SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
.



                           French Ministry of Defense - DGA
                                 Laurent CAILLEUX




MINISTÈRE DE LA DÉFENSE
                          DGA MI               2010           Diapositive N°1
Introduction


                          Why Trustedbird ?
                          What is Trustedbird ?
                          Services provided by Trustedbird
                          Demonstration
                          Conclusion




MINISTÈRE DE LA DÉFENSE
                                DGA MI        2010     Diapositive N°2
Why Trustedbird ?


                          Main goals
                            Initiate an open source community
                            Mail client for the military, industry,
                            administration and civilian environments
                          PEA Project (PEA COMLL)
                          Participants




MINISTÈRE DE LA DÉFENSE
                                DGA MI           2010        Diapositive N°3
What is Trustedbird ?

                   Trustedbird is a secure mail client
                   TrustedBird is based on Thunderbird
                   Trustedbird is open source
                   All modules are distributed under free software
                   licenses
                          MPL version 1.1+,
                          GPL version 2+
                          LGPL version 2.1+
                   Trustedbird is cross platform
                   Trustedbird is based on
                          Open standards
                          IETF Standards (RFC)

MINISTÈRE DE LA DÉFENSE
                                  DGA MI         2010     Diapositive N°4
TrustedBird - roadmap

                          Start of project (2006)
                            State of the art
                            Definition of technical and functionnal scope
                            Validation of the military requirements
                          Study of messaging clients
                              Mozilla Thunderbird
                          Study of different types of licenses
                              MPL 1.1+, GPL 2+, LGPL 2.1+
                          On january 2007, first developments



MINISTÈRE DE LA DÉFENSE
                                 DGA MI             2010      Diapositive N°5
TrustedBird - roadmap

                          First release on may 2007, version 0.1
                            Mail client, MDN, DSN, basic functionality
                              Milimail
                          Second release on july 2008, version
                          provided with security extensions
                          On march 2009
                              TrustedBird
                            Specifications of the latest features
                          On october 2010, final release



MINISTÈRE DE LA DÉFENSE
                                 DGA MI            2010        Diapositive N°6
Services provided by Trustedbird

                          2 modes of development:
                            Patchs
                            Add-ons
                          Services
                            Security services
                                 Security label
                                 request receipts
                                 SASL external
                                 Secure headers
                            Directory services (Multi LDAP, Directory contact tabs …)
                            Notification services (DSN, MDN with deletion receipt)
                            Advanced format services (XIMF)
                            Others services



MINISTÈRE DE LA DÉFENSE
                                     DGA MI             2010          Diapositive N°7
Services provided by TrustedBird –
                          Secure headers

                          Secure headers
                            Extension of S/MIME
                            Work of DGA MI


                               Headers
   Signature of
    body part
                                            and headers
                                Body           fields

                              Signature

                           SMIME + Secure
                              headers




MINISTÈRE DE LA DÉFENSE
                                   DGA MI                 2010   Diapositive N°8
Services provided by TrustedBird - XIMF


            eXtended Internet Message Format
            XIMF = Engine + instance(s)
            XIMF instance = Exchange format + forms
            XML
            technology             Use of customs forms




                                         Instances   Engine                           Instances   Engine



                                                                 XIMF message


                                              Sender                                      Recipient



MINISTÈRE DE LA DÉFENSE
                                DGA MI                        2010              Diapositive N°9
Services provided by TrustedBird - XIMF


