SlideShare a Scribd company logo
.



                           French Ministry of Defense - DGA
                                 Laurent CAILLEUX




MINISTÈRE DE LA DÉFENSE
                          DGA MI               2010           Diapositive N°1
Introduction


                          Why Trustedbird ?
                          What is Trustedbird ?
                          Services provided by Trustedbird
                          Demonstration
                          Conclusion




MINISTÈRE DE LA DÉFENSE
                                DGA MI        2010     Diapositive N°2
Why Trustedbird ?


                          Main goals
                            Initiate an open source community
                            Mail client for the military, industry,
                            administration and civilian environments
                          PEA Project (PEA COMLL)
                          Participants




MINISTÈRE DE LA DÉFENSE
                                DGA MI           2010        Diapositive N°3
What is Trustedbird ?

                   Trustedbird is a secure mail client
                   TrustedBird is based on Thunderbird
                   Trustedbird is open source
                   All modules are distributed under free software
                   licenses
                          MPL version 1.1+,
                          GPL version 2+
                          LGPL version 2.1+
                   Trustedbird is cross platform
                   Trustedbird is based on
                          Open standards
                          IETF Standards (RFC)

MINISTÈRE DE LA DÉFENSE
                                  DGA MI         2010     Diapositive N°4
TrustedBird - roadmap

                          Start of project (2006)
                            State of the art
                            Definition of technical and functionnal scope
                            Validation of the military requirements
                          Study of messaging clients
                              Mozilla Thunderbird
                          Study of different types of licenses
                              MPL 1.1+, GPL 2+, LGPL 2.1+
                          On january 2007, first developments



MINISTÈRE DE LA DÉFENSE
                                 DGA MI             2010      Diapositive N°5
TrustedBird - roadmap

                          First release on may 2007, version 0.1
                            Mail client, MDN, DSN, basic functionality
                              Milimail
                          Second release on july 2008, version
                          provided with security extensions
                          On march 2009
                              TrustedBird
                            Specifications of the latest features
                          On october 2010, final release



MINISTÈRE DE LA DÉFENSE
                                 DGA MI            2010        Diapositive N°6
Services provided by Trustedbird

                          2 modes of development:
                            Patchs
                            Add-ons
                          Services
                            Security services
                                 Security label
                                 request receipts
                                 SASL external
                                 Secure headers
                            Directory services (Multi LDAP, Directory contact tabs …)
                            Notification services (DSN, MDN with deletion receipt)
                            Advanced format services (XIMF)
                            Others services



MINISTÈRE DE LA DÉFENSE
                                     DGA MI             2010          Diapositive N°7
Services provided by TrustedBird –
                          Secure headers

                          Secure headers
                            Extension of S/MIME
                            Work of DGA MI


                               Headers
   Signature of
    body part
                                            and headers
                                Body           fields

                              Signature

                           SMIME + Secure
                              headers




MINISTÈRE DE LA DÉFENSE
                                   DGA MI                 2010   Diapositive N°8
Services provided by TrustedBird - XIMF


            eXtended Internet Message Format
            XIMF = Engine + instance(s)
            XIMF instance = Exchange format + forms
            XML
            technology             Use of customs forms




                                         Instances   Engine                           Instances   Engine



                                                                 XIMF message


                                              Sender                                      Recipient



MINISTÈRE DE LA DÉFENSE
                                DGA MI                        2010              Diapositive N°9
Services provided by TrustedBird - XIMF


                             Custom header fields
                             Use of XIMF and secure headers
                             Work of DGA MI
                          From: Org1 <Org1@example.fr>                From: Org1 <Org1@example.fr>
                          To: Org2 <Org2@example.fr>                  To: Org2 <Org2@example.fr>
                          Subject: Ceci concerne le projet Theos      Subject: Ceci concerne le projet Theos
                          Date: Thu, 22 Oct 2009 17:01:28 +0200       Date: Thu, 22 Oct 2009 17:01:28 +0200
                          Message-ID: <FDA72FF60379E588@example.fr>   Message-ID: <FDA72FF60379E588@example.fr>
                                                                      X-XIMF-Version: 2.0
                          Pouvez vous, SVP, ……..                      X-XIMF-Instance: Ent1V1
                          .                                           X-XIMF-Primary-Precedence: priority
                                                                      X-XIMF-Correspondence-Type: official
                                                                      X-XIMF-Security-Policy-Identifier: 1.3.28.0.0.5.1
                                                                      X-XIMF-Security-Classification: CONFIDENTIAL
                                                                      X-XIMF-Project: THEOS
                                                                      X-XIMF-Attribution-Key-Word: PROJECT

                                                                      Pouvez vous, SVP, ……..
                                                                      .


