Hi All,
Ok, Comodo SecureEmail uses public digital certificates which have an associate private key. It’s this private key (and the fact it stays ‘private’) that is the bit that makes everything secure.
The public certificate (only a template) and the private key are both generated on your PC when you sign up for a digital certificate. The public certificate template part is sent to Comodo servers to be turned into a ‘real’ certificate and signed by Comodo’s private key.
In the following scenarios, Alice is the sender, Bob is the recipient.
When Alice or Bob send a signed e-mail, their public key certificate is attached. The recipient can then verify who they are because their certificate was signed by Comodo.
Alice wants to send an e-mail and:
Scenario 1)
Alice already has Bob’s public key (received via a signed e-mail etc)
In this scenario, Alice encrypts (S/MIME) using Bob’s public key. The e-mail can be decrypted in any S/MIME compliant e-mail system like CSE, Outlook or Thunderbird.
Scenario 2)
Alice doesn’t know Bob’s e-mail certificate in advance.
(Alice chooses if the Web Reader can be used or not or turn off Web Reader access but we’ll deal with the Web Reader service when describing Bob’s actions)
In this scenario the situation is a little more complicated. Alice doesn’t have Bob’s public key certificate to encrypt for so CSE does this:
- It generates a Single-Use Certificate and private key for this 1 e-mail.
- CSE then encrypts the e-mail (S/MIME) and attaches this to an instruction e-mail and sends the e-mail to Bob.
- CSE then uses a Comodo secure server as a temporally storage location and uploads the session certificate pair, encrypted, over and secure connection.
At this point, Bob has the e-mail, Comodo have the temp session keys.
So on Bob’s side.
- Bob receives an e-mail which has the S/MIME encrypted e-mail attachment.
Bob now needs to decrypt the mail, his choices are:
- Bob has CSE, CSE decrypts automatically.
- Download Comodo SecureEmail.
- Forward the mail to the Web Reader service (if Alice has allowed this, if not, bob can’t decrypt via the Web Reader)
Ok, so let’s deal with these three choices below:
Bob already has CSE
- Bob already has an e-mail certificate and is using Comodo SecureEmail.
- Comodo SecureEmail contacts Comodo’s server to download the key over a secure connection. Comodo’s servers requires authentication via Bob’s real e-mail certificate (he must complete a private key operation based on industry standard SSL authentication) before the server will release the keys.
- If Bob’s authentication is successful then Comodo SecureEmail can decrypt the message and allow it to pass into Bob’s inbox.
- Bob’s CSE can also send back his ‘real’ e-mail certificate to Alice. This is now a very neat key exchange process.
- From this point on Alice can encrypt straight to Bob.
- The result it Bob receives the mail smoothly and automatically and doesn’t even know what Alice didn’t have his key in advance. Alice’s records are now updated too.
Bob download’s Comodo SecureEmail.
- Comodo SecureEmail requires that Bob has an e-mail certificate for the address Alice e-mailed to before downloading the keys.
- Comodo SecureEmail contacts Comodo’s server to download the key over a secure connection. Comodo’s servers requires authentication via Bob’s real e-mail certificate (he must complete a private key operation based on industry standard SSL authentication) before the server will release the keys.
- If Bob’s authentication is successful then Comodo SecureEmail can decrypt the message and allow it to pass into Bob’s inbox.
- Bob’s CSE can also send back his ‘real’ e-mail certificate to Alice. This is now a very neat key exchange process.
- From this point on Alice can encrypt straight to Bob.
Bob chooses to forward the mail to the Web Reader service
- The server first checks if Alice has allowed Bob to read this mail via the Web Reader, if Alice has disallowed it, the server sends a rejection mail to Bob.
- If allowed, the server returns a unique URL to Bob to read the mail.
- Bob navigates to the URL over HTTPS where the server then checks if Alice has required Bob to enter a password (pre-agreed between Alice and Bob).
- Bob may or may not enter a password dependant upon Alice’s choice. The mail is then decrypted and shown to Bob in his web browser.
Hope this answers everyone’s questions.
Regards,
Shane.