I agree with Thomas on this. If someone is spying on the server, any past and future emails can be stolen. In case all incoming mails are PGP-encrypted on the server, future emails can still be stolen, but atleast any past correspondence is secure.
Yannik Am 03.06.2015 um 03:50 schrieb Sebastian Nielsen: > Thats why its important to define which security goal your setup has. > > If you really want to PGP-encrypt your mails at receive, you can do it > with Ciphermail: > https://www.ciphermail.com/ > Ciphermail is implemented as a SMTP proxy, so you just feed postfix's > smtp-client into ciphermail and then have a localhost-only listening > smtpd which delivers to local storage. > > But to your points: > 1: If your WM is remotely manageable via SSH, you will also have > access to its "boot" over SSH/IPMI or whatever remote interface your > hosting company uses. > 2: Yes agree. But one thing to consider, is that if you have hosting > with VM's or VPS:es, its common that they make a backup of your > machine, eg they backup your machine as-is. This means that when your > hosting company takes the backup, it will still be encrypted. > Eg, even if they take the backup while the machine is in running > state, it will still be a backup of the "offline image" of machine, > which will represent how the machine will look if it was turned off > and then turned on right now, since LUKS never write plaintext to the > disk drive. RAM contents of the VM is usually not written to disk or > backuped at all since it can contain sensitive data. > 3: Yes thats true. But that is true for any non-encrypted mail that is > received on your server, since they could, if they were dishonest, tap > the mail from the RAM of the server, like they could with the LUKS > key. No on-server encryption is going to solve if your hosting company > is rogue. > In your first mail, you described the hosting company for being > untrusted because they were reckless and unresponsible with backups > and copies of offline-data that could linger around in the datacenter > and fall into the wrong hands. > > If the hosting company is completely untrusted with not just > lazy/reckless employees, insead just dishonest employees that could > itself be rogue, theres only 2 options: > A: Encrypt the mail before it reach the hosting company. For example > receiving mails in a another server, encrypting them with ciphermail > and then forwarding the encrypted mails to the hosting company. > B: Change hosting company to a more trusted one. > > -----Ursprungligt meddelande----- From: Thomas Keller > Sent: Wednesday, June 03, 2015 1:32 AM > To: postfix-users@postfix.org > Subject: Re: encrypt incoming emails with my public gpg key > > On 2015-06-03 01:16, Sebastian Nielsen wrote: > >> If you only are worried by backups or other copies that might come in >> the wrong hands, and not someone directly accessing the server, I would >> suggest setting up a encrypted storage in the server. Since VPS/VM in >> many times give you root access, you could easily set your virtual >> machine to be encrypted with LUKS, and then you have to type a password >> each time the VM boot. > > using LUKS has some disadvantages here: > 1) somebody has to type remotely the password every time the machine > boots. This is very impractical > > 2) LUKS is only effective when the machine is turned off. Once LUKS is > mounted (decrypted) data can be read and encryption key recovered > > 3) if ever, somebody gains access to the decryption key (see 2) all > emails ever received are accessible. > > Besides, for the sake of argument, we can assume that I already have > LUKS, but want to have another layer. These two things are not mutually > exlusive.