                                       IMF message                                  XIMF message

MINISTÈRE DE LA DÉFENSE
                                               DGA MI                 2010                       Diapositive N°10
Demonstration

                          Demonstration environment        Windows client
                                                           Windows client    Virtualized Linux server
                                                                             Virtualized Linux server

                                                                             Postfix
                                                                             Postfix
                          Trustedbird 3.1.5                                  Cyrus IMAP
                                                                             Cyrus IMAP
                                                                             OpenLDAP
                                                                             OpenLDAP
                                                                             OpenSSL
                                                                             OpenSSL
                            S/MIME signature
                            Secure headers                 Trustedbird 3.1
                                                           Trustedbird 3.1
                            XIMF,
                            Multi LDAP
                          Thunderbird 3.1.5
                          Scenarios
                            signed message and verification
                            signed message with secure headers
                            signed XIMF message with secure headers
                            Access to multiple LDAP servers


MINISTÈRE DE LA DÉFENSE
                                 DGA MI             2010             Diapositive N°11
MINISTÈRE DE LA DÉFENSE
                          DGA MI   2010   Diapositive N°12
Conclusion and future


                          Concept of toolbox
                          Feedback of open source community management
                          Trustedbird will be the messaging client of several
                          french MoD systems
                          Integration of patchs in the future release of
                          Thunderbird (if possible) to avoid a fork
                          Some components are already used in ministries
                          Companies integrate TrustedBird in their solutions


                            http://www.trustedbird.org
MINISTÈRE DE LA DÉFENSE
                                   DGA MI           2010        Diapositive N°13
Thank you for your attention
                                  Questions




MINISTÈRE DE LA DÉFENSE
                               DGA MI    2010   Diapositive N°14

More Related Content

Viewers also liked

Colonel转码集群
Colonel转码集群Colonel转码集群
Colonel转码集群pluschen
 
Iterative methods for the solution of systems of linear equations
Iterative methods for the solution of systems of linear equationsIterative methods for the solution of systems of linear equations
Iterative methods for the solution of systems of linear equations
NORAIMA
 
NYC Energy Benchmarking Checklist
NYC Energy Benchmarking ChecklistNYC Energy Benchmarking Checklist
NYC Energy Benchmarking Checklist
REBNY
 
HP Fossology v5.3
HP Fossology v5.3HP Fossology v5.3
Berkah dan Kutukan Dimona
Berkah dan Kutukan DimonaBerkah dan Kutukan Dimona
Mw kenalan
Mw kenalanMw kenalan
Mw kenalan
roy manik
 
Applying Business Process Principles To Information Design
Applying Business Process Principles To Information DesignApplying Business Process Principles To Information Design
Applying Business Process Principles To Information Design
urmiroy
 
Direct methods for the solution of systems of linear equations
Direct methods for the solution of systems of linear equationsDirect methods for the solution of systems of linear equations
Direct methods for the solution of systems of linear equations
NORAIMA
 
Integrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appIntegrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine app
EPM Live
 
Matrices
MatricesMatrices
Matrices
NORAIMA
 
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
Federation of Independent Media Workers Union
 
Disney Effects: Building web/mobile castle in OpenGL 2D & 3D
Disney Effects: Building web/mobile castle in OpenGL 2D & 3DDisney Effects: Building web/mobile castle in OpenGL 2D & 3D
Disney Effects: Building web/mobile castle in OpenGL 2D & 3D
SVWB
 
Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교
valuasset
 
The way of the stars
The way of the starsThe way of the stars
The way of the stars
mayadez
 
CloudSpurt customer
CloudSpurt customerCloudSpurt customer
Ricardo sarmiento busqueda_portafolio
Ricardo sarmiento busqueda_portafolioRicardo sarmiento busqueda_portafolio
Ricardo sarmiento busqueda_portafolio
chisnet
 
Ricardo sarmiento _rea_mexico x_tec
Ricardo sarmiento _rea_mexico x_tecRicardo sarmiento _rea_mexico x_tec
Ricardo sarmiento _rea_mexico x_tec
chisnet
 
