词条 | Email authentication |
释义 |
Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages and validating the identities of the any message MTAs who participated in transferring and possibly modifying a message. The original base of Internet email, Simple Mail Transfer Protocol (SMTP), has no such feature, so forged sender addresses in emails (a practice known as email spoofing) have been widely used in phishing, email spam, and various types of fraud. To combat this, a large number of competing email authentication proposals have been developed, but only fairly recently have three been widely adopted – SPF, DKIM and DMARC.[1][2] The results of such validation can be used in automated email filtering, or can assist recipients when selecting an appropriate action. This article does not cover user authentication of email submission and retrieval. RationaleIn the early 1980s, when Simple Mail Transfer Protocol (SMTP) was designed, it provided for no real verification of sending user or system. This was not a problem while email systems were run by trusted corporations and universities, but since the commercialization of the Internet in the early 1990s, spam, phishing, and other crimes increasingly involve email. Email authentication is a necessary first step towards identifying the origin of messages, and thereby making policies and laws more enforceable. Nature of the problemSMTP defines message transport, not the message content. Thus, it defines the mail envelope and its parameters, such as the envelope sender, but not the header (except trace information) nor the body of the message itself. STD 10 and {{IETF RFC|5321}} define SMTP (the envelope), while STD 11 and {{IETF RFC|5322}} define the message (header and body), formally referred to as the Internet Message Format. SMTP defines the trace information of a message, which is saved in the header using the following two fields:[3]
A MUA knows the outgoing mail SMTP server from its configuration. A MTA (or a relay server) typically determines which server to connect to by looking up the MX (Mail eXchange) DNS resource record for each recipient's domain name The path depicted on the left can be reconstructed on the ground of the trace header fields that each host adds to the top of the header when it receives the message:[4] Return-Path: <author@example.com>Received: from D.example.org by E.example.org with SMTP; Tue, 05 Feb 2013 11:45:02 -0500 Received: from C.example.net by D.example.org with SMTP; Tue, 05 Feb 2013 11:45:02 -0500Received: from B.example.com (b.example.com [192.0.2.1]) by C.example.net (which is me) with ESMTP id 936ADB8838C for <different-recipient@example.net>; Tue, 05 Feb 2013 08:44:50 -0800 (PST)Received: from A.example.com by B.example.com with SMTP; Tue, 05 Feb 2013 17:44:47 +0100Received: from [192.0.2.27] by A.example.com with SMTP; Tue, 05 Feb 2013 17:44:42 +0100 It is important to realize that the first few lines at the top of the header are usually trusted by the recipient. In fact, those lines are written by machines in the recipient's ADMD, which act upon her or his explicit mandate. By contrast, the lines that prove the involvement of A and B, as well as of the purported author's MUA could be a counterfeit created by C. The Normally, messages sent out by an author's ADMD go directly to the destination's MX (that is B → D in the figures). The sender's ADMD can add authentication tokens only if the message goes through its boxes. The most common cases can be schematized as follows: Sending from within ADMD's network (MUA 1)
Roaming user (MUA 2)
Disconnected user
Authentication methods in widespread useSPF{{Main|Sender Policy Framework}}SPF allows the receiver to check that an email claimed to have come from a specific domain comes from an IP address authorized by that domain's administrators. Usually, a domain administrator will authorize the IP addresses used by their own outbound MTAs, including any proxy or smarthost.[10][11] The IP address of the sending MTA is guaranteed to be valid by the Transmission Control Protocol, as it establishes the connection by checking that the remote host is reachable.[12] The receiving mail server receives the DKIM{{Main|DomainKeys Identified Mail}}DKIM checks the message content, deploying digital signatures. Rather than using digital certificates, the keys for signature-verification are distributed via the DNS. That way, a message gets associated to a domain name.