How is e-mail sender authentication used and misused?

Tatsuya Mori, Yousuke Takahashi, Kazumichi Sato, Keisuke Ishibashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

E-mail sender authentication is a promising way of verifying the sources of e-mail messages. Since today's primary e-mail sender authentication mechanisms are designed as fully decentralized architecture, it is crucial for e-mail operators to know how other organizations are using and misusing them. This paper addresses the question "How is the DNS Sender Policy Framework (SPF), which is the most popular e-mail sender authentication mechanism, used and misused in the wild?" To the best of our knowledge, this is the first extensive study addressing the fundamental question. This work targets both legitimate and spamming domain names and correlates them with multiple data sets, including the e-mail delivery logs collected from medium-scale enterprise networks and various IP reputation lists. We first present the adoption and usage of DNS SPF from both global and local viewpoints. Next, we present empirically why and how spammers leverage the SPF mechanism in an attempt to pass a simple SPF authentication test. We also present that non-negligible volume of legitimate messages originating from legitimate senders will be rejected or marked as potential spam with the SPF policy set by owners of legitimate domains. Our findings will help provide (1) e-mail operators with useful insights for setting adequate sender or receiver policies and (2) researchers with the detailed measurement data for understanding the feasibility, fundamental limitations, and potential extensions to e-mail sender authentication mechanisms.

Original languageEnglish
Title of host publicationProceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011
Pages31-37
Number of pages7
DOIs
Publication statusPublished - 2011 Oct 13
Externally publishedYes
Event8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011 - Perth, WA, Australia
Duration: 2011 Sep 12011 Sep 2

Publication series

NameACM International Conference Proceeding Series

Conference

Conference8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011
CountryAustralia
CityPerth, WA
Period11/9/111/9/2

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'How is e-mail sender authentication used and misused?'. Together they form a unique fingerprint.

  • Cite this

    Mori, T., Takahashi, Y., Sato, K., & Ishibashi, K. (2011). How is e-mail sender authentication used and misused? In Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011 (pp. 31-37). (ACM International Conference Proceeding Series). https://doi.org/10.1145/2030376.2030380