                             Custom header fields
                             Use of XIMF and secure headers
                             Work of DGA MI
                          From: Org1 <Org1@example.fr>                From: Org1 <Org1@example.fr>
                          To: Org2 <Org2@example.fr>                  To: Org2 <Org2@example.fr>
                          Subject: Ceci concerne le projet Theos      Subject: Ceci concerne le projet Theos
                          Date: Thu, 22 Oct 2009 17:01:28 +0200       Date: Thu, 22 Oct 2009 17:01:28 +0200
                          Message-ID: <FDA72FF60379E588@example.fr>   Message-ID: <FDA72FF60379E588@example.fr>
                                                                      X-XIMF-Version: 2.0
                          Pouvez vous, SVP, ……..                      X-XIMF-Instance: Ent1V1
                          .                                           X-XIMF-Primary-Precedence: priority
                                                                      X-XIMF-Correspondence-Type: official
                                                                      X-XIMF-Security-Policy-Identifier: 1.3.28.0.0.5.1
                                                                      X-XIMF-Security-Classification: CONFIDENTIAL
                                                                      X-XIMF-Project: THEOS
                                                                      X-XIMF-Attribution-Key-Word: PROJECT

                                                                      Pouvez vous, SVP, ……..
                                                                      .


                                       IMF message                                  XIMF message

MINISTÈRE DE LA DÉFENSE
                                               DGA MI                 2010                       Diapositive N°10
Demonstration

                          Demonstration environment        Windows client
                                                           Windows client    Virtualized Linux server
                                                                             Virtualized Linux server

                                                                             Postfix
                                                                             Postfix
                          Trustedbird 3.1.5                                  Cyrus IMAP
                                                                             Cyrus IMAP
                                                                             OpenLDAP
                                                                             OpenLDAP
                                                                             OpenSSL
                                                                             OpenSSL
                            S/MIME signature
                            Secure headers                 Trustedbird 3.1
                                                           Trustedbird 3.1
                            XIMF,
                            Multi LDAP
                          Thunderbird 3.1.5
                          Scenarios
                            signed message and verification
                            signed message with secure headers
                            signed XIMF message with secure headers
                            Access to multiple LDAP servers


MINISTÈRE DE LA DÉFENSE
                                 DGA MI             2010             Diapositive N°11
MINISTÈRE DE LA DÉFENSE
                          DGA MI   2010   Diapositive N°12
Conclusion and future


                          Concept of toolbox
                          Feedback of open source community management
                          Trustedbird will be the messaging client of several
                          french MoD systems
                          Integration of patchs in the future release of
                          Thunderbird (if possible) to avoid a fork
                          Some components are already used in ministries
                          Companies integrate TrustedBird in their solutions


                            http://www.trustedbird.org
MINISTÈRE DE LA DÉFENSE
                                   DGA MI           2010        Diapositive N°13
Thank you for your attention
                                  Questions




MINISTÈRE DE LA DÉFENSE
                               DGA MI    2010   Diapositive N°14

Más contenido relacionado

Destacado

Colonel转码集群
Colonel转码集群Colonel转码集群
Colonel转码集群
pluschen
 
Iterative methods for the solution of systems of linear equations
Iterative methods for the solution of systems of linear equationsIterative methods for the solution of systems of linear equations
Iterative methods for the solution of systems of linear equations
NORAIMA
 
Direct methods for the solution of systems of linear equations
Direct methods for the solution of systems of linear equationsDirect methods for the solution of systems of linear equations
Direct methods for the solution of systems of linear equations
NORAIMA
 
Integrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appIntegrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine app
EPM Live
 
Matrices
MatricesMatrices
Matrices
NORAIMA
 
Disney Effects: Building web/mobile castle in OpenGL 2D & 3D
Disney Effects: Building web/mobile castle in OpenGL 2D & 3DDisney Effects: Building web/mobile castle in OpenGL 2D & 3D
Disney Effects: Building web/mobile castle in OpenGL 2D & 3D
SVWB
 
The way of the stars
The way of the starsThe way of the stars
The way of the stars
mayadez
 

Destacado (20)

Colonel转码集群
Colonel转码集群Colonel转码集群
Colonel转码集群
 
Iterative methods for the solution of systems of linear equations
Iterative methods for the solution of systems of linear equationsIterative methods for the solution of systems of linear equations
Iterative methods for the solution of systems of linear equations
 