搜索引擎原理略览
搜索引擎原理略览搜索引擎原理略览
搜索引擎原理略览
pluschen
 
Very nbsp
Very nbspVery nbsp
Very nbsp
Harid Nattapong
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
NEW Momentum
 

Viewers also liked (20)

Colonel转码集群
Colonel转码集群Colonel转码集群
Colonel转码集群
 
Iterative methods for the solution of systems of linear equations
Iterative methods for the solution of systems of linear equationsIterative methods for the solution of systems of linear equations
Iterative methods for the solution of systems of linear equations
 
NYC Energy Benchmarking Checklist
NYC Energy Benchmarking ChecklistNYC Energy Benchmarking Checklist
NYC Energy Benchmarking Checklist
 
HP Fossology v5.3
HP Fossology v5.3HP Fossology v5.3
HP Fossology v5.3
 
Berkah dan Kutukan Dimona
Berkah dan Kutukan DimonaBerkah dan Kutukan Dimona
Berkah dan Kutukan Dimona
 
Mw kenalan
Mw kenalanMw kenalan
Mw kenalan
 
Applying Business Process Principles To Information Design
Applying Business Process Principles To Information DesignApplying Business Process Principles To Information Design
Applying Business Process Principles To Information Design
 
Direct methods for the solution of systems of linear equations
Direct methods for the solution of systems of linear equationsDirect methods for the solution of systems of linear equations
Direct methods for the solution of systems of linear equations
 
Integrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine appIntegrated it portfolio management using epm live's it engine app
Integrated it portfolio management using epm live's it engine app
 
Matrices
MatricesMatrices
Matrices
 
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
Di Bawah Bayang-bayang Krisis: Laporan Tahunan AJI 2015
 
Disney Effects: Building web/mobile castle in OpenGL 2D & 3D
Disney Effects: Building web/mobile castle in OpenGL 2D & 3DDisney Effects: Building web/mobile castle in OpenGL 2D & 3D
Disney Effects: Building web/mobile castle in OpenGL 2D & 3D
 
Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교
 
The way of the stars
The way of the starsThe way of the stars
The way of the stars
 
CloudSpurt customer
CloudSpurt customerCloudSpurt customer
CloudSpurt customer
 
Ricardo sarmiento busqueda_portafolio
Ricardo sarmiento busqueda_portafolioRicardo sarmiento busqueda_portafolio
Ricardo sarmiento busqueda_portafolio
 
Ricardo sarmiento _rea_mexico x_tec
Ricardo sarmiento _rea_mexico x_tecRicardo sarmiento _rea_mexico x_tec
Ricardo sarmiento _rea_mexico x_tec
 
搜索引擎原理略览
搜索引擎原理略览搜索引擎原理略览
搜索引擎原理略览
 
Very nbsp
Very nbspVery nbsp
Very nbsp
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 

Similar to Trusted bird mozilla - dgami - fossa2010

Pen test free_01_2012
Pen test free_01_2012Pen test free_01_2012
Pen test free_01_2012
Amiga Utomo
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
FIDO Alliance
 
IMT Lecture: VOIP&IPTV MM-Biztel
IMT Lecture: VOIP&IPTV MM-BiztelIMT Lecture: VOIP&IPTV MM-Biztel
IMT Lecture: VOIP&IPTV MM-Biztel
Djadja Sardjana
 
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
gueste2f09df
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
Kim Holm
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)
Siddick Elaheebocus
 
Video over IP goes wireless: A DVB-H Tutorial
Video over IP goes wireless:  A DVB-H TutorialVideo over IP goes wireless:  A DVB-H Tutorial
Video over IP goes wireless: A DVB-H Tutorial
Marie Josée (MJ) Drouin
 
Dita Accelerator Xml2008
Dita Accelerator Xml2008Dita Accelerator Xml2008
Dita Accelerator Xml2008
Stilo International
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
Djadja Sardjana
 
New partner preso
New partner presoNew partner preso
New partner preso
Eric Cullum
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
LINE Corporation
 
Implementation Case Study by eWBM
Implementation Case Study by eWBMImplementation Case Study by eWBM
Implementation Case Study by eWBM
FIDO Alliance
 
FutureComm 2010: IP Video Communications - Trends and Challenges
FutureComm 2010: IP Video Communications - Trends and ChallengesFutureComm 2010: IP Video Communications - Trends and Challenges
FutureComm 2010: IP Video Communications - Trends and Challenges
RADVISION Ltd.
 
