The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email forwarding -- used by individual users to manage multiple accounts and by mailing lists to redistribute messages. In this paper, we explore how such email forwarding and its implementations can break the implicit assumptions in widely deployed anti-spoofing protocols. Using large-scale empirical measurements of 20 email forwarding services (16 leading email providers and four popular mailing list services), we identify a range of security issues rooted in forwarding behavior and show how they can be combined to reliably evade existing anti-spoofing controls. We further show how these issues allow attackers to not only deliver spoofed email messages to prominent email providers (e.g., Gmail, Microsoft Outlook, and Zoho), but also reliably spoof email on behalf of tens of thousands of popular domains including sensitive domains used by organizations in government (e.g., state.gov), finance (e.g., transunion.com), law (e.g., perkinscoie.com) and news (e.g., washingtonpost.com) among others.
翻译:由于电子邮件的关键作用,一系列扩展协议(例如SPF,DKIM,DMARC)旨在防止电子邮件发件人域名欺骗。这些协议本身已经很复杂,但是由个人用户用于管理多个帐户和邮件列表用于重新分发消息的自动邮件转发使它们变得更加复杂。在本文中,我们探讨了这种电子邮件转发及其实现如何打破广泛部署的反欺骗协议的隐含假设。通过对20个电子邮件转发服务(16个领先的电子邮件提供商和四个流行的邮件列表服务)的大规模实证测量,我们发现了与转发行为相关的一系列安全问题,并展示了它们如何组合起来可靠地回避现有的反欺骗控件。我们还展示了这些问题如何使攻击者不仅可以向著名电子邮件提供商(例如Gmail、Microsoft Outlook和Zoho)发送伪造的电子邮件消息,而且还可以可靠地代表包括政府(例如state.gov)、金融(例如transunion.com)、法律(例如perkinscoie.com)和新闻(例如washingtonpost.com)等组织在内的数万个流行域名伪造电子邮件。