentication-postfix-smtp-server-sasl.html this Xmodulo guide]. Note that we already have the SSL/TLS parameters set up for Postfix so that part of the tutorial doesn't apply to us.
 
* Add this to the bottom of /etc/dovecot/conf.d/10-master.conf:<syntaxhighlight lang="vim">## The listener is added under the service auth section ##
service auth {
    unix_listener /var/spool/postfix/private/auth {
    mode = 0660
        user = postfix
          group = postfix
    } ##end listener
} ## end service auth</syntaxhighlight>
* Modify the auth_mechanisms in /etc/dovecot/conf.d/10-auth.conf to include "login"<pre>auth_mechanisms = plain login</pre>
* Restart Dovecot and check that:
** It started successfully.
** The file /var/spool/postfix/private/auth has been created, and is owned by "postfix".
 
Now configure Postfix to use Dovecot as a user authentication mechanism:
 
* Edit /etc/postfix/main.cf and add this to the end:<syntaxhighlight lang="vim">#### SASL ####
## specify SASL type ##
smtpd_sasl_type = dovecot
 
## path to the SASL socket relative to postfix spool directory i.e. /var/spool/postfix ##
smtpd_sasl_path = private/auth
 
## postfix appends the domain name for SASL logins that do not have the domain part ##
smtpd_sasl_local_domain = example.tst
 
## SASL default policy ##
smtpd_sasl_security_options = noanonymous
 
## for legacy application compatibility ##
broken_sasl_auth_clients = yes
 
## enable SMTP auth ##
smtpd_sasl_auth_enable = yes
 
## smtp checks ##
## these checks are based on first match, so sequence is important ##
smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination
</syntaxhighlight>
* Restart Postfix, tail -f your maillog, and send your message again from Thunderbird.
* The message should appear to be sent as far as Thunderbird is aware, because the SMTP server Thunderbird is configured to use accepted that message.
 
{{Admon/tip|Cant send emails out from AWS EC2|Unfortunately your outgoing email will never be received at the destination, because regular AWS EC2 instances are not allowed outbound connections to port 25. There's nothing you can do to fix this, it's an AWS policy designed to prevent their services from being used as spam senders. [https://aws.amazon.com/premiumsupport/knowledge-center/ec2-port-25-throttle/ See here] for details.}}
 
* Do send an email to yourself (youruserid@youruserid.ops345.ca) or another user on the email server so you can see it show up in Thunderbird's inbox.
 
[[File:AWSOutboundSMTPDenied.png|600px|border|center]]
 
= Real email servers =
 
Other than the setup you've done in this course: it would take extra work to run your own email server. You will need to as a minimum:
* Set up DKIM to sign your outgoing messages.
* Set up SPF so that receiving SMTP servers can do an extra check that emails sent by you were sent by the correct server.
* Configure some kind of spam filtering, such as SpamAssasin.
 
= Submit evidence of your work =
 
For this lab, please submit screenshots that show you've completed the work, unless your professor has given you different instructions. As a minimum that's:
 
* Your Thunderbird IMAP server configuration.
* Your Thunderbird SMTP server configuration.
* Some messages in your inbox that you sent/received with Thunderbird's encrypted connections.


[[Category:OPS345]]
[[Category:OPS345]]

Latest revision as of 13:12, 21 August 2023

Latest version is at OPS345_Lab_8