The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email forwarding -- used by individual users to manage multiple accounts and by mailing lists to redistribute messages. In this paper, we explore how such email forwarding and its implementations can break the implicit assumptions in widely deployed anti-spoofing protocols. Using large-scale empirical measurements of 20 email forwarding services (16 leading email providers and four popular mailing list services), we identify a range of security issues rooted in forwarding behavior and show how they can be combined to reliably evade existing anti-spoofing controls. We show how this allows attackers to not only deliver spoofed email messages to prominent email providers (e.g., Gmail, Microsoft Outlook, and Zoho), but also reliably spoof email on behalf of tens of thousands of popular domains including sensitive domains used by organizations in government (e.g., state.gov), finance (e.g., transunion.com), law (e.g., perkinscoie.com) and news (e.g., washingtonpost.com) among others.
翻译:电子邮件的关键作用导致了一系列扩展协议(例如,SPF、DKIM、DMARC),目的是防止电子邮件发送域域被掩盖。这些协议虽然目前很复杂,但因个人用户管理多个账户时使用的自动电子邮件转发和邮寄邮件地址列表来重新分配信息而更加复杂。在本文中,我们探讨了这种电子邮件转发及其实施如何打破广泛部署的反伪协议中隐含的假设。我们利用对20个电子邮件转发服务(16个主要电子邮件提供者和4个广受欢迎的邮件列表服务)的大规模经验性测量,我们确定了一系列植根于转发行为中的安全问题,并表明如何将它们结合起来,可靠地规避现有的防伪邮件控制。我们展示了这如何允许攻击者不仅向知名电子邮件提供者(例如Gmail、微软Outlor和Zoho)发送虚假的电子邮件信息,而且还可以代表数万个受欢迎的域域,包括政府组织(例如,州)、金融(e.g.transion.co.com)、法律(e.eg.com.sess,e.reg.com)和他人之间使用的敏感域。