NYC Energy Benchmarking Checklist
NYC Energy Benchmarking ChecklistNYC Energy Benchmarking Checklist
NYC Energy Benchmarking Checklist
 
HP Fossology v5.3
HP Fossology v5.3HP Fossology v5.3
HP Fossology v5.3
 
Berkah dan Kutukan Dimona
Berkah dan Kutukan DimonaBerkah dan Kutukan Dimona
Berkah dan Kutukan Dimona
 
Mw kenalan
Mw kenalanMw kenalan
Mw kenalan
 
Applying Business Process Principles To Information Design
Applying Business Process Principles To Information DesignApplying Business Process Principles To Information Design
Applying Business Process Principles To Information Design
 
Direct methods for the solution of systems of linear equations
Direct methods for the solution of systems of linear equationsDirect methods for the solution of systems of linear equations
Direct methods for the solution of systems of linear equations
 
Integrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appIntegrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine app
 
Matrices
MatricesMatrices
Matrices
 
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
 
Disney Effects: Building web/mobile castle in OpenGL 2D & 3D
Disney Effects: Building web/mobile castle in OpenGL 2D & 3DDisney Effects: Building web/mobile castle in OpenGL 2D & 3D
Disney Effects: Building web/mobile castle in OpenGL 2D & 3D
 
Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교
 
The way of the stars
The way of the starsThe way of the stars
The way of the stars
 
CloudSpurt customer
CloudSpurt customerCloudSpurt customer
CloudSpurt customer
 
Ricardo sarmiento busqueda_portafolio
Ricardo sarmiento busqueda_portafolioRicardo sarmiento busqueda_portafolio
Ricardo sarmiento busqueda_portafolio
 
Ricardo sarmiento _rea_mexico x_tec
Ricardo sarmiento _rea_mexico x_tecRicardo sarmiento _rea_mexico x_tec
Ricardo sarmiento _rea_mexico x_tec
 
搜索引擎原理略览
搜索引擎原理略览搜索引擎原理略览
搜索引擎原理略览
 
Very nbsp
Very nbspVery nbsp
Very nbsp
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 

Similar a Trusted bird mozilla - dgami - fossa2010

Pen test free_01_2012
Pen test free_01_2012Pen test free_01_2012
Pen test free_01_2012
Amiga Utomo
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
Kim Holm
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
New partner preso
New partner presoNew partner preso
New partner preso
Eric Cullum
 
FutureComm 2010: IP Video Communications - Trends and Challenges
FutureComm 2010: IP Video Communications - Trends and ChallengesFutureComm 2010: IP Video Communications - Trends and Challenges
FutureComm 2010: IP Video Communications - Trends and Challenges
RADVISION Ltd.
 
Solving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsSolving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open Standards
Christina Inge
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 

Similar a Trusted bird mozilla - dgami - fossa2010 (20)

Pen test free_01_2012
Pen test free_01_2012Pen test free_01_2012
Pen test free_01_2012
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 
IMT Lecture: VOIP&IPTV MM-Biztel
IMT Lecture: VOIP&IPTV MM-BiztelIMT Lecture: VOIP&IPTV MM-Biztel
IMT Lecture: VOIP&IPTV MM-Biztel
 
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)
 
Video over IP goes wireless: A DVB-H Tutorial
Video over IP goes wireless:  A DVB-H TutorialVideo over IP goes wireless:  A DVB-H Tutorial
Video over IP goes wireless: A DVB-H Tutorial
 
Dita Accelerator Xml2008
Dita Accelerator Xml2008Dita Accelerator Xml2008
Dita Accelerator Xml2008
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
New partner preso
New partner presoNew partner preso
New partner preso
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
Implementation Case Study by eWBM
Implementation Case Study by eWBMImplementation Case Study by eWBM
Implementation Case Study by eWBM
 
FutureComm 2010: IP Video Communications - Trends and Challenges
FutureComm 2010: IP Video Communications - Trends and ChallengesFutureComm 2010: IP Video Communications - Trends and Challenges
FutureComm 2010: IP Video Communications - Trends and Challenges
 
