Security by Any Other Name: On the Effectiveness of Provider Based Email Security

被引:46
|
作者
Foster, Ian [1 ]
Larson, Jon [1 ]
Masich, Max [1 ]
Snoeren, Alex C. [1 ]
Savage, Stefan [1 ]
Levchenko, Kirill [1 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, San Diego, CA 92103 USA
基金
美国国家科学基金会;
关键词
D O I
10.1145/2810103.2813607
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Email as we use it today makes no guarantees about message integrity, authenticity, or confidentiality. Users must explicitly encrypt and sign message contents using tools like PGP if they wish to protect themselves against message tampering, forgery, or eavesdropping. However, few do, leaving the vast majority of users open to such attacks. Fortunately, transport-layer security mechanisms (available as extensions to SMTP, IMAP, POPS) provide some degree of protection against network-based eavesdropping attacks. At the same time, DKIM and SPF protect against network-based message forgery and tampering. In this work we evaluate the security provided by these protocols, both in theory and in practice. Using a combination of measurement techniques, we determine whether major providers supports TLS at each point in their email message path, and whether they support SPF and DKIM on incoming and outgoing mail. We found that while more than half of the top 20,000 receiving MTAs supported TLS, and support for TLS is increasing, servers do not check certificates, opening the Internet email system up to man in -the-middle eavesdropping attacks. At the same time, while use of SPF is common, enforcement is limited. Moreover, few of the senders we examined used DKIM, and fewer still rejected invalid DKIM signatures. Our findings show that the global email system provides some protection against passive eavesdropping, limited protection against unprivileged peer message forgery, and no protection against active network-based attacks. We observe that protection even against the latter is possible using existing protocols with proper enforcement.
引用
收藏
页码:450 / 463
页数:14
相关论文
共 50 条
  • [1] Security by any other name
    不详
    [J]. FOREIGN POLICY, 2002, (130) : 19 - 19
  • [2] Security by any other name: negative security, positive security, and a multi-actor security approach
    Gjorv, Gunhild Hoogensen
    [J]. REVIEW OF INTERNATIONAL STUDIES, 2012, 38 (04) : 835 - 859
  • [3] What Email Servers Can Tell to Johnny: An Empirical Study of Provider-to-Provider Email Security
    Kambourakis, Georgios
    Gil, Gerard Draper
    Sanchez, Ignacio
    [J]. IEEE ACCESS, 2020, 8 (08): : 130066 - 130081
  • [4] The Security Email Based on Smart Card
    Zhang Lina
    Meng Hai Jiang
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 1634 - 1639
  • [5] Email security revisited
    Lampitt, W
    [J]. CANADIAN MEDICAL ASSOCIATION JOURNAL, 1997, 157 (05) : 574 - 574
  • [6] Mail Security Gateway Mechanism for Email Security
    Fan, Linna
    Ma, Yufeng
    Kou, Wanli
    Kang, Dong
    Wang, Tianqi
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1709 - 1716
  • [7] Risks in email security
    Levi, A
    Koç, ÇK
    [J]. COMMUNICATIONS OF THE ACM, 2001, 44 (08) : 112 - 112
  • [8] IN THE NAME OF SECURITY
    Moorehead, Caroline
    [J]. INDEX ON CENSORSHIP, 2005, 34 (01) : 31 - 36
  • [9] COMPARATIVE EFFECTIVENESS OR EVIDENCE-BASED MEDICAL PRACTICE: "A ROSE BY ANY OTHER NAME ... "
    Langer, Menachem
    Langer, Nieli
    [J]. EDUCATIONAL GERONTOLOGY, 2009, 35 (11) : 1046 - 1051
  • [10] BY ANY OTHER NAME
    THOMSON, KS
    [J]. AMERICAN SCIENTIST, 1995, 83 (06) : 514 - 517