skip to main content
10.1145/3485447.3512228acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol

Published: 25 April 2022 Publication History

Abstract

Email authentication protocols such as SPF, DKIM, and DMARC are used to detect spoofing attacks, but they face key challenges when handling email forwarding scenarios. Recently in 2019, a new Authenticated Received Chain (ARC) protocol was introduced to support mail forwarding applications to preserve the authentication records. After 2 years, it is still not well understood how ARC is implemented, deployed, and configured in practice. In this paper, we perform an empirical analysis on ARC usage and examine how it affects spoofing detection decisions on popular email provides that support ARC. After analyzing an email dataset of 600K messages, we show that ARC is not yet widely adopted, but it starts to attract adoption from major email providers (e.g., Gmail, Outlook). Our controlled experiment shows that most email providers’ ARC implementations are done correctly. However, some email providers (Zoho) have misinterpreted the meaning of ARC results, which can be exploited by spoofing attacks. Finally, we empirically investigate forwarding-based “Hide My Email” services offered by iOS 15 and Firefox, and show their implementations break ARC and can be leveraged by attackers to launch more successful spoofing attacks against otherwise well-configured email receivers (e.g., Gmail).

References

[1]
K. Andersen, B. Long, S. Blank, and M. Kucherawy. 2019. The Authenticated Received Chain (ARC) Protocol. RFC8617. https://datatracker.ietf.org/doc/html/rfc8617.
[2]
Apple. 2021. What is Hide My Email?https://support.apple.com/en-us/HT210425.
[3]
Marc Bradshaw. 2021. Fastmail Authentication Milter. https://github.com/fastmail/authentication_milter.
[4]
Jianjun Chen, Vern Paxson, and Jian Jiang. 2020. Composition Kills: A Case Study of Email Sender Authentication. In Proc. of USENIX Security.
[5]
D. Crocker, T. Hansen, and M. Kucherawy. 2011. DomainKeys Identified Mail (DKIM) Signatures. RFC6376. https://tools.ietf.org/html/rfc6376.
[6]
Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael Bailey, and J. Alex Halderman. 2015. Neither Snow Nor Rain Nor MITM: An Empirical Analysis of Email Delivery Security. In Proc. of IMC.
[7]
Firefox. 2021. Firefox Relay. https://relay.firefox.com/.
[8]
Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko. 2015. Security by Any Other Name: On the Effectiveness of Provider Based Email Security. In Proc. of CCS.
[9]
Hang Hu, Peng Peng, and Gang Wang. 2018. Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems. In Proc. of SecDev.
[10]
Hang Hu and Gang Wang. 2018. End-to-End Measurements of Email Spoofing Attacks. In Proc. of USENIX Security.
[11]
S. Kitterman. 2014. Sender Policy Framework (SPF). RFC7208. https://tools.ietf.org/html/rfc7208.
[12]
M. Kucherawy and E. Zwicky. 2015. Domain-based Message Authentication, Reporting, and Conformance (DMARC). RFC7489. https://tools.ietf.org/html/rfc7489.
[13]
John Levine. 2015. What’s ARC?https://circleid.com/posts/20151028_what_is_authenticated_received_chain_arc.
[14]
Mailman3. 2021. Mailman3 Mailing List Manager. https://docs.mailman3.org/en/latest/.
[15]
Sourena Maroofi, Maciej Korczynski, Arnold Hölzel, and Andrzej Duda. 2021. Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis. IEEE Trans. Netw. Serv. Manag. 18, 3 (2021), 3184–3196.
[16]
Daniela Oliveira, Harold Rocha, Huizi Yang, Donovan Ellis, Sandeep Dommaraju, Melis Muradoglu, Devon Weir, Adam Soliman, Tian Lin, and Natalie Ebner. 2017. Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing. In Proc. of CHI.
[17]
OpenARC. 2021. The Trusted Domain Project: OpenARC. https://github.com/trusteddomainproject/OpenARC.
[18]
J. B. Postel. 1982. Simple Mail Transfer Protocol (SMTP). RFC821. https://tools.ietf.org/html/rfc821.
[19]
Florian Quinkert, Dennis Tatang, and Thorsten Holz. 2021. Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy. In Proc. of DIMVA.
[20]
P. Resnick. 2001. Internet Message Format(RFC5321). https://www.ietf.org/rfc/rfc2822.txt.
[21]
Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, and Min Yang. 2021. Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. In Proc. of USENIX Security.
[22]
Sympa. 2021. Sympa Mailing List Manager. https://www.sympa.org/.
[23]
Dennis Tatang, Florian Zettl, and Thorsten Holz. 2021. The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws. In Proc. of RAID.
[24]
TrendMicro. 2021. White Paper by Osterman Research: How to Reduce the Risk of Phishing and Ransomware. https://resources.trendmicro.com/rs/945-CXD-062/images/Reduce-Phishing-Ransomware_Trend-Micro.pdf.

Cited By

View all
  • (2024)Stress Testing the DMARC Reporting System: Compliance with Standards and Ways of ImprovementProceedings of the 20th International Conference on emerging Networking EXperiments and Technologies10.1145/3680121.3697809(1-9)Online publication date: 9-Dec-2024
  • (2024)Spoofed Emails: An Analysis of the Issues Hindering a Larger Deployment of DMARCPassive and Active Measurement10.1007/978-3-031-56249-5_10(232-261)Online publication date: 11-Mar-2024
  • (2023)The Effectiveness of DKIM and SPF in Strengthening Email Security2023 10th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud58648.2023.00068(422-426)Online publication date: 14-Aug-2023
  • Show More Cited By

Index Terms

  1. Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Conferences
            WWW '22: Proceedings of the ACM Web Conference 2022
            April 2022
            3764 pages
            ISBN:9781450390965
            DOI:10.1145/3485447
            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Sponsors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 25 April 2022

            Permissions

            Request permissions for this article.

            Check for updates

            Author Tags

            1. ARC
            2. Email Forwarding Security
            3. Spoofing Attack

            Qualifiers

            • Research-article
            • Research
            • Refereed limited

            Conference

            WWW '22
            Sponsor:
            WWW '22: The ACM Web Conference 2022
            April 25 - 29, 2022
            Virtual Event, Lyon, France

            Acceptance Rates

            Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)48
            • Downloads (Last 6 weeks)5
            Reflects downloads up to 08 Mar 2025

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Stress Testing the DMARC Reporting System: Compliance with Standards and Ways of ImprovementProceedings of the 20th International Conference on emerging Networking EXperiments and Technologies10.1145/3680121.3697809(1-9)Online publication date: 9-Dec-2024
            • (2024)Spoofed Emails: An Analysis of the Issues Hindering a Larger Deployment of DMARCPassive and Active Measurement10.1007/978-3-031-56249-5_10(232-261)Online publication date: 11-Mar-2024
            • (2023)The Effectiveness of DKIM and SPF in Strengthening Email Security2023 10th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud58648.2023.00068(422-426)Online publication date: 14-Aug-2023
            • (2023)Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP57164.2023.00030(373-391)Online publication date: Jul-2023

            View Options

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format.

            HTML Format

            Figures

            Tables

            Media

            Share

            Share

            Share this Publication link

            Share on social media