Solving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsSolving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open Standards
 
Compass Catalyst 14052010 Final
Compass Catalyst 14052010 FinalCompass Catalyst 14052010 Final
Compass Catalyst 14052010 Final
 
Download
DownloadDownload
Download
 
Download
DownloadDownload
Download
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 

Más de fOSSa - Free Open Source Software Academia Conference

Más de fOSSa - Free Open Source Software Academia Conference (20)

Les douze commandements du community manager
Les douze commandements du community managerLes douze commandements du community manager
Les douze commandements du community manager
 
Les licences open source simplement ?
Les licences open source simplement ? Les licences open source simplement ?
Les licences open source simplement ?
 
Diffuser les résultats de recherche ?
Diffuser les résultats de recherche ? Diffuser les résultats de recherche ?
Diffuser les résultats de recherche ?
 
- Protection du logiciel - **François Pelligrini**
- Protection du logiciel - **François Pelligrini** - Protection du logiciel - **François Pelligrini**
- Protection du logiciel - **François Pelligrini**
 
La valorisation de logiciels de recherche au sein de l'Inria? / Transfert ma...
La valorisation de logiciels de recherche au sein de l'Inria?  / Transfert ma...La valorisation de logiciels de recherche au sein de l'Inria?  / Transfert ma...
La valorisation de logiciels de recherche au sein de l'Inria? / Transfert ma...
 
Resultats nuit info 2013
Resultats nuit info 2013Resultats nuit info 2013
Resultats nuit info 2013
 
In trust we trust ! Blablacar by frederic mazzella
In trust we trust ! Blablacar by frederic mazzellaIn trust we trust ! Blablacar by frederic mazzella
In trust we trust ! Blablacar by frederic mazzella
 
Open intelligence by tom secker
Open intelligence by tom seckerOpen intelligence by tom secker
Open intelligence by tom secker
 
Eco Nomy Eco Trust Eco Systems - Introduction
Eco Nomy Eco Trust Eco Systems - IntroductionEco Nomy Eco Trust Eco Systems - Introduction
Eco Nomy Eco Trust Eco Systems - Introduction
 
Innovation & Massive data
Innovation & Massive dataInnovation & Massive data
Innovation & Massive data
 
#SAIFC késako - Semantic Analysis for Flow Computing
 #SAIFC késako - Semantic Analysis for Flow Computing #SAIFC késako - Semantic Analysis for Flow Computing
#SAIFC késako - Semantic Analysis for Flow Computing
 
Eco System over code!
Eco System over code!Eco System over code!
Eco System over code!
 
OWF2013 INTERNET OF THINGS
OWF2013 INTERNET OF THINGSOWF2013 INTERNET OF THINGS
OWF2013 INTERNET OF THINGS
 
Afup 10 ans plus tard
Afup 10 ans plus tardAfup 10 ans plus tard
Afup 10 ans plus tard
 
Analyse de la propriete intellectuel
Analyse de la propriete intellectuelAnalyse de la propriete intellectuel
Analyse de la propriete intellectuel
 
From open source labs to ceo methods and advice by sysfera
From open source labs to ceo methods and advice by sysferaFrom open source labs to ceo methods and advice by sysfera
From open source labs to ceo methods and advice by sysfera
 
Management de communaute
Management de communauteManagement de communaute
Management de communaute
 
Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5
 
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS region
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS regionSystematic / GTLL / Ecosystemes logiciel-libre in PARIS region
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS region
 
Choir and Community Management
Choir and Community ManagementChoir and Community Management
Choir and Community Management
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Trusted bird mozilla - dgami - fossa2010

