Techniques aimed at providing verifiable information about the origin of email messages
Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message.
The original base of Internet email, Simple Mail Transfer Protocol (SMTP), has no such feature, so forged sender addresses in emails (a practice known as email spoofing) have been widely used in phishing, email spam, and various types of frauds. To combat this, many competing email authentication proposals have been developed. By 2018[update] three had been widely adopted – SPF, DKIM and DMARC.[1][2] The results of such validation can be used in automated email filtering, or can assist recipients when selecting an appropriate action.
This article does not cover user authentication of email submission and retrieval.
Rationale
In the early 1980s, when Simple Mail Transfer Protocol (SMTP) was designed, it provided for no real verification of sending user or system. This was not a problem while email systems were run by trusted corporations and universities, but since the commercialization of the Internet in the early 1990s, spam, phishing, and other crimes have been found to increasingly involve email.
Email authentication is a necessary first step towards identifying the origin of messages, and thereby making policies and laws more enforceable.
Hinging on domain ownership is a stance that emerged in the early 2000.[3][4] It implies a coarse-grained authentication, given that domains appear on the right part of email addresses, after the at sign. Fine-grain authentication, at user level, can be achieved by other means, such as Pretty Good Privacy and S/MIME. At present, digital identity needs to be managed by each individual.
An outstanding rationale for email authentication is the ability to automate email filtering at receiving servers. That way, spoofed messages can be rejected before they arrive to a user's Inbox. While protocols strive to devise ways to reliably block distrusted mail, security indicators can tag unauthenticated messages that still reach the Inbox. A 2018 study shows that security indicators can lower the click-through ratio by more than ten points, 48.9% to 37.2% of the users who open spoofed messages.[5]
Nature of the problem
SMTP defines message transport, not the message content. Thus, it defines the mail envelope and its parameters, such as the envelope sender, but not the header (except trace information) nor the body of the message itself. STD 10 and RFC5321 define SMTP (the envelope), while STD 11 and RFC5322 define the message (header and body), formally referred to as the Internet Message Format.
SMTP defines the trace information of a message, which is saved in the header using the following two fields:[6]
Received: when an SMTP server accepts a message it inserts this trace record at the top of the header (last to first).
Return-Path: when the delivery SMTP server makes the final delivery of a message, it inserts this field at the top of the header.
A mail user agent (MUA) knows the outgoing mail SMTP server from its configuration. An MTA (or a relay server) typically determines which server to connect to by looking up the MX (Mail eXchange) DNS resource record for each recipient's domain name.
The path depicted below can be reconstructed on the ground of the trace header fields that each host adds to the top of the header when it receives the message:[6]
Return-Path:<[email protected]>Received:fromD.example.orgbyE.example.orgwithSMTP;Tue, 05 Feb 2013 11:45:02 -0500Received:fromC.example.netbyD.example.orgwithSMTP;Tue, 05 Feb 2013 11:45:02 -0500Received:fromB.example.com(b.example.com[192.0.2.1])
byC.example.net(whichisme)withESMTPid936ADB8838C
for<[email protected]>;Tue, 05 Feb 2013 08:44:50 -0800(PST)
Received:fromA.example.combyB.example.comwithSMTP;Tue, 05 Feb 2013 17:44:47 +0100Received:from[192.0.2.27]byA.example.comwithSMTP;Tue, 05 Feb 2013 17:44:42 +0100
The first few lines at the top of the header are usually trusted by the recipient. Those lines are written by machines in the recipient's Administrative Management Domain (ADMD), which act upon their explicit mandate. By contrast, the lines that prove the involvement of A and B, as well as of the purported author's MUA could be a counterfeit created by C. The Received: field shown above is an epoch-making piece of the header. The Return-Path: is written by E, the mail delivery agent (MDA), based on the message envelope. Additional trace fields, designed for email authentication, can populate the top of the header.
Normally, messages sent out by an author's ADMD go directly to the destination's MX (that is B → D in the figures). The sender's ADMD can add authentication tokens only if the message goes through its boxes. The most common cases can be schematized as follows:
Sending from within ADMD's network (MUA 1)
The ADMD's MSA authenticates the user, either based on its IP address or some other SMTP Authentication means. Depending on the recipient address, the message can follow the normal path or pass through a mailing list or a forwarding service.[note 1]B can be an outbound SMTP proxy or a smarthost.[note 2]
If the local network does not block outbound port 25 connections,[note 3] the user can deploy some "direct-to-mx" software.[note 4] Typically, zombies and other malicious hosts behave that way.