[14] A DKIM-compliant domain administrator generates one or more pairs of asymmetric keys, then hands private keys to the signing MTA, and publishes public keys on the DNS. The DNS labels are structured as DMARC{{Main|Domain-based Message Authentication, Reporting & Conformance}}DMARC allows the specification of a policy for authenticated messages. It is built on top of two existing mechanisms, Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). It allows the administrative owner of a domain to publish a policy in their DNS records to specify which mechanism (DKIM, SPF or both) is employed when sending email from that domain; how to check the Other methodsA range of other methods have been proposed, but are now either deprecated or have not yet gained widespread support. These have included Sender ID, Certified Server Validation, DomainKeys and those below: ADSP{{Main|Author Domain Signing Practices}}ADSP allows the specification of a policy for messages signed by the author's domain. A message has to go through DKIM authentication first, then ADSP can demand a punishing treatment if the message is not signed by the author domain(s) —as per the The ADSP record for ADSP is designed for domains heavily abused by phishing and similar fraud. They may want to forgo mail facilities such as mailing lists and non delivery reports, which can happen to remain unsigned, in exchange for a cut in abuse.[17] ADSP was demoted to historic in November 2013. VBR{{Main|Vouch by Reference}}VBR adds a vouch to an already authenticated identity. This method requires some globally recognized authorities that certify the reputation of domains. A sender can apply for a reference at a vouching authority. The reference, if accepted, is published on the DNS branch managed by that authority. A vouched sender should add a iprev{{Main|Forward-confirmed reverse DNS}}Applications should avoid using this method as a means of authentication.[19] Nevertheless, it is often carried out and its results, if any, written in the The IP reverse, confirmed by looking up the IP address of the name just found, is just an indication that the IP was set up properly in the DNS. The reverse resolution of a range of IP addresses can be delegated to the ADMD that uses them,[20] or can remain managed by the network provider. In the latter case, no useful identity related to the message can be obtained. Authentication-ResultsRFC 7601 defines a trace header field For example, the following field is purportedly written by Authentication-Results: receiver.example.org; spf=pass smtp.mailfrom=example.com; dkim=pass header.i=@example.com The first token after the field name, For a Mail User Agent (MUA), it is slightly harder to learn what identities it can trust. Since users can receive email from multiple domains—e.g., if they have multiple email addresses -— any of those domains could let The Internet Assigned Numbers Authority maintains a registry of Email Authentication Parameters. Not all parameters need to be registered, though. For example, there can be local "policy" values designed for a site's internal use only, which correspond to local configuration and need no registration. On the other hand, this header field is meant to report results based on data already present in the message. Data retrieved from third parties, such as global reputation systems, are not compliant with RFC 7601. For example, an attempt to register how to add DNSWL results to this field was rejected on that basis.[21] See also
Footnotes1. ^{{cite arXiv |author1=Hang Hu |author2=Peng Peng |author3=Gang Wang |title=Towards the Adoption of Anti-spoofing Protocols |eprint=1711.06654 |class=cs.CR |year=2017 }} 2. ^{{cite web |last1=kerner |first1=Sean Michael |title=DMARC Email Security Adoption Grows in U.S. Government |url=http://www.eweek.com/security/dmarc-email-security-adoption-grows-in-u.s.-government |publisher=eWeek |accessdate=24 November 2018}} 3. ^{{cite IETF|title=Simple Mail Transfer Protocol|rfc=5321|author=John Klensin|sectionname=Trace Information|section=4.4| date=October 2008 |publisher=IETF}} 4. ^{{cite IETF |title=Simple Mail Transfer Protocol |rfc=5321 |author=John Klensin |date=October 2008 |publisher=IETF |accessdate=1 February 2013 |quote=When the SMTP server accepts a message either for relaying or for final delivery, it inserts a trace record (also referred to interchangeably as a "time stamp line" or "Received" line) at the top of the mail data. This trace record indicates the identity of the host that sent the message, the identity of the host that received the message (and is inserting this time stamp), and the date and time the message was received. Relayed messages will have multiple time stamp lines.