Jason Palmer, CPA, CITP

Cyber Insurance Auditing

  • Home
  • Blog
  • Services
    • Break/Fix
    • Network Infrastructure
    • Installation
    • Web Hosting
    • Web Applications
  • Consulting
  • Vendors
  • U.S. Federal Courts
  • About Us
  • Contact Us
  • Product Showcases
You are here: Home / Archives for ssl

Internet Email is NOT Secure even with SSL/TLS Engaged

August 22, 2012 By Jason Palmer Leave a Comment

WebMailThe first rule of using email is to NEVER put anything in an email message that you would not want published on the cover of the New York Times or for the entire world to know.

Many Web Mail providers make a big deal of giving you the option of using HTTPS (Secure HTTP Web Access) instead of HTTP (Standard Web Access) to your email account.  When you type HTTPS://mail.some-provider.com, if properly supported, you definitely engage an SSL (Secure Socket Layer) Certificate that fully encrypts every keystroke you type and every thing that you view.  It is a secure connection between your computer and the web email provider.

The problem and major misunderstanding is that only thing “secure” is the connection between your computer and your email provider.  Once you type an email message and press the SEND button, your message goes out in to the wild Internet in “clear text” just like the text on this web page.  A message sent in clear text can be read at any point during its’ journey from your email provider to the recipients email provider.  From a practical standpoint, even though your email message may pass through a number of Mail Servers on its’ way to the recipient, the likelihood that it will be intercepted is remote.  Most email messages “travel time” from sender to recipient is a matter of seconds.

You may be thinking, “But I am sending from my Gmail account to another user on Gmail.  Why is that message not secure?”  Again, even though both the sender (you) and the recipient may have a secure HTTPS:// connection to Gmail, the message will be transported in “clear text” as it moves either between the various Gmail Servers and Mail Accounts.

The exposure to prying eyes is significantly reduced when sending to and from the SAME domain name such as user1@gmail.com to user2@gmail.com as the message never leaves the Internet Providers Network.  However, remember the message is still in “clear text” and can be easily read by a System Administrator or anyone else who may have access to the message during its’ journey.  Realize extremely large Internet Providers have many email servers in many locations and most have secure connections between their locations but some use the Public Internet instead.

There is an exception to the above:  If you are using a Corporate Email Server such as Microsoft Exchange or Lotus Notes and are sending intra-company mail, that is mail that is to and from other users in your organization with the SAME domain name, i.e. user1@palmer.net and user2@palmer.net, then all mail will be 100% secure.  This is because there is either a secure HTTPS:// (SSL) or TLS (Transport Layer Security) protocol engaged between your email client, Microsoft Outlook, and the Microsoft Exchange Mail Server and all email is stored in encrypted format in the Microsoft Exchange Mail Database.  The same holds true for Lotus Notes.  (Caveat:  Although usually configured to be “secure” by default, in some cases, Microsoft Outlook or Outlook Web Access may have been configured to use a standard non-encrypted connection instead of a secure one.  Check with your Corporate IT person to confirm.)

Keep in mind that both the Government and Criminals may have “sniffers” setup at various points on the Internet.  This allows the snooper to view every single data packet, like the ones containing your email message, and read it.

With the trillions and trillions of data packets and email messages moving across the global Internet daily, the risk that your specific email message containing sensitive or confidential information will be intercepted is remote but the potential is very real.

Using a secure connection to your email provider is not enough.  If you or your Company are the specific target of a Government Agency or Hacker, the only solution is to properly encrypt your message.  Otherwise, the contents of that document or the photo attached might just make the cover of the New York Times.

[A future article will discuss options for encrypting email messages.]

Filed Under: Security, Tech in Plain English Tagged With: Corporate Email, Email Encryption, Email Security, Gmail, Internet Provider, Lotus Notes, Microsoft Exchange, Secure, Secure Connection, Secure Http, ssl, The New York Times, TLS, Transport Layer Security, Web Mail, Webmail

VMWare vCenter Converter StandAlone 5.0 Slow Transfer Rate

June 11, 2012 By Jason Palmer 8 Comments

VMware vCenter Converter Standalone LogoVMWare by default enables SSL encryption during the Physical to Virtual (P2V) and Virtual to Virtual (V2V) conversion process.  This has the effect of bringing the transfer rate to a crawl of as low as 200kbs instead of the expected 40mbs or better.

The problem is a VMware proprietary protocol called NFC that is used to create the source image and encrypt the data during the transfer process.

The SSL feature of the NFC VMware proprietary protocol can be disabled in a file called:

converter-worker.xml

located in one of the following places depending on the Operating System:

Windows Vista, Windows 7, Windows 2008
%ALLUSERSPROFILE%\VMware\VMware vCenter Converter Standalone

Windows XP, Windows 2003, Windows 2000
%ALLUSERSPROFILE%\Application Data\VMware\VMware vCenter Converter Standalone

Find this section of code and change the highlighted TRUE to FALSE.

<nfc>
<readTimeoutMs>120000</readTimeoutMs>
<useSsl>true</useSsl>
<!– Delay is specified in milliseconds, -1 denotes the default.
<acceptTimeoutMs>-1</acceptTimeoutMs>
<requestTimeoutMs>-1</requestTimeoutMs>
<readTimeoutMs>-1</readTimeoutMs>
<writeTimeoutMs>-1</writeTimeoutMs>
<fssrvrReqTimeoutMs>-1</fssrvrReqTimeoutMs>
<fssrvrWriteTimeoutMs>-1</fssrvrWriteTimeoutMs>
–>
</nfc>

—–

Should be:
<useSsl>false</useSsl>

 

It is CRITICAL that the “VMware vCenter Converter Standalone Worker” Service be restarted.  DO NOT FORGET THIS STEP!

 

 

 

Filed Under: Virtualization Tagged With: nfc protocol, physical to virtual, slow transfer rate, ssl, standalone converter, transfer rate, virtualization, vmware

Connect

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Categories

  • ACT! Premium CRM
  • Cloud
  • Commentary
  • Consulting
  • Disaster Planning
  • Google Apps
  • Management Consulting
  • Networking
  • Office365
  • Printer Issues
  • Security
  • Tech in Plain English
  • Tech Tips
  • Virtualization
  • Wordpress

The Tweetisphere

  • Just now
  • https://twitter.com/palmercomputer

Pages

  • About Us
  • Blog
  • Break/Fix
  • Consulting
  • Contact Us
  • Cyber Insurance Auditing
  • Installation
  • Network Infrastructure
  • Product Showcases
    • Brocade Product Showcase
    • Cisco Product Showcase
    • EMC Product Showcase
    • Emerson Product Showcase
    • IBM Product Showcase
    • Intel Product Showcase
    • Juniper Product Showcase
    • Veeam Product Information
    • VMWare Product Showcase
    • Xerox Office Products
  • U.S. Federal Courts
  • Vendor List
  • Web Applications
  • Web Hosting

Copyright © 2025 · Log in