If the MUA is badly configured, it can also use a different relay, such as an outmoded open relay, that often does not authenticate the user.
Roaming user (MUA 2)
Most of the times it is still possible to use one's own ADMD MSA.[note 5]
Outbound connections to port 25 can be intercepted and tunnelled to a transparent proxy.[note 4]
A MUA can be configured to use an SMTP relay that the local network provider offers as a bonus.[note 4]
Disconnected user
An e-card can send mail on behalf of a customer who typed email addresses on the local keyboard; some web forms can be considered to work similarly.[note 4]
Section notes
^For example, a recipient can instruct Gmail to forward messages to a different email address. The sender is not necessarily aware of that.
^Properly configured proxies appear as part of the author ADMD.
^Some ADMDs block outbound connection to port 25 (SMTP) to avoid this. This proactive technique is described in RFC 5068. In addition, some block inbound SMTP connections from IPs listed as dialup/DSL/cable.
^ abcdIn this case the author's ADMD is not involved at all.
^Some ISPs block port 587, although RFC 5068 clearly says:
Access Providers MUST NOT block users from accessing the external Internet using the SUBMISSION port 587.
SPF allows the receiver to check that an email claimed to have come from a specific domain comes from an IP address authorized by that domain's administrators. Usually, a domain administrator will authorize the IP addresses used by their own outbound MTAs, including any proxy or smarthost.[7][8]
The IP address of the sending MTA is guaranteed to be valid by the Transmission Control Protocol, as it establishes the connection by checking that the remote host is reachable.[9] The receiving mail server receives the HELOSMTP command soon after the connection is set up, and a Mail from: at the beginning of each message. Both of them can contain a domain name. The SPF verifier queries the Domain Name System (DNS) for a matching SPF record, which if it exists will specify the IP addresses authorized by that domain's administrator. The result can be "pass", "fail", or some intermediate result - and systems will generally take this into account in their anti-spam filtering.[10]
DKIM checks the message content, deploying digital signatures. Rather than using digital certificates, the keys for signature-verification are distributed via the DNS. That way, a message gets associated to a domain name.[11]
A DKIM-compliant domain administrator generates one or more pairs of asymmetric keys, then hands private keys to the signing MTA, and publishes public keys on the DNS. The DNS labels are structured as selector._domainkey.example.com, where selector identifies the key pair, and _domainkey is a fixed keyword, followed by the signing domain's name so that publication occurs under the authority of that domain's ADMD. Just before injecting a message into the SMTP transport system, the signing MTA creates a digital signature that covers selected fields of the header and the body (or just its beginning). The signature should cover substantive header fields such as From:, To:, Date:, and Subject:, and then is added to the message header itself, as a trace field. Any number of relays can receive and forward the message and at every hop, the signature can be verified by retrieving the public key from the DNS.[12] As long as intermediate relays do not modify signed parts of a message, its DKIM-signatures remain valid.
It allows the administrative owner of a domain to publish a policy in their DNS records to specify which mechanism (DKIM, SPF or both) is employed when sending email from that domain; how to check the From: field presented to end users; how the receiver should deal with failures - and a reporting mechanism for actions performed under those policies.
Other methods
A range of other methods have been proposed, but are now either deprecated or have not yet gained widespread support. These have included Sender ID, Certified Server Validation, DomainKeys and those below:
ADSP allowed the specification of a policy for messages signed by the author's domain. A message had to go through DKIM authentication first, then ADSP could demand a punishing treatment if the message was not signed by the author domain(s) —as per the From: header field.[13]
ADSP was demoted to historic in November 2013.[14]
VBR adds a vouch to an already authenticated identity. This method requires some globally recognized authorities that certify the reputation of domains.
A sender can apply for a reference at a vouching authority. The reference, if accepted, is published on the DNS branch managed by that authority. A vouched sender should add a VBR-Info: header field to the messages it sends. It should also add a DKIM signature, or use some other authentication method, such as SPF. A receiver, after validating the sender's identity, can verify the vouch claimed in VBR-Info: by looking up the reference.[15]
Applications should avoid using this method as a means of authentication.[16] Nevertheless, it is often carried out and its results, if any, written in the Received: header field besides the TCP information required by the SMTP specification.