}} 5. ^For example, a user can instruct Gmail to forward messages to a different email address. The sender is not necessarily aware of that. 6. ^Properly configured proxies appear as part of the author ADMD. 7. ^Some ADMDs block outbound connection to port 25 (SMTP) to avoid this. This proactive technique is described in RFC 5068. In addition, some block inbound SMTP connections from IPs listed as dialup/DSL/cable. 8. ^1 2 3 In this case the author's ADMD is not involved at all. 9. ^Some ISPs block port 587, although RFC 5068 clearly says: Access Providers MUST NOT block users from accessing the external Internet using the SUBMISSION port 587. 10. ^{{cite IETF |title=Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1 |rfc=7208 |author1=Scott Kitterman |date=April 2014 |publisher=IETF |accessdate=26 April 2014 |quote=There are three places that techniques can be used to ameliorate unintended SPF failures with mediators.}} 11. ^{{cite IETF |title=Simple Mail Transfer Protocol |sectionname=Alias |section=3.9.1 |rfc=5321 |author=J. Klensin |date=October 2008 |publisher=IETF |accessdate=15 February 2013}} 12. ^IP Address forgery is possible, but generally involves a lower level of criminal behavior (breaking and entering, wiretapping, etc.), which are too risky for a typical hacker or spammer, or insecure servers not implementing RFC 1948, see also Transmission Control Protocol#Connection hijacking. 13. ^{{cite web |title=How reliable is it to block/reject on SPF fail? |url=http://www.gossamer-threads.com/lists/spf/help/35352#35352 |author=Scott Kitterman |date=Nov 21, 2009 |work=spf-help |publisher=gossamer-threads.com |quote=I think it's generally fine as long as you offer a mechanism for whitelisting of non-SRS forwarders.}} 14. ^{{cite IETF |title=DomainKeys Identified Mail (DKIM) Signatures |rfc=6376 |editor1=D. Crocker |editor2=T. Hansen |editor3=M. Kucherawy |date=September 2011 |publisher=IETF |accessdate=18 February 2013 |quote=DomainKeys Identified Mail (DKIM) permits a person, role, or organization to claim some responsibility for a message by associating a domain name with the message, which they are authorized to use.}} 15. ^{{cite web |url=http://www.dkim.org/info/dkim-faq.html |title=DKIM Frequently Asked Questions |author=Dave Crocker |date=16 Oct 2007 |publisher=DKIM.org |accessdate=17 February 2013}} 16. ^{{cite IETF |title=DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP) |rfc=5616|author1=E. Allman |author2=J. Fenton |author3=M. Delany |author4=J. Levine |date=August 2009 |publisher=IETF |accessdate=18 February 2013}} 17. ^{{Citation |author1=Barry Leiba |author2=Mike Thomas |author3=Dave Crocker |title=Author Domain Signing Practices (ADSP): Point and Counterpoint |journal=Internet Computing |volume=15 |issue=1 |pages=76–80 |year=2011 |doi=10.1109/MIC.2011.1 }} 18. ^{{cite IETF |title=Vouch By Reference |rfc=5518 |author1=P. Hoffman |author2=J. Levine |author3=A. Hathcock |date=April 2009 |publisher=IETF |accessdate=18 February 2013}} 19. ^1 {{cite IETF |title=Message Header Field for Indicating Message Authentication Status |rfc=7601 |author=Murray Kucherawy |date=August 2015 |publisher=IETF |accessdate=30 September 2015}} 20. ^{{cite IETF |title=Classless IN-ADDR.ARPA delegation |rfc=2317|author1=H. Eidnes |author2=G. de Groot |author3=P. Vixie |date=March 1998 |publisher=IETF |accessdate=18 February 2013}} 21. ^{{cite mailing list |url=https://mailarchive.ietf.org/arch/msg/apps-discuss/51wzEyf7uRqRneWaMXtCeE2oqwM |title=draft authmethod dnswl |date=19 April 2016 |accessdate=27 April 2016 |mailing-list=apps-discuss |author=Murray S. Kucherawy |language=en |publisher=IETF|quote=The zone itself is not part of the message, so it's not a candidate for a dedicated ptype}} References{{reflist}}{{spamming}}{{Scams and confidence tricks}}{{DEFAULTSORT:Email Authentication}} 3 : Email authentication|Internet fraud|Spamming |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。