Slides Credit: Sogand Sadrhaghighi

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Basic Communication on the Internet:
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Cryptography and Network Security
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
DNSOP WG IETF-67 SPF/Sender-ID DNS & Internet Threat Douglas Otis
Chapter 8 Web Security.
Security Jonathan Calazan December 12, 2005.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
SMTP, POP3, IMAP.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Wireless and Security CSCI 5857: Encoding and Encryption.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
File Transfer Protocol (FTP)
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Karlstad University IP security Ge Zhang
SPF/Sender-ID DNS & DDoS Threats Operations Analysis and Research Center for the Internet Douglas Otis November 3, 2007
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
SPF/Sender-ID DNS & DDoS Threats Internet Security Operations and Intelligence II Douglas Otis
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Presented by Phani Krishna P
Unit 3 Section 6.4: Internet Security
Dibyajit Computer Security Hacking dibyajit
Unit 3 Section 6.4: Internet Security
Cryptography and Network Security
What Is DMARC Brian Reid Microsoft Office Servers and Services MVP
Secure Sockets Layer (SSL)
Internet Security CS457 Seminar Zhao Cheng
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Understand Networking Services
Misc. Security Items.
CS 465 Secure Last Updated: Nov 30, 2017.
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
By Ian Foster, Jon Larson, Max Masich, Alex C
Cryptography and Network Security
Domain-based Authentication, Reporting, and Conformance
Amit Kulkarni February 17, 2004
draft-ipdvb-sec-01.txt ULE Security Requirements
Cryptography and Network Security
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The Secure Sockets Layer (SSL) Protocol
Advanced Computer Networks
How We Fight Against Scam
Cryptography and Network Security
Presentation transcript:

Slides Credit: Sogand Sadrhaghighi An Empirical Analysis of Email Delivery Security Zakir Durumeric et al. ACM IMC 2015 Slides Credit: Sogand Sadrhaghighi

How is your everyday email protected? Motivation How is your everyday email protected?

SMTP (Simple Mail Transfer Protocol) SMTP is the Internet standard for sending and relaying email.

SMTP Security The original SMTP (RFC 821) had no built-in security at all. There have been several security extensions over the years: Confidentiality (encrypt email in transit) 1 STARTTLS Authenticate email on receipt 1 DKIM (Domain Keys Identified Mail) 2 SPF (Sender Policy Framework) 3 DMARC (Domain-based Message Authentication, Reporting + Conformance) Deployment is voluntary and (usually) invisible to end users!

Two Empirical Datasets 16 months of gmail inbound/outbound messages Longitudinal view: January 2014 to April 2015 Used Google’s “Transparency Report” for message stats Also: analysis of ciphers negotiated with SMTP servers Mail servers from the top 1 million Alexa domains Snapshot view: current state as of April 2015 Performed MX lookups in DNS for popular domains For domains with mail servers (79%), a DNS query was used to identify security extensions supported (if any) Attempted SMTP/STARTTLS handshake using Zmap

STARTTLS: TLS for SMTP Allows TLS session to be started during an SMTP connection Mail is transferred over an encrypted session Protection against passive eavesdroppers

Destination mail server STARTTLS: TLS for SMTP Source mail server Destination mail server

Empirical Measurements of STARTTLS Based on the volume of messages protected by STARTTLS As of April 26, 2015 STARTTLS Initiation Increase from January 2014 Outgoing messages 80% 54% Incoming messages 60% 82% Yahoo and Hotmail deploying STARTTLS Poodle vulnerability Weekends 10% more than weekdays

Cipher Suite Analysis Findings: 80% of outbound connections are protected by TLS About half of all incoming connections chose a strong cipher suite About 45% of clients use RC4 despite its known weaknesses

Security Threats STARTTLS provides protection against passive eavesdroppers, but not against active attackers who can tamper with packets STARTTLS is designed to “fail open” rather than “fail closed” (i.e., defaults to plain text if TLS negotiation fails) An active attacker can manipulate the packets containing STARTTLS to prevent servers from establishing a secure channel! TCP handshake 220 Ready EHLO XXXX Client Server Plain text

Geographical Analysis of Active Attacks Cisco exploits this feature to detect spammers and prevent attacks. Downfall: Every email from your country will be in plain text!

SPF (Sender Policy Framework) Authentication When we receive a message, we want to see if it is sent from someone authorized in the source domain. Detecting spams Allows a domain to put a DNS TXT record that lists the IP addresses of their legitimate mail servers Example: <spf-mail.example.com> “v=sfp1 ip4:64.18.0.0/20 -all” SPF (Sender Policy Framework)

DKIM (Domain Keys Identified Mail ) The sender publishes its public key in a DNS record Sender attaches cryptographic signature in a message’s header Recipient checks the signature, using the public key p Signing domain Body hash Digital signature of the content

DMARC DMARC: Domain-based Message Authentication, Reporting, and Conformance Builds upon DKIM and SPF Allows a sender to publishes a mail policy in a DNS record. Recipient checks for the sender’s policy

Empirical Measurements Delivered Gmail Messages Top Million Domains April 2015

Conclusions SMTP by itself is NOT secure Mail community has started to deploy new security extensions, but progress is slow for small organizations STARTTLS is not a long-term solution, since active attacks are prevalent and potentially very serious