The IP reverse, confirmed by looking up the IP address of the name just found, is just an indication that the IP was set up properly in the DNS. The reverse resolution of a range of IP addresses can be delegated to the ADMD that uses them,[17] or can remain managed by the network provider. In the latter case, no useful identity related to the message can be obtained.
DNSWL
Looking up a DNSWL (DNS-based whitelist) may provide an assessment of the sender, possibly including its identification.
Authentication-Results
RFC 8601 defines a trace header field Authentication-Results: where a receiver can record the results of email authentication checks that it carried out.[16] Multiple results for multiple methods can be reported in the same field, separated by semicolons and wrapped as appropriate.
For example, the following field is purportedly written by receiver.example.org and reports SPF and DKIM results:
The first token after the field name, receiver.example.org, is the ID of the authentication server, a token known as an authserv-id. A receiver supporting RFC 8601 is responsible to remove (or rename) any false header claiming to belong to its domain so that downstream filters cannot get confused. However, those filters still need to be configured, as they have to know which identities the domain may use.
For a Mail User Agent (MUA), it is slightly harder to learn what identities it can trust. Since users can receive email from multiple domains—e.g., if they have multiple email addresses -— any of those domains could let Authentication-Results: fields pass through because they looked neutral. That way, a malicious sender can forge an authserv-id that the user would trust if the message arrived from a different domain. A legitimate Authentication-Results: typically appears just above a Received: field by the same domain from which the message was relayed. Additional Received: fields may appear between that and the top of the header, as the message got transferred internally between servers belonging to that same, trusted ADMD.
The Internet Assigned Numbers Authority maintains a registry of Email Authentication Parameters. Not all parameters need to be registered, though. For example, there can be local "policy" values designed for a site's internal use only, which correspond to local configuration and need no registration.
^"Email Authentication Summit". workshop. Federal Trade Commission. November 9–10, 2004. Archived from the original on 3 June 2012. Retrieved 4 February 2013. The Report, however, identified domain-level authentication as a promising technological development
^Michael Hammer (14 August 2020). "third party authorization". dmarc-ietf (Mailing list). Retrieved 14 August 2020.
^ abJohn Klensin (October 2008). "Trace Information". Simple Mail Transfer Protocol. IETF. sec. 4.4. doi:10.17487/RFC5321. RFC5321. Retrieved 1 February 2013. When the SMTP server accepts a message either for relaying or for final delivery, it inserts a trace record (also referred to interchangeably as a "time stamp line" or "Received" line) at the top of the mail data. This trace record indicates the identity of the host that sent the message, the identity of the host that received the message (and is inserting this time stamp), and the date and time the message was received. Relayed messages will have multiple time stamp lines.
^IP Address forgery is possible, but generally involves a lower level of criminal behavior (breaking and entering, wiretapping, etc.), which are too risky for a typical hacker or spammer, or insecure servers not implementing RFC 1948, see also Transmission Control Protocol#Connection hijacking.
^Scott Kitterman (Nov 21, 2009). "How reliable is it to block/reject on SPF fail?". spf-help. gossamer-threads.com. I think it's generally fine as long as you offer a mechanism for whitelisting of non-SRS forwarders.
^D. Crocker; T. Hansen; M. Kucherawy, eds. (September 2011). DomainKeys Identified Mail (DKIM) Signatures. IETF. doi:10.17487/RFC6376. RFC6376. Retrieved 18 February 2013. DomainKeys Identified Mail (DKIM) permits a person, role, or organization to claim some responsibility for a message by associating a domain name with the message, which they are authorized to use.
For the Los Lobos album, see The Neighborhood (album). 2018 studio album by The NeighbourhoodThe NeighbourhoodStudio album by The NeighbourhoodReleasedMarch 9, 2018 (2018-03-09)GenreElectropop[1]ambient[2]Length42:58LabelColumbiaProducerLars StalforsMighty MikeDylan BradyDave SitekTony DeMatteoJon BatesLewis HughesRock MafiaDanny ParraThe Neighbourhood chronology Hard to Imagine(2018) The Neighbourhood(2018) Ever Changing(2018) Singles from The Neighbour...