Solving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsSolving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open Standards
Christina Inge
 
Compass Catalyst 14052010 Final
Compass Catalyst 14052010 FinalCompass Catalyst 14052010 Final
Compass Catalyst 14052010 Final
Damir Medved
 
Download
DownloadDownload
Download
Videoguy
 
Download
DownloadDownload
Download
Videoguy
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 

Similar to Trusted bird mozilla - dgami - fossa2010 (20)

Pen test free_01_2012
Pen test free_01_2012Pen test free_01_2012
Pen test free_01_2012
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 
IMT Lecture: VOIP&IPTV MM-Biztel
IMT Lecture: VOIP&IPTV MM-BiztelIMT Lecture: VOIP&IPTV MM-Biztel
IMT Lecture: VOIP&IPTV MM-Biztel
 
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
IMT Lecture Ict.VOIP+IPTV.Part01.MM-Biztel 02 Nov09
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)
 
Video over IP goes wireless: A DVB-H Tutorial
Video over IP goes wireless:  A DVB-H TutorialVideo over IP goes wireless:  A DVB-H Tutorial
Video over IP goes wireless: A DVB-H Tutorial
 
Dita Accelerator Xml2008
Dita Accelerator Xml2008Dita Accelerator Xml2008
Dita Accelerator Xml2008
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
New partner preso
New partner presoNew partner preso
New partner preso
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
Implementation Case Study by eWBM
Implementation Case Study by eWBMImplementation Case Study by eWBM
Implementation Case Study by eWBM
 
FutureComm 2010: IP Video Communications - Trends and Challenges
FutureComm 2010: IP Video Communications - Trends and ChallengesFutureComm 2010: IP Video Communications - Trends and Challenges
FutureComm 2010: IP Video Communications - Trends and Challenges
 
Solving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsSolving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open Standards
 
Compass Catalyst 14052010 Final
Compass Catalyst 14052010 FinalCompass Catalyst 14052010 Final
Compass Catalyst 14052010 Final
 
Download
DownloadDownload
Download
 
Download
DownloadDownload
Download
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 

More from fOSSa - Free Open Source Software Academia Conference

Les douze commandements du community manager
Les douze commandements du community managerLes douze commandements du community manager
Les douze commandements du community manager
fOSSa - Free Open Source Software Academia Conference
 
Les licences open source simplement ?
Les licences open source simplement ? Les licences open source simplement ?
Les licences open source simplement ?
fOSSa - Free Open Source Software Academia Conference
 
Diffuser les résultats de recherche ?
Diffuser les résultats de recherche ? Diffuser les résultats de recherche ?
Diffuser les résultats de recherche ?
fOSSa - Free Open Source Software Academia Conference
 
- Protection du logiciel - **François Pelligrini**
- Protection du logiciel - **François Pelligrini** - Protection du logiciel - **François Pelligrini**
- Protection du logiciel - **François Pelligrini**
fOSSa - Free Open Source Software Academia Conference
 
La valorisation de logiciels de recherche au sein de l'Inria? / Transfert ma...
La valorisation de logiciels de recherche au sein de l'Inria?  / Transfert ma...La valorisation de logiciels de recherche au sein de l'Inria?  / Transfert ma...
La valorisation de logiciels de recherche au sein de l'Inria? / Transfert ma...
fOSSa - Free Open Source Software Academia Conference
 
In trust we trust ! Blablacar by frederic mazzella
In trust we trust ! Blablacar by frederic mazzellaIn trust we trust ! Blablacar by frederic mazzella
In trust we trust ! Blablacar by frederic mazzella
fOSSa - Free Open Source Software Academia Conference
 
Open intelligence by tom secker
Open intelligence by tom seckerOpen intelligence by tom secker
Eco Nomy Eco Trust Eco Systems - Introduction
Eco Nomy Eco Trust Eco Systems - IntroductionEco Nomy Eco Trust Eco Systems - Introduction
Eco Nomy Eco Trust Eco Systems - Introduction
fOSSa - Free Open Source Software Academia Conference
 
Innovation & Massive data
Innovation & Massive dataInnovation & Massive data
#SAIFC késako - Semantic Analysis for Flow Computing
 #SAIFC késako - Semantic Analysis for Flow Computing #SAIFC késako - Semantic Analysis for Flow Computing
#SAIFC késako - Semantic Analysis for Flow Computing
fOSSa - Free Open Source Software Academia Conference
 
