22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.3 Summary<br />

280 Lotus Security Handbook<br />

Receiving signed S/MIME messages<br />

Upon receipt of signed e-mail, Notes will try to verify the validity of the signature.<br />

If the user trusts the signing certificate, that is, if the user has a certificate of the<br />

signer or an Internet cross-certificate to the sender, a message will be displayed<br />

in the Notes client’s status bar indicating the validity of the signature, an example<br />

of which is the following:<br />

"Signed By: Bob, at 10:52 AM, According To: TestCertAuthority".<br />

If the user doesn’t trust the signing certificate, the user will receive a prompt to<br />

create an Internet cross-certificate on demand. The user can select the subject<br />

name of the certificate in the message that the user wishes to trust.<br />

Note: Signed S/MIME messages contain the certificate chain of sender and<br />

signers. The resulting Internet cross-certificate is stored in the receiver's<br />

Personal Address Book. By creating the cross-certificate, the user is asserting<br />

that he or she trusts a certificate contained in the S/MIME signed message.<br />

Signature verification can then proceed.<br />

Finally, it is also possible for the user to manually store the sender's address and<br />

X.509 certificates to his or her Personal Address Book. When viewing S/MIME<br />

signed mail, the user should select the Actions → Tools → Add Sender to<br />

Address Book menu options. It’s important to note here that this certificate is<br />

not an Internet cross-certificate, meaning it is not used when sending or receiving<br />

signed S/MIME e-mails, it is used to encrypt messages from the user to the<br />

sender.<br />

While the Internet permits individuals and organizations to communicate like<br />

never before, at the same time, the single greatest problem with the Internet has<br />

been, and still is, the problem of “who can be trusted?”<br />

This chapter showed the role that public key infrastructures can play in<br />

establishing this trust and ensuring its integrity. This is done through the use of<br />

X.509 certificates in conjunction with established protocols (for example, SSL)<br />

and in conjunction with established messaging standards (for example, S/MIME).<br />

As well, this chapter showed how support for X.509 certificates is implemented in<br />

Notes and Domino and how certificates are requested, approved, generated, and<br />

installed in a Notes and Domino infrastructure.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!