Marguerite DurasMarguerite Duras pada tahun 1993Lahir(1914-04-04)4 April 1914Saigon, Cochinchina, Indochina Prancis (sekarang Vietnam)Meninggal3 Maret 1996(1996-03-03) (umur 81)Paris, PrancisPekerjaanNovelis, pengarang drama, pembuat filmKebangsaanPrancisPeriodeabad ke-20PasanganRobert Antelme; Dionys Mascolo Marguerite Donnadieu, yang dikenal sebagai Marguerite Duras (bahasa Prancis: [maʁ.ɡə.ʁit dy.ʁas]; 4 April 1914 – 3 Maret 1996), adalah seorang novelis, pen...
SM Entertainment IndonesiaJenisPrivateIndustriHiburanDidirikan4 Februari 2019KantorpusatfX Sudirman Level F5, Jakarta Pusat, IndonesiaTokohkunciHan Kyung Jin (CEO)IndukSM Entertainment SM Entertainment Indonesia merupakan kantor representatif cabang Indonesia dari SM Entertainment yang berkantor pusat di Korea Selatan.[1] Di area utama kantor ini terdapat berbagai foto, album, poster, tanda tangan, dan merchandise dari artis dibawah naungan SM Entertainment seperti Super Junior, EXO, ...
All of Us Are DeadPoster promosi KoreaHangul지금 우리 학교는 Hanja只今 우리 學校는 Alih Aksara yang DisempurnakanJigeum Uri Hakgyoneun Genre Aksi Beranjak dewasa Cerita seru Horor Kiamat mayat hidup Pembuat Lee Jae-kyoo Chun Sung-il Kim Nam-su BerdasarkanSchool Attackoleh Joo Dong-geunDitulis olehChun Sung-ilSutradara Lee Jae-kyoo Kim Nam-su Pemeran Park Ji-hu Yoon Chan-young Cho Yi-hyun Lomon Yoo In-soo Lee Yoo-mi Kim Byung-chul Lee Kyu-hyung Jeon Bae-soo Negara asalKorea Sela...
Untuk kegunaan lain, lihat Sumatra (disambiguasi). SumatraNama lokal: سومترا (Jawi)Topografi Pulau SumatraPulau Sumatra di IndonesiaGeografiLokasiAsia TenggaraKoordinat0°00′N 102°00′E / 0.000°N 102.000°E / 0.000; 102.000KepulauanKepulauan Sunda BesarLuas473.481 km2Peringkat luaske-6Titik tertinggiGunung Kerinci (3.805 m)PemerintahanNegara IndonesiaProvinsi Aceh Sumatera Utara Sumatera Barat Riau Jambi ...
Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: Sigara Gara, Patumbak, Deli Serdang – berita · surat kabar · buku · cendekiawan · JSTOR Sigara GaraDesaNegara IndonesiaProvinsiSumatera UtaraKabupatenDeli SerdangKecamatanPatumbakKode pos20361Kode K...
Musical traditions of Gabon This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Music of Gabon – news · newspapers · books · scholar · JSTOR (April 2021) (Learn how and when to remove this template message) A student from Belise Elementary School dances to music from members of the Africa Partnership Station ban...
Wakil Bupati Toraja UtaraPetahanaFrederik Victor Palimbongsejak 26 April 2021KediamanRumah Jabatan Wakil BupatiMasa jabatan5 tahunDibentuk31 Maret 2011Pejabat pertamaFrederik Buntang Rombelayuk Berikut ini adalah daftar wakil bupati Toraja Utara yang menjabat sejak pembentukannya pada tahun 2011 No Potret Wakil Bupati Mulai menjabat Akhir menjabat Partai Bupati Periode Ref. 1 Frederik Buntang Rombelayuk 31 Maret 2011 31 Maret 2016 Frederik Batti Sorring 1 2 Yosia Rinto Kadang 31 Maret 20...
Запрос «Пугачёва» перенаправляется сюда; см. также другие значения. Алла Пугачёва На фестивале «Славянский базар в Витебске», 2016 год Основная информация Полное имя Алла Борисовна Пугачёва Дата рождения 15 апреля 1949(1949-04-15) (75 лет) Место рождения Москва, СССР[1]...
Election in Pennsylvania Main article: 2024 United States presidential election 2024 United States presidential election in Pennsylvania ← 2020 November 5, 2024 2028 → Nominee Joe Biden(presumptive) Donald Trump(presumptive) Party Democratic Republican Home state Delaware Florida Running mate Kamala Harris(presumptive) TBA Incumbent President Joe Biden Democratic Elections in Pennsylvania Federal government U.S. President 1789 1792 1796 1800 1804 1808 18...