Eco System over code!
Eco System over code!Eco System over code!
OWF2013 INTERNET OF THINGS
OWF2013 INTERNET OF THINGSOWF2013 INTERNET OF THINGS
Analyse de la propriete intellectuel
Analyse de la propriete intellectuelAnalyse de la propriete intellectuel
Analyse de la propriete intellectuel
fOSSa - Free Open Source Software Academia Conference
 
From open source labs to ceo methods and advice by sysfera
From open source labs to ceo methods and advice by sysferaFrom open source labs to ceo methods and advice by sysfera
From open source labs to ceo methods and advice by sysfera
fOSSa - Free Open Source Software Academia Conference
 
Management de communaute
Management de communauteManagement de communaute
Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5
fOSSa - Free Open Source Software Academia Conference
 
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS region
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS regionSystematic / GTLL / Ecosystemes logiciel-libre in PARIS region
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS region
fOSSa - Free Open Source Software Academia Conference
 
Choir and Community Management
Choir and Community ManagementChoir and Community Management

More from fOSSa - Free Open Source Software Academia Conference (20)

Les douze commandements du community manager
Les douze commandements du community managerLes douze commandements du community manager
Les douze commandements du community manager
 
Les licences open source simplement ?
Les licences open source simplement ? Les licences open source simplement ?
Les licences open source simplement ?
 
Diffuser les résultats de recherche ?
Diffuser les résultats de recherche ? Diffuser les résultats de recherche ?
Diffuser les résultats de recherche ?
 
- Protection du logiciel - **François Pelligrini**
- Protection du logiciel - **François Pelligrini** - Protection du logiciel - **François Pelligrini**
- Protection du logiciel - **François Pelligrini**
 
La valorisation de logiciels de recherche au sein de l'Inria? / Transfert ma...
La valorisation de logiciels de recherche au sein de l'Inria?  / Transfert ma...La valorisation de logiciels de recherche au sein de l'Inria?  / Transfert ma...
La valorisation de logiciels de recherche au sein de l'Inria? / Transfert ma...
 
Resultats nuit info 2013
Resultats nuit info 2013Resultats nuit info 2013
Resultats nuit info 2013
 
In trust we trust ! Blablacar by frederic mazzella
In trust we trust ! Blablacar by frederic mazzellaIn trust we trust ! Blablacar by frederic mazzella
In trust we trust ! Blablacar by frederic mazzella
 
Open intelligence by tom secker
Open intelligence by tom seckerOpen intelligence by tom secker
Open intelligence by tom secker
 
Eco Nomy Eco Trust Eco Systems - Introduction
Eco Nomy Eco Trust Eco Systems - IntroductionEco Nomy Eco Trust Eco Systems - Introduction
Eco Nomy Eco Trust Eco Systems - Introduction
 
Innovation & Massive data
Innovation & Massive dataInnovation & Massive data
Innovation & Massive data
 
#SAIFC késako - Semantic Analysis for Flow Computing
 #SAIFC késako - Semantic Analysis for Flow Computing #SAIFC késako - Semantic Analysis for Flow Computing
#SAIFC késako - Semantic Analysis for Flow Computing
 
Eco System over code!
Eco System over code!Eco System over code!
Eco System over code!
 
OWF2013 INTERNET OF THINGS
OWF2013 INTERNET OF THINGSOWF2013 INTERNET OF THINGS
OWF2013 INTERNET OF THINGS
 
Afup 10 ans plus tard
Afup 10 ans plus tardAfup 10 ans plus tard
Afup 10 ans plus tard
 
Analyse de la propriete intellectuel
Analyse de la propriete intellectuelAnalyse de la propriete intellectuel
Analyse de la propriete intellectuel
 
From open source labs to ceo methods and advice by sysfera
From open source labs to ceo methods and advice by sysferaFrom open source labs to ceo methods and advice by sysfera
From open source labs to ceo methods and advice by sysfera
 
Management de communaute
Management de communauteManagement de communaute
Management de communaute
 
Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5
 
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS region
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS regionSystematic / GTLL / Ecosystemes logiciel-libre in PARIS region
Systematic / GTLL / Ecosystemes logiciel-libre in PARIS region
 