  • 1. . French Ministry of Defense - DGA Laurent CAILLEUX MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°1
  • 2. Introduction Why Trustedbird ? What is Trustedbird ? Services provided by Trustedbird Demonstration Conclusion MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°2
  • 3. Why Trustedbird ? Main goals Initiate an open source community Mail client for the military, industry, administration and civilian environments PEA Project (PEA COMLL) Participants MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°3
  • 4. What is Trustedbird ? Trustedbird is a secure mail client TrustedBird is based on Thunderbird Trustedbird is open source All modules are distributed under free software licenses MPL version 1.1+, GPL version 2+ LGPL version 2.1+ Trustedbird is cross platform Trustedbird is based on Open standards IETF Standards (RFC) MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°4
  • 5. TrustedBird - roadmap Start of project (2006) State of the art Definition of technical and functionnal scope Validation of the military requirements Study of messaging clients Mozilla Thunderbird Study of different types of licenses MPL 1.1+, GPL 2+, LGPL 2.1+ On january 2007, first developments MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°5
  • 6. TrustedBird - roadmap First release on may 2007, version 0.1 Mail client, MDN, DSN, basic functionality Milimail Second release on july 2008, version provided with security extensions On march 2009 TrustedBird Specifications of the latest features On october 2010, final release MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°6
  • 7. Services provided by Trustedbird 2 modes of development: Patchs Add-ons Services Security services Security label request receipts SASL external Secure headers Directory services (Multi LDAP, Directory contact tabs …) Notification services (DSN, MDN with deletion receipt) Advanced format services (XIMF) Others services MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°7
  • 8. Services provided by TrustedBird – Secure headers Secure headers Extension of S/MIME Work of DGA MI Headers Signature of body part and headers Body fields Signature SMIME + Secure headers MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°8
  • 9. Services provided by TrustedBird - XIMF eXtended Internet Message Format XIMF = Engine + instance(s) XIMF instance = Exchange format + forms XML technology Use of customs forms Instances Engine Instances Engine XIMF message Sender Recipient MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°9
  • 10. Services provided by TrustedBird - XIMF Custom header fields Use of XIMF and secure headers Work of DGA MI From: Org1 <Org1@example.fr> From: Org1 <Org1@example.fr> To: Org2 <Org2@example.fr> To: Org2 <Org2@example.fr> Subject: Ceci concerne le projet Theos Subject: Ceci concerne le projet Theos Date: Thu, 22 Oct 2009 17:01:28 +0200 Date: Thu, 22 Oct 2009 17:01:28 +0200 Message-ID: <FDA72FF60379E588@example.fr> Message-ID: <FDA72FF60379E588@example.fr> X-XIMF-Version: 2.0 Pouvez vous, SVP, …….. X-XIMF-Instance: Ent1V1 . X-XIMF-Primary-Precedence: priority X-XIMF-Correspondence-Type: official X-XIMF-Security-Policy-Identifier: 1.3.28.0.0.5.1 X-XIMF-Security-Classification: CONFIDENTIAL X-XIMF-Project: THEOS X-XIMF-Attribution-Key-Word: PROJECT Pouvez vous, SVP, …….. . IMF message XIMF message MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°10
  • 11. Demonstration Demonstration environment Windows client Windows client Virtualized Linux server Virtualized Linux server Postfix Postfix Trustedbird 3.1.5 Cyrus IMAP Cyrus IMAP OpenLDAP OpenLDAP OpenSSL OpenSSL S/MIME signature Secure headers Trustedbird 3.1 Trustedbird 3.1 XIMF, Multi LDAP Thunderbird 3.1.5 Scenarios signed message and verification signed message with secure headers signed XIMF message with secure headers Access to multiple LDAP servers MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°11
  • 12. MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°12
  • 13. Conclusion and future Concept of toolbox Feedback of open source community management Trustedbird will be the messaging client of several french MoD systems Integration of patchs in the future release of Thunderbird (if possible) to avoid a fork Some components are already used in ministries Companies integrate TrustedBird in their solutions http://www.trustedbird.org MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°13
  • 14. Thank you for your attention Questions MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°14