Paper Abstract and Keywords |
Presentation |
2010-07-01 15:05
On the use and misuse of E-mail sender authentication mechanisms Tatsuya Mori (NTT) ISEC2010-22 SITE2010-18 ICSS2010-28 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
E-mail sender authentication is a promising way of verifying the sources of e-mail messages. Since to- day’s primary e-mail sender authentication mechanisms are designed as fully decentralized architecture, it is crucial for e-mail operators to know how other organizations are using and misusing them. This paper aims to address the question “How is the DNS Sender Policy Framework (SPF), which is the most popular e-mail sender authentication mechanism, used and misused in the wild?” To the best of our knowledge, this is the first extensive study addressing the fundamental question. This work targets both legitimate and spamming domain names and correlates them with multiple data sets, including the e-mail delivery logs collected from medium-scale enterprise networks and various IP reputation lists. We first present the adoption and usage of DNS SPF from both global and local viewpoints. Next, we present empirically why and how spammers leverage the SPF mechanism in an attempt to pass a simple SPF authentication test. We also present that non-negligible volume of legitimate messages originating from legitimate senders will be rejected or marked as potential spam with the SPF policy set by owners of legitimate domains. Our findings will help provide (1) e-mail operators with useful insights for setting adequate sender or receiver policies and (2) researchers with the detailed measurement data for understanding the feasibility, fundamental limitations, and potential extensions to e-mail sender authentication mechanisms. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
spam / sender authentication / SPF / measurement / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 110, no. 115, ICSS2010-28, pp. 101-106, July 2010. |
Paper # |
ICSS2010-28 |
Date of Issue |
2010-06-24 (ISEC, SITE, ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ISEC2010-22 SITE2010-18 ICSS2010-28 |
Conference Information |
Committee |
ISEC IPSJ-CSEC SITE ICSS |
Conference Date |
2010-07-01 - 2010-07-02 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Hirosaki University |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ICSS |
Conference Code |
2010-07-ISEC-CSEC-SITE-ICSS |
Language |
English (Japanese title is available) |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
On the use and misuse of E-mail sender authentication mechanisms |
Sub Title (in English) |
|
Keyword(1) |
spam |
Keyword(2) |
sender authentication |
Keyword(3) |
SPF |
Keyword(4) |
measurement |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Tatsuya Mori |
1st Author's Affiliation |
NTT Service Integration Laboratories (NTT) |
2nd Author's Name |
|
2nd Author's Affiliation |
() |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2010-07-01 15:05:00 |
Presentation Time |
25 minutes |
Registration for |
ICSS |
Paper # |
ISEC2010-22, SITE2010-18, ICSS2010-28 |
Volume (vol) |
vol.110 |
Number (no) |
no.113(ISEC), no.114(SITE), no.115(ICSS) |
Page |
pp.101-106 |
#Pages |
6 |
Date of Issue |
2010-06-24 (ISEC, SITE, ICSS) |
|