Elezioni generali nel Regno Unito del 1992 Stato Regno Unito Data 9 aprile Assemblea Camera dei comuni Leader John Major Neil Kinnock Paddy Ashdown Liste Conservatori Laburisti Liberal Democratici Voti 14.093.00741,9% 11.560.48434,4% 5.999.60617,8% Seggi 336 / 650 271 / 650 20 / 650 Differenza % 0,3% 3,6% 4,8% Differenza seggi 40 42 2 Distribuzione del voto per collegio Primo ministro John Major (Governo Major II) 1987 1997 Le elezioni generali nel Regno Unito del 1992 si tennero ...
L'imprenditore è una figura professionale che esercita un'attività economica finalizzata alla realizzazione di prodotti o servizi, detenendo la proprietà di tutti o di alcuni fattori produttivi. Un imprenditore che dirige più aziende di successo è detto magnate degli affari o tycoon in lingua inglese. Indice 1 L'imprenditore in economia 2 L'imprenditore nel diritto italiano 2.1 Criteri di distinzione 2.2 Statuto generale dell'imprenditore 2.3 Statuto tipico dell'imprenditore commerci...
Cornelius Jansen (1585-1638), seorang profesor di Old University of Louvain. Nama Jansenisme diambil dari namanya. Jansenisme adalah sebuah teologi dan pergerakan yang muncul pada masanya untuk menyerang pokok-pokok teologi etika para Yesuit.[1][2][3] Kaum Jansenis menyalahkan para Yesuit karena ajaran mereka yang penuh optimisme tentang manusia dan juga menentang Yesuit yang memberikan absolusi kepada orang-orang yang mengaku dosa.[1][3][4] Riw...
Alfons FrylandLahir(1888-05-01)1 Mei 1888Wina, Austria-Hungaria (kini Austria)Meninggal29 November 1953(1953-11-29) (umur 65)Graz, AustriaPekerjaanPemeranTahun aktif1921–1933 Alfons Fryland (1 Mei 1888 – 29 November 1953) adalah seorang pemeran film asal Austria.[1] Ia tampil dalam 47 film antara 1921 dan 1933. Filmografi pilihan Labyrinth des Grauens (1921) The Eternal Struggle (1921) Kean (1921) Frau Dorothys Bekenntnis (1921) Herzogin Satanella (1921) M...
هيئة تقويم التعليم والتدريب هيئة تقويم التعليم والتدريب تفاصيل الوكالة الحكومية البلد السعودية تأسست 22\4\1434هـ المركز الرياض، السعودية الإدارة الوزراء المسؤولون خالد بن عبد الله السبتي[1]، رئيس مجلس إدارة هيئة تقويم التعليم والتدريب المدير التنفيذي وليد بن محم�...
Liga Konferensi Eropa UEFA 2021–2022Arena Kombëtare di Tirana tuan rumah pertandingan final.Informasi turnamenJadwalpenyelenggaraanKualifikasi:Juli – Agustus 2021Kompetisi inti:September 2021 – Mei 2022Jumlahtim pesertaKompetisi inti: 32+8Total: 138+46 (dari 54 asosiasi)Hasil turnamenJuara AS Roma (gelar ke-1)Tempat kedua FeyenoordStatistik turnamenJumlahpertandingan140Jumlah gol401 (2,86 per pertandingan)Jumlahpenonton1.978.850 (14.135 per pertandingan)Pencetak golterba...
Так будет выглядеть Венера с биосферой (по версии Дейна Балларда) Возможность существования жизни на Венере обсуждалась десятилетиями. Венера находится гораздо ближе к Солнцу, чем Земля, её поверхность сильно разогрета парниковым эффектом (+462 °C, 735 К[1]), атмосферн�...
Pertempuran Benghazi KeduaBagian dari Perang Saudara LibyaDua howitzer berat Palmaria tentara Gaddafi yang dihancurkan oleh pesawat tempur Prancis di luar Benghazi.Tanggal19–20 Maret 2011LokasiBenghazi, LibyaHasil Kemenangan anti-Gaddafi Tentara pro-Gaddafi gagal merebut Benghazi Titik balik Perang Saudara Libya Intervensi koalisi PBB pertamaPihak terlibat Anti-Gaddafi Penegak Resolusi Dewan Keamanan PBB 1973[1] Prancis[2] Jamahirya Arab LibyaKekuatan 8.000 tentara yang berk...