Securing Communication - Red Hat ENTERPRISE LINUX 4.5.0 Reference Manual

Table of Contents

Advertisement

Chapter 11. Email
full-featured, graphical email client programs, such as Mozilla Mail or Ximian Evolution, as
well as text-based email programs such as
For instructions on using these applications, refer to the chapter titled Email Applications in the
Red Hat Enterprise Linux Step By Step Guide.
The remainder of this section focuses on securing communication between the client and
server.

5.1. Securing Communication

Popular MUAs included with Red Hat Enterprise Linux, such as Mozilla Mail, Ximian
Evolution, and
offer SSL-encrypted email sessions.
mutt
Like any other service that flows over a network unencrypted, important email information, such
as usernames, passwords, and entire messages, may be intercepted and viewed by users on
the network. Additionally, since the standard POP and IMAP protocols pass authentication
information unencrypted, it is possible for an attacker to gain access to user accounts by
collecting usernames and passwords as they are passed over the network.
5.1.1. Secure Email Clients
Most Linux MUAs designed to check email on remote servers support SSL encryption. To use
SSL when retrieving email, it must be enabled on both the email client and server.
SSL is easy to enable on the client-side, often done with the click of a button in the MUA's
configuration window or via an option in the MUA's configuration file. Secure IMAP and POP
have known port numbers (993 and 995, respectively) that the MUA uses to authenticate and
download messages.
5.1.2. Securing Email Client Communications
Offering SSL encryption to IMAP and POP users on the email server is a simple matter.
First, create an SSL certificate. This can be done two ways: by applying to a Certificate
Authority (CA) for an SSL certificate or by creating a self-signed certificate.
Caution
Self-signed certificates should be used for testing purposes only. Any server
used in a production environment should use an SSL certificate granted by a CA.
To create a self-signed SSL certificate for IMAP, change to the
directory and type the following commands as root:
rm -f imapd.pem make imapd.pem
208
.
mutt
/usr/share/ssl/certs/

Advertisement

Table of Contents
loading

Table of Contents