Procedure:
Generally, it is recommended using a relay server for sending emails to the Internet. Such relay server should be used both by the backend as well as by the GINA satellite system (see Mail System Outgoing server).
Additionally, the following preparations are to be made on both systems:
•SSL
Create (Request or create new certificate...) or import an existing certificate (Import existing certificate...)
o(only necessary if a direct connection between the backend and the GINA satellite system and vice versa can and is to be established)
Fingerprint
Note down the fingerprint for the later use in the counterpart system for setting up the TLS connection
Backend system
oManaged Domains
Open the individual Domain name by clicking on the respective name
▪
•Settings GINA domain
Selection on "[default]"
If "- disabled -" is selected, the GINA forwarding is supressed for the respective Managed domain.
|
In the case of client-capable installations, the error message appears here that the [default]GINA domain is used by more than one client: GINA domain [default] used by more than one customer. This can be ignored here, because the GINA client separation takes place on the GINA satellite (and also must be configured there!). |
▪Fetch mail from remote POP3 server.Interval in minutes: activate and set the value to "1".
o(the additional securing of the connection between the backend and the GINA satellite system via TLS is only possible if a direct connection can be established)
TLS settings Add TLS Domain , next menu under
•Domain name (use a leading "." to include all subdomains)
Entry "customer.pseudo"
(this is the domain which is later used for the email address under Use remote GINA server, reachable under the following email address.
•Optional forwarding server address
remains empty if the Domain name is resolved by means of DNS; otherwise, the IP address of the GINA satellite system is to be entered
▪TLS settings
Select Fingerprint Only send mail if TLS is possible and the fingerprint of the server certificate has the following fingerprint
The input field below is to be filled with the fingerprint(s) of the certificate(s) from the SSL of the GINA satellite systems.
•Mail Processing Ruleset generator
oGeneral settings Log message metadata
Deactivate
oCustom Commands Custom macros and commands for all e-mails BEFORE processing
Line |
Code |
|---|---|
01 |
# Begin: Custom macros and commands for all e-mails BEFORE processing |
02 |
log(1,'Begin: Custom macros and commands for all e-mails BEFORE processing'); |
|
|
03 |
if (compare('to', 'match', 'GINA@customer.pseudo')) { |
04 |
log(1, 'unpacking satellite mail'); |
05 |
unpack_mail(); |
06 |
logsubject(); |
07 |
log(1, 'deliver satellite mail unchanged'); |
08 |
deliver(); |
09 |
} |
10 |
# metadata setting is disabled in ruleset generator |
11 |
logsubject(); |
|
|
12 |
log(1,'End: Custom macros and commands for all e-mails BEFORE processing'); |
13 |
# End: Custom macros and commands for all e-mails BEFORE processing |
oAdvanced options Use remote GINA server, reachable under the following email address
Indicate an email address with an email domain which cannot be reached under any circumstances (for example: "GINA@customer.pseudo" (see also Domain name (use a leading "." to include all subdomains)
•CA
oCreate the CA via Request or create new certificate authority...
oBackup
Download the root certificate by means of Download certificate for the subsequent import in the GINA satellite system under X.509 Root Certificates
•Users
To be able to collect emails generated on the GINA satellite system (usually "GINA replies and password emails") via POP3(s) on the backend system for further processing, a user with a password is to be created via Create new user account in the next menu (in the example "GINA@customer.pseudo") (see ). Subsequently, the detail menu of the newly created user appears. Here, the input fields of the section Remote POP3 are to be filled in correspondingly, in accordance with the example
oUser ID
According to the example, this would be "GINA@customer.pseudo"
oMail server
Enter the IP address, the host name or the MX entry of the GINA satellite system
oOptions Use SSL instead of STARTTLS
Activate
•Domain Certificates S/MIME domain certificates..., next menu Managed S/MIME domain certificates Import S/MIME certificate..., next menu
oDomain name
Enter the "customer.pseudo"
oCertificate Data
Import of the domain certificate created previously by the GINA satellite system for the Managed domain "customer.pseudo" generated there (please also refer to S/MIME domain encryption)
•GINA Domains
A GINA Domain is not mandatory
GINA satellite system
•Administration Bulk Import Import X.509 keys and certificates Import
To enable the signing of GINA carrier e-mails, the import of at least one PKCS#12 key pair and the resulting automatic creation of a User is required.
If different GINA Domains are to be used, the import of one PKCS#12 key pair for each GINA Domains may be advisable. Here, as applicant of the certificate from the PKCS#12, one email address each with a generally valid name part, if possible, and the or one of the allocated Managed Domains should be indicated in the domain part, for example "securemail@managed-domain1.tld", "securemail@managed-domain2.tld", "securemail@managed-domainn.tld".
These email addresses are then used in the configuration of the corresponding GINA Domain (see next point)
•GINA Domains
Configuration of the [default] GINA, and/or set-up of the necessary GINA Domains
▪GINA name
Open the respective GINA
Implement the desired settings in the subsequent menu Change GINA Settings for.
