Threat Model - Simple SMTP
This threat assessment followed the Threat Model Process. Other Deployment Models have been similarly assessed and are cataloged on the Threat Models page.
Pre-Conditions:
All normal Direct Consensus Proposal - Assumptions are in play. Specific to this configuration:
- The Human/Organization that is sending the documents is responsible for verifying the address and obtaining the destination security keys. This is often done with a simple 'test' message that contains no sensitive data, but is confirmed as being correct through a direct phone call.
Benefits:
- No specialization (Direct) is needed. This configuration utilizes 100% off-the-shelf e-mail clients available today (wikipedia comparison of e-mail clientsshows that there is a subset of e-mail clients that support S/MIME but it is still a significant (~20) number).
- Does not mandate TLS, but does offer it as a point-to-point additional protection (also commonly available today).
- No PHI is exposed to any HISP
- e-Mail client 'sent' mail folder is archive of items Disclosed. Inspection of this folder can determine if an inappropriate exposure (non-secured PHI) has happened Note that hard drive folders can also be used to store any e-Mail attachments for tracking and access.
Drawbacks:
- This configuration requires that the Sender or Receiver maintain an e-mail client that has the capability to handle S/MIME, and the address book.
- This configuration is harder to automate inside an EHR/PHR workflow
- Use of Windows-MAPI interface can mitigate this problem
- Use of e-Mail toolkits that support the necessary functionality can mitigate this problem
Diagram:
The following diagram depicts the key components and arcs involved in this conversation:Arc 1 - Source e-Mail Client Looks up Keys based on Destination Direct Address
In this arc, the e-mail client uses the native address book of the e-mail client to retrieve the certificate of the destination address. The certificate is validated to assure it is whole, complete, has not expired and is not revoked. Because this arc occurs completely within the trusted boundaries of the Source, it is expected that the agent will be able to securely make this request using standard secure programming practices. We will not further model this arc in this document.
Arc 2 - Source e-Mail Client fetches locally-configured private keys and anchor certificates
In this arc, the e-Mail client queries a local configuration resource such as a database, file system or certificate store for the private keys and anchor certificates associated with the source address. Because this arc occurs completely within the trusted boundaries of the HISP, it is expected that the agent will be able to securely make this request using standard secure programming practices. We will not further model this arc in this document.
Arc 3 - Source e-Mail Client resolves Destination SMTP Server addresses
In Arc 3, the e-Mail Client queries its locally-configured DNS server for the MX records corresponding to the domain name of the destination address. The public DNS hierarchy is utilized, that is the configured DNS server forwards non-local MX requests through the distributed public DNS hierarchy.
Arc 4 - Source e-Mail Client sends encrypted/signed message to Destination SMTP Server
In this arc, the source e-Mail Client establishes an normal SMTP connection (non-secured) to the destination SMTP server. The encrypted message is sent over this channel using standard SMTP mechanisms.
Arc 5 - Destination e-Mail Client fetches message from Destination SMTP Server
In this arc, the destination client first establishes an normal (non-secured) POP3 or IMAP4 connection to its configured mail server. The client then sends standard requests to receive message headers and contents over this connection.
Arc 6 - Destination e-Mail client fetches locally-configured private keys and anchor certificates
In this arc, the e-Mail client queries a local configuration resource such as a database, file system or certificate store for the private keys and anchor certificates associated with the source address. Because this arc occurs completely within the trusted boundaries of the Destination, it is expected that the agent will be able to securely make this request using standard secure programming practices. We will not further model this arc in this document.
Arc 7 - Destination e-Mail client fetches and verifies public certificates for source address
Signature validation is done using the certificates embedded in the message itself, so these certificates do not need to be fetched. However, as the e-Mail client explores the certificates and issuing chain hierarchy searching for a configured anchor certificate, intermediate certificates may need to be fetched and in all cases revocation status must be determined.
Risk Assessment and Mitigation Plan
In the interests of keeping scope on the Risk Assessment: We assume good programming practices and good business operational practices. For example we do not include risks of poor protocol implementation that would expose buffer-overflows, or poor operational environment that allows sharing of accounts, key-loggers, and openly readable audit log files.
Risk Nunber |
Arc |
Risk |
Likelihood (L, M, H) |
Impact (L, M, H) |
Mitigation |
Notes |
---|---|---|---|---|---|---|
1 |
1 |
The user may send PHI and 'forget' to use S/MIME. |
H |
H |
Although the pre-conditions (Assumptions) sets this as a responsibility of the sender, it is exposed here explicitly as a reasonable accidental risk.
|
|
2 |
3 |
DNS can be spoofed to return an attacker’s IP addresses rather than the correct ones. This could cause messages to be sent to an attacker’s system. |
L |
L |
|
|
3 |
4/5 |
potential exposure of TO/FROM routing information (network, wireless, internet mailstop). Exposing that the addressee identified in the TO is having a private conversation with the addressee identified by the FROM.
|
L |
L |
Each Recipient is in control of who they provide their endpoint address to, and each Sender is in control of who they communicate with.
|
|
4 |
4/5 |
When User uses e-mail client - potential for user to place PHI into the subject field, even though we caution against it. The SUBJECT is not commonly protected by current off-the-shelf email systems. exposure of SUBJECT information (network, wireless, internet mail stop). Exposing what ever information is placed into the subject line.
|
M |
L |
Could MANDATE specific string be in the SUBJECT field - For Example: "Direct"
|
|
5 |
4 |
Denial-of-Service attack against a recipient that no longer receives messages that have been routed away from their SMTP server. |
L |
L |
|
|
6 |
4/5 |
An attacker intercepts message traffic (network, wireless, internet mailstop). |
L |
L |
The message content is encrypted and signed using S/MIME so no exposure of PHI. |
|
7 |
5 |
Interception of POP/IMAP authentication credentials through unsecured network (e.g. wireless) sniffing. Exposed credentials allows attacker to spoof the account. |
L |
L |
The message content is encrypted and signed using S/MIME so no exposure of PHI.
|
|
8 |
5 |
e-Mail is received that is not S/MIME protected |
M |
M |
|