Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Email updates on news, actions,
and events in your area.
Join EFF Lists
Electronic Frontier Foundation
Donate
EFFecting Change: Get the Flock Out of Our City on February 19

ISPs Removing Their Customers' Email Encryption

DEEPLINKS BLOG
ByJacob Hoffman-Andrews
November 11, 2014

ISPs Removing Their Customers' Email Encryption

Recently, Verizon was caught tampering with its customer's web requests to inject atracking super-cookie. Another network-tampering threat to user safety has come to light from other providers: email encryption downgrade attacks. In recent months, researchers have reportedISPs in the US andThailand intercepting their customers' data to strip a security flag—called STARTTLS—from email traffic. TheSTARTTLS flag is an essential security and privacy protection used by an email server to request encryption when talking to another server or client.1

By stripping out this flag, these ISPs prevent the email servers from successfully encrypting their conversation, and by default the servers will proceed to send email unencrypted. Some firewalls,including Cisco's PIX/ASA firewall do this in order to monitor for spam originating from within their network and prevent it from being sent. Unfortunately, this causes collateral damage: the sending server will proceed to transmit plaintext email over the public Internet, where it is subject to eavesdropping and interception.

This type of STARTTLS stripping attack has mostly gone unnoticed because it tends to be applied to residential networks, where it is uncommon to run an email server2. STARTTLS was also relatively uncommonuntil late 2013, when EFF startedrating companies on whether they used it. Since then, many of thebiggestemailprovidersimplemented STARTTLS to protect their customers. We continue to strongly encourage all providers to implement STARTTLS for both outbound and inbound email. Google'sSafer email transparency report andstarttls.info are good resources for checking whether a particular provider does.

Several Standards for Email Encryption

The SMTP protocol, the underpinning of email, was not originally designed with security in mind. But people quickly started using it for everything from shopping lists and love letters to medical advice and investigative reporting, and soon realized their mail needed to be protected from prying eyes. In 1991, Phil Zimmerman implementedPGP, an end-to-end email encryption protocol that is still in use today. Adoption of PGP has been slow because of its highly technical interface and difficult key management.S/MIME, with similar properties as PGP, was developed in 1995. And in 2002, STARTTLS for email was defined byRFC 3207.

While PGP and S/MIME are end-to-end encryption, STARTTLS is server-to-server. That means that the body of an email protected with, e.g. PGP, can only be read by its intended recipient, while email protected with STARTTLS can be read by the owners of the sending server and the recipient server, plus anyone else who hacks or subpoenas access to those servers. However, STARTTLS has three big advantages: First, it protects important metadata (subject lines and To:/From/CC: fields) that PGP and S/MIME do not. Second, mail server operators can implement STARTTLS without requiring users to change their behavior at all. And third, a well-configured email server with STARTTLS can provide Forward Secrecy for emails. The two technologies are entirely compatible and reinforce each other. The most secure and private approach is to use PGP or S/MIME with a mail service that uses STARTTLS for server-to-server communication.

There are several weak points in the STARTTLS protocol, however. The first weakness is that the flag indicating that a server supports STARTTLS is not itself encrypted, and is therefore subject to tampering, which can prevent that server from establishing an encrypted connection. That type of tampering is exactly what we see today. EFF is working on a set of improvements to STARTTLS, calledSTARTTLS Everywhere, that will make server-to-server encryption more robust by requiring encryption for servers that are already known to support it.

It is important that ISPs immediately stop this unauthorized removal of their customers' security measures. ISPs act as trusted gateways to the global Internet and it is a violation of that trust to intercept or modify client traffic, regardless of what protocol their customers are using. It is a double violation when such modification disables security measures their customers use to protect themselves.

Update: the footnote in an earlier version of this post incorrectly described port 587 as "TLS-wrapped."

  • 1. If you have netcat (nc) installed, you can test your connection for STARTTLS downgrades usingthe commands shown here.
  • 2. Desktop email clients like Thunderbird generally send outbound email on a different port, 465 or 587, and may not be commonly affected. But there are some exceptions, like the software used by the Golden Frog engineer whospotted an issue on AIO Wireless.