For signing the GINA carrier emails
•Extended settings Force sending of GINA mails from this address:
Enter the email address which matches the corresponding GINA Domains (see point above)
▪Create S/MIME domain keys for managed domain encryption and send public key to vendor pool
Set to "Off for all domains".
▪Verify recipient addresses using SMTP lookups
Deactivate
▪Set up the email domain of the email address indicated under Use remote GINA server, reachable under the following email address of the backend system via Add managed domain....
Implement the desired settings in the subsequent menu Settings
•Domain name
Entry in the example "customer.pseudo"
•Forwarding server
Input "[127.0.0.1]"
Open the Managed domain
oClick on Generate S/MIME key
oOpen the newly generated certificate by clicking on SHA1:... under Fingerprint
▪In the submenu now opening, download the certificate via Download certificate.... This certificate is to be integrated into the backend system under Domain Certificates for the target domain (according to the example "customer.pseudo").
Create all Managed Domains which are present on the backend system by means of Add managed domain....
Implement the desired settings in the subsequent menu Settings
▪Domain name
Enter the domains from the backend system, separated by commas
▪Forwarding server
Input "[127.0.0.1]"
oIf applicable, allocate the desired GINA to the corresponding Managed domains
(see Settings GINA domain).
o(only possible if a direct connection with the backend system can be established)
TLS settings Add TLS Domain , subsequent menu under
•Domain name (use a leading "." to include all subdomains)
•Enter the name of the backend system
•Optional forwarding server address
remains empty if the Domain name is resolved by means of DNS; otherwise, the IP address of the backend system is to be entered
▪TLS settings
Select Fingerprint Only send mail if TLS is possible and the fingerprint of the server certificate has the following fingerprint
The input field below is to be filled with the fingerprint(s) of the certificate(s) from the SSL menu of the backend machine(s).
oSMTP Settings max. message size (KB) (Note: cannot exceed xxxxxxx KB)
Take over the restriction from the backend system and/or email server
oRelaying
Enter the IP address(es) of the backend system(s)
▪General settings
Remove the checkmarks of the options
•Do not touch mails with the following text in subject
•Reprocess mails sent to reprocess@decrypt.reprocess
▪User creation
Select Create accounts for all users
•Incoming emails
Apply the settings of the backend system
•Outgoing e-mails
These settings are irrelevant since an in which GINA is enforced is used.
▪Signing
Remove all checkmarks
•This is a remote GINA server
Activate
oRelay for domain:
Enter all Managed domains of the backend system as regular expressions
oRelay email address:
Enter the address from the option Use remote GINA server, reachable under the following email address of the backend system, for example "GINA@customer.pseudo"
oRelay domain key fingerprint:
remains empty.
oUse custom delivery method:"
Input of continue'); if (!pack_mail('GINA@customer.pseudo', true)) { log(1, 'pack_mail() failed'); drop(500, 'pack_mail() failed'); } deliver('
Clicking on Edit policy table... in the subsequent menu via Create new encryption policy..., a new policy is created.
In the subsequent menu , the following parameters are to be set in the Settings:
oPolicy name
Enter a unique name, for example "GINA".
oPolicy domains
Selection of all Managed domains except "customer.pseudo"
oEncryption mode
Select "GINA-only"
oGINA options
remains empty
•SSL
Create (Request or create new certificate...) or import an existing certificate (Import existing certificate...)
(only necessary if a direct connection between the backend and the GINA satellite system and vice versa can and is to be established)
oFingerprint
Note down the fingerprint for the later use in the backend system for setting up the TLS connection
•User
To be able to collect emails generated on the GINA satellite system (usually "GINA@ replies and password emails") via POP3(s) on the backend system for further processing, a user with a password is to be created via Create new user account in the subsequent menu (see ).
According to the example, this would be "GINA@customer.pseudo"
•X.509 Root Certificates
Import the root certificate of the backend system via Import S/MIME root certificate...
•Domain Certificates
If the satellite system cannot obtain the domain keys of the Managed domains of the backend system automatically via Managed Domain Service, these are to be imported individually via S/MIME domain certificates... in Managed S/MIME domain certificates Import S/MIME certificate....
Restrictions
Large File Transfer (LFT)
LFT is only possible with restrictions.
For instance, variant 1, which is described in Large File Transfer (LFT) (via email client only) is not possible.
For variant 2 (delivery via GINA - or for LFT to internal), internal users would have to be created via the Administration Bulk Import Import GINA Users (CSV) or via REST interface (please also refer to Groups legacyappadmin), as GINA accounts.
Variant 3 has the same requirements as variant 2.
Protection Pack (PP)
Set as required. If applicable, a diversion to an external protection instance is possible via Custom commands (please also refer to Sophos UTM: Another Virus Scan After Decryption). However, this is usually not necessary since the protection mechanisms of the backend system apply.