Choir and Community Management
Choir and Community ManagementChoir and Community Management
Choir and Community Management
 

Recently uploaded

Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

Trusted bird mozilla - dgami - fossa2010

  • 1. . French Ministry of Defense - DGA Laurent CAILLEUX MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°1
  • 2. Introduction Why Trustedbird ? What is Trustedbird ? Services provided by Trustedbird Demonstration Conclusion MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°2
  • 3. Why Trustedbird ? Main goals Initiate an open source community Mail client for the military, industry, administration and civilian environments PEA Project (PEA COMLL) Participants MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°3
  • 4. What is Trustedbird ? Trustedbird is a secure mail client TrustedBird is based on Thunderbird Trustedbird is open source All modules are distributed under free software licenses MPL version 1.1+, GPL version 2+ LGPL version 2.1+ Trustedbird is cross platform Trustedbird is based on Open standards IETF Standards (RFC) MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°4
  • 5. TrustedBird - roadmap Start of project (2006) State of the art Definition of technical and functionnal scope Validation of the military requirements Study of messaging clients Mozilla Thunderbird Study of different types of licenses MPL 1.1+, GPL 2+, LGPL 2.1+ On january 2007, first developments MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°5
  • 6. TrustedBird - roadmap First release on may 2007, version 0.1 Mail client, MDN, DSN, basic functionality Milimail Second release on july 2008, version provided with security extensions On march 2009 TrustedBird Specifications of the latest features On october 2010, final release MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°6
  • 7. Services provided by Trustedbird 2 modes of development: Patchs Add-ons Services Security services Security label request receipts SASL external Secure headers Directory services (Multi LDAP, Directory contact tabs …) Notification services (DSN, MDN with deletion receipt) Advanced format services (XIMF) Others services MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°7
  • 8. Services provided by TrustedBird – Secure headers Secure headers Extension of S/MIME Work of DGA MI Headers Signature of body part and headers Body fields Signature SMIME + Secure headers MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°8
  • 9. Services provided by TrustedBird - XIMF eXtended Internet Message Format XIMF = Engine + instance(s) XIMF instance = Exchange format + forms XML technology Use of customs forms Instances Engine Instances Engine XIMF message Sender Recipient MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°9
  • 10. Services provided by TrustedBird - XIMF Custom header fields Use of XIMF and secure headers Work of DGA MI From: Org1 <Org1@example.fr> From: Org1 <Org1@example.fr> To: Org2 <Org2@example.fr> To: Org2 <Org2@example.fr> Subject: Ceci concerne le projet Theos Subject: Ceci concerne le projet Theos Date: Thu, 22 Oct 2009 17:01:28 +0200 Date: Thu, 22 Oct 2009 17:01:28 +0200 Message-ID: <FDA72FF60379E588@example.fr> Message-ID: <FDA72FF60379E588@example.fr> X-XIMF-Version: 2.0 Pouvez vous, SVP, …….. X-XIMF-Instance: Ent1V1 . X-XIMF-Primary-Precedence: priority X-XIMF-Correspondence-Type: official X-XIMF-Security-Policy-Identifier: 1.3.28.0.0.5.1 X-XIMF-Security-Classification: CONFIDENTIAL X-XIMF-Project: THEOS X-XIMF-Attribution-Key-Word: PROJECT Pouvez vous, SVP, …….. . IMF message XIMF message MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°10
  • 11. Demonstration Demonstration environment Windows client Windows client Virtualized Linux server Virtualized Linux server Postfix Postfix Trustedbird 3.1.5 Cyrus IMAP Cyrus IMAP OpenLDAP OpenLDAP OpenSSL OpenSSL S/MIME signature Secure headers Trustedbird 3.1 Trustedbird 3.1 XIMF, Multi LDAP Thunderbird 3.1.5 Scenarios signed message and verification signed message with secure headers signed XIMF message with secure headers Access to multiple LDAP servers MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°11
  • 12. MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°12
  • 13. Conclusion and future Concept of toolbox Feedback of open source community management Trustedbird will be the messaging client of several french MoD systems Integration of patchs in the future release of Thunderbird (if possible) to avoid a fork Some components are already used in ministries Companies integrate TrustedBird in their solutions http://www.trustedbird.org MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°13
  • 14. Thank you for your attention Questions MINISTÈRE DE LA DÉFENSE DGA MI 2010 Diapositive N°14