Related Updates

European Union flag on tech background

EFF and 80 Organizations Call on EU Policymakers to Preserve Net Neutrality in the Digital Networks Act

As the European Commission prepares an upcoming proposal for a Digital Networks Act (DNA), a growing network of groups are raising serious concerns about the resurgence of “fair share” proposals from major telecom operators. The original idea was to introduce network usage fees on certain companies to pay ISPs. We...

Check Your Reps

Sixth Circuit Rules Against Net Neutrality; EFF Will Continue to Fight

Last week, the Sixth U.S. Circuit Court of Appealsruled against the FCC, rejecting its authority to classify broadband as a Title II “telecommunications service.” In doing so, the court removed net neutrality protections for all Americans and took away the FCC’s ability to meaningfully regulate internet service providers.This...

Check Your Reps
Deeplinks Blog byKit Walsh | October 30, 2024

The Frightening Stakes of this Halloween’s Net Neutrality Hearing

The future of the open internet is in danger this October 31st, not from ghosts and goblins, but from the broadband companies that control internet access in most of the United States. These companies would love to use their oligopoly power to charge users and websites additional fees for “premium”...

Deeplinks Blog byChao Liu | May 13, 2024

Victory! FCC Closes Loopholes and Restores Net Neutrality

Thanks to weeks of the public speaking up and taking action the FCC has recognized the flaw in their proposed net neutrality rules. The FCC’s final adopted order on net neutrality restores bright line rules against all forms of throttling, once again creating strong federal protections for all Americans.

Internet Service Providers Plan to Subvert Net Neutrality. Don’t Let Them

In the absence of strong net neutrality protections, internet service providers (ISPs) have made all sorts of plans that would allow them to capitalize on something called "network slicing." While this technology has all sorts of promise, what the ISPs have planned would subvert net neutrality—the principle that all data...

Deeplinks Blog byChao Liu,Kit Walsh | April 16, 2024

Tell the FCC It Must Clarify Its Rules to Prevent Loopholes That Will Swallow Net Neutrality Whole

The Federal Communications Commission (FCC) has releaseddraft rules to reinstate net neutrality, with a vote on adopting the rules to come on the 25th of April. The FCC needs to close some loopholes in the draft rules before then.Proposed Rules on Throttling and Prioritization Allow for...

2023 Year in Review (text animated to change colors)
Deeplinks Blog byChao Liu | December 29, 2023

In the Trenches of Broadband Policy: 2023 Year In Review

EFF has long advocated for affordable, accessible, future-proof internet access for all.Nearly 80% of Americans already consider internet access to be as essential as water and electricity, so as our work, health services, education, entertainment, social lives, etc. increasingly have an online component, we cannot accept a future...

Net Neutrality Banner
Deeplinks Blog byChristopher Vines | October 13, 2023

The FCC is Expected to Propose the Return of Net Neutrality Protections Oct 19th - Let’s Hope They Get it Right!

Network neutrality is the idea that internet service providers (ISPs) should treat all data that travels over their networks fairly, without discrimination in favor of particular apps, sites or services. It is a principle that must be upheld toprotect the open internet. The idea thatISPs could...

4 icons representing saving News from big tech
Deeplinks Blog byCory Doctorow | June 12, 2023

To Save the News, We Need an End-to-End Web

This is part five of an ongoing, five-part series. Part one, the introduction, ishere. Part two, about breaking up ad-tech companies, ishere. Part three, about banning surveillance ads, ishere. Part four, about opening up app stores, ishere.Download this whole series...

Deeplinks Blog byChao Liu, Ernesto Falcon,Katharine Trendacosta | December 6, 2022

Network Usage Fees Will Harm European Consumers and Businesses

Network usage fees, the idea that certain types of companies should pay internet service providers (ISPs) for the ability to deliver their content to consumers, both hurts consumers and breaks the status quo that has facilitated the rapid spread of the global internet. ISPs claim these fees are necessary because...

Back to top

EFF Home

Follow EFF:

Check out our 4-star rating onCharity Navigator.

Contact

About

Issues

Updates

Press

Donate

JavaScript license information

[8]ページ先頭

©2009-2026 Movatter.jp