+ All Categories
Home > Documents > Policy Considerations Phill Hallam Baker. We have a choice.

Policy Considerations Phill Hallam Baker. We have a choice.

Date post: 18-Jan-2016
Category:
Upload: sophia-stewart
View: 214 times
Download: 1 times
Share this document with a friend
Popular Tags:
19
Policy Considerations Phill Hallam Baker
Transcript
Page 1: Policy Considerations Phill Hallam Baker. We have a choice.

Policy Considerations

Phill Hallam Baker

Page 2: Policy Considerations Phill Hallam Baker. We have a choice.

We have a choice

Page 3: Policy Considerations Phill Hallam Baker. We have a choice.

Choice 1

Page 4: Policy Considerations Phill Hallam Baker. We have a choice.

If it works don’t break it

Page 5: Policy Considerations Phill Hallam Baker. We have a choice.

Choice 2

Page 6: Policy Considerations Phill Hallam Baker. We have a choice.

Do the job right

Page 7: Policy Considerations Phill Hallam Baker. We have a choice.

An Architecture

Page 8: Policy Considerations Phill Hallam Baker. We have a choice.

A master plan

Page 9: Policy Considerations Phill Hallam Baker. We have a choice.

If we have to change• Layered Architecture

• Reusable Policy Statements

• Reusable discovery strategy

Page 10: Policy Considerations Phill Hallam Baker. We have a choice.

You can’t have securitywithout security policy

Page 11: Policy Considerations Phill Hallam Baker. We have a choice.

SSL

• Should I use security?

• HTTPS://

Page 12: Policy Considerations Phill Hallam Baker. We have a choice.

S/MIME, PGP

• No policy layer

• Authentication has limited use

Page 13: Policy Considerations Phill Hallam Baker. We have a choice.

STARTTLS

• The best email encryption we have

• Should be used 100%

• Vulnerable to a downgrade attack

Page 14: Policy Considerations Phill Hallam Baker. We have a choice.

We can fix discovery

Without changing the DNS infrastructure

Or waiting for it to change

Page 15: Policy Considerations Phill Hallam Baker. We have a choice.

Three step discovery1) policy = lookup (TXT, "_dkim.alice.example.com")

IF policy <> NULL THEN RETURN policy

2) pointer = lookup (PTR, “alice.example.com")IF pointer == NULL THEN RETURN NULL

3) policy = lookup (TXT, "_dkim." + pointer)return policy

To specify a wildcard use:*.example.com PTR _default.example.com

Page 16: Policy Considerations Phill Hallam Baker. We have a choice.

Choice 1 is best

Page 17: Policy Considerations Phill Hallam Baker. We have a choice.

Don’t boil the ocean

Page 18: Policy Considerations Phill Hallam Baker. We have a choice.

Unless we have to

Page 19: Policy Considerations Phill Hallam Baker. We have a choice.

Don’t end up with


Recommended