BB Security Exchange Technical WP
BB Security Exchange Technical WP
BlackBerry™ Security
2. ARCHITECTURE................................................................................................................................. 2
4. TECHNICAL OVERVIEW.................................................................................................................. 4
Notice: While every effort has been made to ensure technical accuracy, information in this document is subject to change without notice and does not represent a commitment on
the part of Research In Motion Limited.
Introduction
1. Introduction
This document explores the security of the BlackBerry™ wireless email solution and describes how
corporate information stays secure even while transmitted over a wireless network to the BlackBerry
Wireless Handheld™.
BlackBerry is a leading wireless email solution for mobile professionals. It is an innovation in simplicity
for the user since it instantly provides a secure, continuous wireless link between the desktop and the
handheld.
The BlackBerry Enterprise Server provides a secure, two-way link between the user’s Microsoft Exchange
account and the user’s BlackBerry Wireless Handheld. The BlackBerry Enterprise Server should be
considered a conduit, rather than a mail server or a message repository. The Microsoft Exchange Server’s
message store is the only place a secure copy of the data is kept. Since it maintains a link to the messages in
the user’s Microsoft Exchange Inbox, the BlackBerry Enterprise Server has the following advanced
features:
• After the first 2K of a message is delivered to the handheld, the user is able to request more of the
message, delivered in 2K packets, up to a maximum of 32K.
• When “replying with text” from the handheld, the BlackBerry software appends the entire original
message to the reply, not just the 2K that was sent to the handheld.
• When forwarding a message from the handheld, the BlackBerry software forwards the entire original
message including all attachments.
2. Architecture
An overview of the system architecture for the BlackBerry Enterprise Server is provided in Figure 1. At
the heart of this wireless email solution is the BlackBerry Enterprise Server (B). It uses the Microsoft
Exchange Server’s storage (C) for keeping unique information for each user, including security
information, specialized forwarding rules and handheld identification.
Each user configures their own filter rules and encryption key information in the BlackBerry Desktop
Manager, which runs on their own desktop (A). The BlackBerry Desktop Manager stores the configuration
information in hidden folders in the user’s Microsoft Exchange message store (C). The BlackBerry
Enterprise Server also stores redirection statistics in the same location, so that either the desktop user or the
IT department can view the statistics to determine if a given handheld is working correctly.
The BlackBerry Enterprise Server maintains a constant direct TCP/IP level connection (Server Routing
Protocol or SRP) to the wireless network (E). A configuration change is required at the firewall (F) to
allow an outbound-initiated connection on port 3101 using TCP. This is not a “hole” in the firewall
because only an outbound connection is required.
Information is encrypted and decrypted by the BlackBerry Enterprise Server as well as on the user’s
BlackBerry Wireless Handheld. Assuming the company’s server is secure within their building, the only
two places the information is accessible within the BlackBerry solution are on the handheld and at the
company (i.e. the user’s desktop).
A B
User’s Desktop BlackBerry
Enterprise
Server
C D E
User Accounts SMTP Direct TCP/IP
- Mailbox Storage Connection Connection
- Encryption Keys
- Filter Rules
- Redirection Stats Microsoft
Exchange Server
BlackBerry F
Wireless Internet
Handheld Firewall or
Proxy Server
Wireless Network
3. Firewall Security
The BlackBerry Enterprise Server maintains a constant direct TCP/IP level connection to the wireless
network. To do this, it requires a configuration change at the firewall to allow an outgoing connection on
port 3101. This is an outbound-initiated connection initiated by the BlackBerry Enterprise Server.
To establish this connection, the BlackBerry Enterprise Server contacts the wireless network. If the
authentication parameters are false, authentication will fail and the connection will not be established.
Once the connection is established, it remains a persistent session created for communication only between
the BlackBerry Enterprise Server and the wireless network to the BlackBerry Wireless Handheld.
Outbound traffic from the BlackBerry Enterprise Server has no destination other than the BlackBerry
Wireless Handheld through the wireless network. Any inbound traffic to the BlackBerry Enterprise Server
from any other destination will be discarded.
Many IT departments are uncomfortable about making firewall configuration changes. The connection
through port 3101 is completely secure.
• The connection to the wireless network is outbound-initiated by the BlackBerry Enterprise Server
and must be authenticated. No inbound traffic is permitted from any other source host.
• The BlackBerry Enterprise Server is only a redirector of messages to and from Microsoft
Exchange: it stores no messages and therefore has no access to messaging or corporate
information of any kind.
• All messaging traffic between the BlackBerry Enterprise Server and the user’s wireless handheld
is encrypted using Triple-DES encryption. All messages remain encrypted along the entire path
from source to destination. There is no staging location where the message is decrypted and
encrypted again. All communications between the BlackBerry Enterprise Server and the wireless
network are fully protected from unwanted third parties.
• The BlackBerry Enterprise Server itself runs as a service under Windows NT®. The service will
only accept data that it can decrypt using a valid encryption key. No communication of any kind
can occur between the BlackBerry Enterprise Server and Microsoft Exchange unless this condition
is met. As a result, as only the server has a valid encryption key, no commands will be accepted
from any outside source.
