OPS345 Lab 8

From Littlesvr Wiki
Jump to navigation Jump to search

SMTP Encryption

One thing we haven't spent time on last week is the connection from your email client to your email server. This will very often be on a very untrusted network, such as a free wifi network you found in some random place.

In this lab we'll set up your MTA to accept encrypted incomming connections, so that it won't matter what sort of network your workstation computer or phone is connected to.

Email-servers.png

Sadly today there is still no widespread means to encrypt MTA->MTA SMTP connections, which means that fundamentally you cannot trust that your email hasn't been read or modified in transit. This is a problem we can't solve in this course, but we don't need to because it's a very large, global problem. A fix would require every single email server out there to comply with a brand new specfication which hasn't even been developed yet.

Generate encryption keys

You can't use the keys you've generated in lab 6 because they were tied to the hostname youruserid.ops345.ca, and the email server has a different FQDN: email.youruserid.ops345.ca.

  • Use certbot again on your workstation to generate a key pair for email.youruserid.ops345.ca. Look at the lab 6 notes if you need a reminder for how to do it. But don't overwrite your web server's keys by mistake.
  • Copy your new private key to ~yourusername/ops345/keys/certbot/email.yourusername.ops345.ca.key.pem on the workstation, for safekeeping.
  • Copy your new certificate to ~yourusername/ops345/keys/certbot/email.yourusername.ops345.ca.cert.pem on the workstation, for safekeeping.
    • Make sure the keys are owned by your regular user, not root.
  • Copy the two keys into the appropriate directories (/etc/pki/tls/certs/ and /etc/pki/tls/private/) on your email server.

Configure Postfix

As you did with Apache: you need to tell the email server (Postfix) to use your keys for encryption.

  • Make the following changes in main.cf: smtpd_tls_cert_file and smtpd_tls_key_file need to point to your certificate and key.
  • After you restart Postfix and make sure it hasn't crashed due to a typo in the config file: test it. Use telnet to connect to it and look for 250-STARTTLS in its reply to your EHLO:
Important.png
Lame ISPs and VPNs
I used to only know one ISP lame enough to block outgoing connections to port 25 for their customers (Rogers). But that plague is spreading. Some students tell me Bell has the same problem, and I've even experienced this block using a VPN. If you're having a problem establishing the following connection: try connecting to Seneca's SMTP server first. If that doesn't work: just skip this test.
AWSPostfix250Starttls.png

That implies that your Postfix server is capable of setting up encrypted connections (though it doesn't tell you which keys are being used). We will test this later in the lab using Thunderbird.

IMAP server: Dovecot

SMTP is used for sending and receiving email. But eventually you want to read your emails, move them to another folder, delete them, etc. To do that you need to use another protocol, and the most common one for that purpose is IMAP.

We'll use Dovecot as an IMAP server. You already installed it on your email server in the previous lab, now you'll configure it. It doesn't take much, you need to edit just a couple of files:

  • /etc/dovecot/dovecot.conf:
    • Set protocols so that Dovecot provides IMAP service only.
  • /etc/dovecot/conf.d/10-ssl.conf:
    • Set ssl_cert to point to your certificate
    • Set ssl_key to point to your pricate key

Note that these are the same keys you used for Postfix. Sharing keys beteween services is not a problem - they are tied to each other and the FQDN, not the service that uses them.

  • Start the Dovecot service and make sure it starts automatically on boot.
  • Use ss to confirm that Dovecot listens on ports 143 and 993, not 110 or 995 (those are POP3 ports).
  • Fix the appropriate firewall to allow your IMAP service to be accessed from anywhere on the internet via port 993 only. Port 143 is for plain-text IMAP.
  • Confirm with telnet on your workstation that you are able to connect to port 993. No need to type in any commands into that test connection.

Email client: Thunderbird

Now that you have both an SMTP and an IMAP server running: it's time to set up an email client, we're going to use Thunderbird.

  • Install Thunderbird on your workstation.
  • Set a password for your regular user on the email VM. Remember that this is a live system on the internet, and that you're responsible for keeping it secure. So don't use P@ssword1! or any other weak password.

