Automatic encryption of stored messages
Dan White
dwhite at olp.net
Wed Apr 28 04:27:40 EDT 2010
On 27/04/10 10:40 -0400, Mikhail T. wrote:
> Is there a way to encrypt all of the Cyrus' user-specific files on the
> disk? So that somebody breaking in -- or stealing the server -- has no
> access to the messages (and other data) unless a user's password is also
> available?
Interesting question! info-cyrus list is probably more appropriate for
this question.
> * A somewhat secret "salt" and the location of a (memory-backed)
> cyrus-only directory, such as /tmp/cyruspw, are set in a config-file.
> * A user logs in using a pam-module, which creates a symlink such as
> /tmp/cyruspw//user/ -> somehash(/salt/+/password+user/).
The PAM requirement would force the use of saslauthd, and plaintext only
authentication mechanisms, which potentially degrades the over-the-wire
security between the client and server.
> I think, this ensures reasonable protection for the stored messages
> without any cooperation from the MUA -- a stolen server (or a
> decommissioned hard-drive) will not reveal user's e-mails. Also, each
> user is assured, that their old emails are not accessible to anyone,
> /when he isn't accessing them himself/.
>
> This may be possible to do right now -- without changing the Cyrus' code
> at all -- by using encrypted filesystems. Unfortunately, it means, each
> user's files would have to reside on their own filesystem... The
> proposed mechanism would provide a better way without /too much/
> trouble. What do you think?
Another opt-in approach would be for users to encrypt all private messages
within the MUA using PGP/GPG.
--
Dan White
More information about the Cyrus-sasl
mailing list