4. Technical Overview
The BlackBerry Wireless Handheld gives users mobile access to messaging and personal organizer
information located on their desktop computers. The security system is intended to ensure that the
information exchanged between the handheld and the desktop computer or company LAN occurs without
compromising the confidentiality of that information.
Handheld Desktop
2. Securing the Wireless Link: The information travelling on the link between the handheld and the
desktop or company LAN should not be retrievable by an unauthorized third party. A Virtual Private
Network (VPN) should effectively connect the handheld to the desktop.
3. Minimal user impact: The user should not be inconvenienced by the presence of the security
system.
The handheld rejects weak passwords, such as those composed of identical characters or those that consist
of a natural sequence (i.e. 1, 2, 3, 4, etc.). With the password set, a screen saver appears after a set period of
inactivity; the screen saver can be customized to display contact information. Once the password is in
place, there is a lock function available that causes the immediate appearance of the screen saver. When the
screen saver appears, access to data on the handheld, through both the keyboard and the serial port, is
prevented until the user enters the correct password. If an incorrect password is entered ten consecutive
times, all user-specific data on the handheld is cleared.
The password itself is protected by storing only an SHA-1 hash of the password on the handheld. This
ensures that even if someone had the contents of the memory, it would not be possible to determine the
password. When the user enters the password, the handheld performs a one-way hash of the entered
characters using SHA-1, and then compares the hashed input to the stored hashed password.
Security-conscious companies will value this added feature. Using the password ensures that users always
require at least two pieces of security to access their corporate email. In this case, they physically have the
security of the handheld as well as the knowledge of a private password.
Security is derived from an encryption key shared by the handheld and the desktop. The key used by the
handheld is generated on the desktop by extracting random information from mouse movements then
hashing the collected random bits. The key is then exchanged with the handheld through a port connection.
This exchange can only be done once so that the key is available in two places: on the desktop and on the
handheld. The advantage of this symmetric key encryption system using a secure key exchange is that the
encrypted data exchanged between the handheld and the desktop is guaranteed to be confidential and
authenticated since it comes from a source holding the shared key.
Once this key has been generated, a copy of it is stored in Microsoft Exchange and the other copy is stored
on the handheld. For messaging to occur, these keys must match at both the server and the handheld, or the
message is discarded.
In the BlackBerry solution, information transferred between the handheld and the desktop or company
LAN is not decrypted at any intermediate point. This means that only the desktop and handheld user have
access to the information sent between them. In particular, it means that the service provider does not have
access to any potentially sensitive company information.
Since the exchange of the symmetric key is allowed only when the handheld is plugged into the user’s
desktop there is an authenticated link for exchanging the key. This authenticated link creates an
unbreakable bond, assuming the user’s desktop is in a secure area. Users are also encouraged to use a
password protected screen saver to ensure their desktops are secure.
1
Distributed.net, a coalition of computer enthusiasts, was able to work as a connected worldwide computing team and decipher a
message encrypted with the Single-DES algorithm in 22 hours and 15 minutes. As an illustration of the power of Triple-DES,
consider the following example: according to experts, if Single-DES could be broken in one second, it would still take over 1 billion
years to crack Triple-DES.
To ensure the email forwarded from a desktop to the Internet is encrypted, users and IT departments must
use another solution, such as installing a secure Internet mail system like PGP or using S/MIME.
Suggestions to enhance desktop security are included later in this document to assist non-technical users.
Handheld-to-desktop: When the handheld transmits a message, the message is encrypted and then
sent to the wireless network. The network forwards the encrypted message across the Internet to the
user’s corporate email mailbox associated with the handheld. The BlackBerry software decrypts the
message and then displays it on the user’s desktop, in the Sent Items folder, in its original form.
Note To keep your information secure, it is recommended that this key be changed once a month. By
default, the BlackBerry Desktop Manager generates a new key each month.
Since most of the information is originally from the desktop personal organizer, the real owner of the
handheld can resynchronize all information when the handheld is plugged back into their desktop.
10. Glossary
BlackBerry Desktop Software
The software that includes the four tools (Application Loader, Intellisync™, Backup/Restore, and
Redirector Configuration) as well as the first screen that appears when the desktop software is launched.
Decryption
The process of restoring encrypted data to its original form.
Encryption
The process of encoding data to prevent unauthorized access, especially during its transmission. The data is
encoded using a key (akin to a password).
Key
The secret data used to encrypt or decrypt data.
One-way Hash
The programmatically irreversible, yet reproducible, mangling of data. For example, if the passwords on a
system are hashed, then whenever a user attempts to enter a password it can be hashed and the result
compared to the stored value. Given the hashed password, it is unfeasible for anyone to compute the
original password.
SHA-1
A U.S. government approved one-way hash algorithm.
Single-DES
The Single-Data Encryption Standard is a U.S. government standard symmetric-key encryption method that
provides an almost unlimited number of ways to encrypt documentation.
Triple-DES
A U.S. government approved symmetric key encryption algorithm that requires the generation and use of
three keys. It is by far the most thoroughly tested encryption algorithm. No successful invasions on this
encryption method have been found.