I think I understood most of what you were saying.  I was referring to
tumbleweeds when I said off-site. (that really is off-site, right?)

On Wed, Apr 23, 2008 at 6:10 PM, Don Andrews <[EMAIL PROTECTED]>
wrote:

>  Didn't mean to imply off-site – both the SMIME proxy and Secure Messenger
> solutions are internally hosted – in fact on the same set of servers.
>
>
>  ------------------------------
>
> Thanks for the input.  the off-site solution seems to be very popular.
>
> On Wed, Apr 23, 2008 at 3:23 PM, Don Andrews <[EMAIL PROTECTED]>
> wrote:
>
> Yep – SMIME is a client to client protocol – each client will need their
> own certificate, then will need to do a certificate exchange etc. etc. – and
> bottom line is the sending client is required to ensure that they send
> encrypted after all that.
>
>
>
> Some of us have gateways that act as SMIME proxies for our internal users
> freeing them from this burden, but there is an administrative overhead to
> getting it all working the first time – and the external client still has to
> do their end – the major advantage is that the server can ensure that
> outgoing messages are always encrypted and warn the recipient of unencrypted
> inbound messages.
>
>
>
> Given the overhead of SMIME encrypted email, some have opted for a browser
> based secure FTP-like solution – we use Tumbleweed's Secure Messenger for
> this.
>
>
>  ------------------------------
>
> *From:* Troy Meyer [mailto:[EMAIL PROTECTED]
> *Sent:* Wednesday, April 23, 2008 12:54 PM
>
>
> *To:* MS-Exchange Admin Issues
>
> *Subject:* RE: Email Certificates
>
>
>
> Uh-oh   that throws a wrench in the bucket, if we cant actually communicate
> with the admin of the email server on their end (cox) we may be in trouble.
>
>
>
> If they are using the standard cox server at mx.west.cox.net (or
> mx.east.cox.net) then transport encryption may not be possible ( a quick
> telnet into that address does not accept a TLS or STARTTLS command, its
> pretty plain jane).
>
>
>
> So options would be setting up SMIME User certificates which is a little
> more work and would require some user training. Or if the other company
> moved to a different (infer better) email hosting provider then they could
> except TLS encrypted email.
>
>
>
> No easy options L
>
>
>
> -troy
>
>
>
>
>
> *From:* Jeff Brown [mailto:[EMAIL PROTECTED]
> *Sent:* Wednesday, April 23, 2008 12:04 PM
>
>
> *To:* MS-Exchange Admin Issues
>
> *Subject:* Re: Email Certificates
>
>
>
> Any way to set that up from my E2K3 domain to their Outlook client?  Their
> email is hosted by an ISP and is pop3. (@cox.net email address)??
>
> On Wed, Apr 23, 2008 at 12:06 PM, Troy Meyer <[EMAIL PROTECTED]>
> wrote:
>
> Jeff, if you mean simply making sure that the general internet cant see the
> messages and you aren't worried about encryption once they reach the other
> companies servers, it should be simple; assuming the other company's MTA
> will accept TLS encryption, you can create a new routing group connector to
> that domain and require TLS and that should encrypt all transport traffic
> between your locations (including BB traffic because all BB sending occurs
> through your exchange server).
>
>
>
> I haven't configured 2003 in a while, but I believe that should be all that
> is required.  Michael, Kevin, any input?
>
>
>
> -troy
>
>
>
>
>
> *From:* Jeff Brown [mailto:[EMAIL PROTECTED]
> *Sent:* Wednesday, April 23, 2008 9:57 AM
>
>
> *To:* MS-Exchange Admin Issues
>
> *Subject:* Re: Email Certificates
>
>
>
> Thank you very much.   I will look at that information as time allows.  We
> are running E2K3 and BES 4.1.  Main concern at the moment is that we find a
> way to send email from BB's to vendors OUTSIDE our network in a secure way
> that is readable by them.
>
> On Wed, Apr 23, 2008 at 11:30 AM, Troy Meyer <[EMAIL PROTECTED]>
> wrote:
>
> Hi Jeff,
>
>
>
> You really need to understand PKI with regards to how it works before you
> can really implement encryption.  I assume you are running some flavor of
> exchange and are looking to encrypt messages, have you looked at this:
>
>
>
> http://technet.microsoft.com/en-us/library/bb123466(EXCHG.65).aspx
>
> http://technet.microsoft.com/en-us/library/bb124155(EXCHG.65).aspx
>
>
>
>
>
> It references 2003, but SMIME/PKI is not largely different between
> applications or exchange versions.  From the sounds of your email I think
> you are confusing different types of encryption, eg:  yes you can use
> transport encryption with SSL certificates that are trusted by all
> platforms/browsers without interchanging keys (because in essence the public
> key has already been accepted), but if you are looking for message
> encryption, you will need USER certificates, which will still need to be
> accepted by clients.  So when you tell exchange to encrypt all outgoing
> email, you are encrypting the transport from Exchange to the other server,
> but you are NOT encrypting the message itself. (Yes you can tell Exchange to
> encrypt all outgoing, and yes you can tell Exchange to encrypt transport to
> only a specific domain.)
>
>
>
> So really it comes down to what exactly you are hoping to do, do you want
> full message encryption or simply to prevent sniffing of traffic on the open
> internet?
>
>
>
> As for blackberry, you can do both here as well.  If you are running this
> you can sign/encrypt individual messages using SMIME.
>
>
>
>
> http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB10199&sliceId=SAL_Public&dialogID=55761554&stateId=0%200%2055759922
>
>
>
> If you are running BES then your communication is encrypted until it comes
> back to your home exchange server, and then it will travel as a normal
> message (ie if you are encrypting outbound traffic it will travel over that
> tunnel, otherwise it becomes a plain text outbound.)
>
>
>
>
>
> Hope that helps, it's a lot of information, but security/PKI/SMIME
> deployments can be difficult if you don't break down exactly what you (and
> the business) want.
>
>
>
> -Troy
>
>
>
>
>
> *From:* Jeff Brown [mailto:[EMAIL PROTECTED]
> *Sent:* Wednesday, April 23, 2008 5:40 AM
> *To:* MS-Exchange Admin Issues
> *Subject:* Email Certificates
>
>
>
> I need help correcting filling in/correcting holes in my understanding of
> email certificates and how they work.
>
>
>
> I purchase a well known cert for my domain so that I can send encrypted
> email over the public domain.
>
>
>
> Because I laid out the money for this well known cert, I don't have to
> exchange certificates with folks outside my domain in order for them to read
> my encrypted email, right?
>
>
>
> In Outlook, there is a checkbox to encrypt outgoing email.  Is there a way
> on the org. level to say all mail sent to anyone @thisorg.com  outside my
> domain should always be encrypted?
>
>
>
> Because I paid the big bucks, can we just set it on the domain level to
> encrypt ALL outgoing email?
>
>
>
> Will this well known cert allow my BB users to send encrypted email to
> folks not in my org?
>
>
>
> TIA,  I really appreciate those of you who are able/willing to "educate"
> the poorly informed.
>
>
>
> Jeff
>
>
>
>
>
>
>

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~             http://www.sunbeltsoftware.com/Ninja                ~

Reply via email to