TY - GEN
T1 - Security by any other name
T2 - 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015
AU - Foster, Ian
AU - Larson, Jon
AU - Masich, Max
AU - Snoeren, Alex C.
AU - Savage, Stefan
AU - Levchenko, Kirill
N1 - Funding Information:
We would like to thank our system administrators Cindy Moore and Brian Kantor and are grateful for the feedback from the anonymous reviewers. This work was supported in part by the National Science Foundation grant CNS-1237264 and by generous research, operational and/or in-kind support from the UCSD Center for Networked Systems (CNS).
PY - 2015/10/12
Y1 - 2015/10/12
N2 - Email as we use it today makes no guarantees about message integrity, authenticity, or confidentiality. Users must explicitly encrypt and sign message contents using tools like PGP if they wish to protect themselves against message tampering, forgery, or eavesdropping. However, few do, leaving the vast majority of users open to such attacks. Fortunately, transport-layer security mechanisms (available as extensions to SMTP, IMAP, POP3) provide some degree of protection against network-based eavesdropping attacks. At the same time, DKIM and SPF protect against network-based message forgery and tampering. In this work we evaluate the security provided by these protocols, both in theory and in practice. Using a combination of measurement techniques, we determine whether major providers supports TLS at each point in their email message path, and whether they support SPF and DKIM on incoming and outgoing mail. We found that while more than half of the top 20,000 receiving MTAs supported TLS, and support for TLS is increasing, servers do not check certificates, opening the Internet email system up to man-in-the-middle eavesdropping attacks. At the same time, while use of SPF is common, enforcement is limited. Moreover, few of the senders we examined used DKIM, and fewer still rejected invalid DKIM signatures. Our findings show that the global email system provides some protection against passive eavesdropping, limited protection against unprivileged peer message forgery, and no protection against active network-based attacks. We observe that protection even against the latter is possible using existing protocols with proper enforcement.
AB - Email as we use it today makes no guarantees about message integrity, authenticity, or confidentiality. Users must explicitly encrypt and sign message contents using tools like PGP if they wish to protect themselves against message tampering, forgery, or eavesdropping. However, few do, leaving the vast majority of users open to such attacks. Fortunately, transport-layer security mechanisms (available as extensions to SMTP, IMAP, POP3) provide some degree of protection against network-based eavesdropping attacks. At the same time, DKIM and SPF protect against network-based message forgery and tampering. In this work we evaluate the security provided by these protocols, both in theory and in practice. Using a combination of measurement techniques, we determine whether major providers supports TLS at each point in their email message path, and whether they support SPF and DKIM on incoming and outgoing mail. We found that while more than half of the top 20,000 receiving MTAs supported TLS, and support for TLS is increasing, servers do not check certificates, opening the Internet email system up to man-in-the-middle eavesdropping attacks. At the same time, while use of SPF is common, enforcement is limited. Moreover, few of the senders we examined used DKIM, and fewer still rejected invalid DKIM signatures. Our findings show that the global email system provides some protection against passive eavesdropping, limited protection against unprivileged peer message forgery, and no protection against active network-based attacks. We observe that protection even against the latter is possible using existing protocols with proper enforcement.
UR - http://www.scopus.com/inward/record.url?scp=84954194902&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84954194902&partnerID=8YFLogxK
U2 - 10.1145/2810103.2813607
DO - 10.1145/2810103.2813607
M3 - Conference contribution
AN - SCOPUS:84954194902
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 450
EP - 463
BT - CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
PB - Association for Computing Machinery
Y2 - 12 October 2015 through 16 October 2015
ER -