Chapter 8. Protecting Email

Email is a terrific medium for communication, but it's neither private nor secure. For example, did you know that:

  • Each message you send may pass through many other machines en route to its intended recipient?

  • Even on the recipient's computer, other users (particularly superusers) can conceivably read your messages as they sit on disk?

  • Messages traveling over a traditional POP or IMAP connection can be captured and read in transit by third parties?

In this chapter, we provide recipes to secure different segments of the email trail:

From sender to recipient

Secure your email messages, using encryption and signing

Between mail client and mail server

Protect your mail session, using secure IMAP, secure POP, or tunneling

At the mail server

Avoid exposing a public mail server, using fetchmail or SMTP authentication

We assume that you have already created a GnuPG key pair (private and public) on your GnuPG keyring, a prerequisite for many recipes in this chapter. [Recipe 7.6]



Linux Security Cookbook
Linux Security Cookbook
ISBN: 0596003919
EAN: 2147483647
Year: 2006
Pages: 247

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net