Reading email

  • Create a new account in Thunderbird. You'll need to do a manual/advanced setup. Note that:
    • Your email address is @youruserid.ops345.ca but the email servers are email.youruserid.ops345.ca
    • TLS over port 993, with normal password authentication is used for IMAP. Remember to check that your firewall access to this port.
    • STARTTLS over port 25, with normal password authentication is used for SMTP
    • Your username does not include the @youruserid.ops345.ca part
AWSThunderbirdSetup.png
  • Don't accept any security exceptions. Your certificates are supposed to be signed by Let's Encrypt, whose public key comes with Thunderbird.
  • If you make a mistake: you can always remove the account you created (and the SMTP server) from Thunderbird and start over again.
  • There should be an email or two in your inbox from the previous email lab. You can delete it and see that it goes in the Trash folder. Try to find this message in your Maildir. It's in a hiden directory.
  • For example in this screenshot I looked at my Maildir after I deleted the email with the subejct "test2" but left "test1" in the inbox:
AWSMaildirTrash.png

Sending email

Currently your Postfix setup does not require authentication. That means Postfix has no idea who you are when you connect to it via Thunderbird, and it will refuse to send email for you.

  • Run journalctl -u postfix -f on your email server and try to send an email from Thunderbird to an external address. That way you can see in the logs why it didn't work:
AWSThunderbirdSendFailed.png
AWSPostfixRelayDenied.png

The fact that your connection is encrypted does not imply that you have been authenticated. There is more than one way to accomplish the needed authentication, we're going to link it to Dovecot SASL as described in this Xmodulo guide. Note that we already have the SSL/TLS parameters set up for Postfix so that part of the tutorial doesn't apply to us.

  • Add this to the bottom of /etc/dovecot/conf.d/10-master.conf:
    ## The listener is added under the service auth section ##
    service auth {
        unix_listener /var/spool/postfix/private/auth {
         mode = 0660
             user = postfix
              group = postfix
         } ##end listener
    } ## end service auth
    
  • Modify the auth_mechanisms in /etc/dovecot/conf.d/10-auth.conf to include "login"
    auth_mechanisms = plain login
  • Restart Dovecot and check that:
    • It started successfully.
    • The file /var/spool/postfix/private/auth has been created, and is owned by "postfix".

Now configure Postfix to use Dovecot as a user authentication mechanism:

  • Edit /etc/postfix/main.cf and add this to the end:
    #### SASL ####
    ## specify SASL type ##
    smtpd_sasl_type = dovecot
    
    ## path to the SASL socket relative to postfix spool directory i.e. /var/spool/postfix ##
    smtpd_sasl_path = private/auth
    
    ## postfix appends the domain name for SASL logins that do not have the domain part ##
    smtpd_sasl_local_domain = example.tst
    
    ## SASL default policy ##
    smtpd_sasl_security_options = noanonymous
    
    ## for legacy application compatibility ##
    broken_sasl_auth_clients = yes
    
    ## enable SMTP auth ##
    smtpd_sasl_auth_enable = yes
    
    ## smtp checks ##
    ## these checks are based on first match, so sequence is important ##
    smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination
    
  • Restart Postfix, use journalctl -l to monitor your maillog, and send your message again from Thunderbird.
  • The message should appear to be sent as far as Thunderbird is aware, because the SMTP server Thunderbird is configured to use accepted that message.
Idea.png
Cant send emails out from AWS EC2
Unfortunately your outgoing email will never be received at the destination, because regular AWS EC2 instances are not allowed outbound connections to port 25. There's nothing you can do to fix this, it's an AWS policy designed to prevent their services from being used as spam senders. See here for details.
  • Do send an email to yourself (youruserid@youruserid.ops345.ca) or another user on the email server so you can see it show up in Thunderbird's inbox.
AWSOutboundSMTPDenied.png

Real email servers

Other than the setup you've done in this course: it would take extra work to run your own email server. You will need to as a minimum:

  • Set up DKIM to sign your outgoing messages.
  • Set up SPF so that receiving SMTP servers can do an extra check that emails sent by you were sent by the correct server.
  • Configure some kind of spam filtering, such as SpamAssasin.

Submit evidence of your work

For this lab, please submit screenshots that show you've completed the work, unless your professor has given you different instructions. As a minimum that's:

  • Your Thunderbird IMAP server configuration.
  • Your Thunderbird SMTP server configuration.
  • Some messages in your inbox that you sent/received with Thunderbird's encrypted connections.