DMARC. How. is Saving . The New Authentication Standard Putting an End to Abuse
|
|
|
- David James
- 10 years ago
- Views:
Transcription
1 Messaging Masters Series How DMARC is Saving The New Authentication Standard Putting an End to Abuse by Alec Peterson, CTO, Message Systems, and Mike Hillyer, Senior Director, Global Solution Consulting, Message Systems
2 What s this all about, anyway? If you re a high-volume sender of , you already understand the importance of security and deliverability to your initiatives, or you probably wouldn t be reading this. But how much do you know about the sophistication of today s messaging abuse and their risks to your business? With the pace at which new threats evolve, and new measures are devised to counter these threats, it can be hard to keep up. This look at the current state of threats and the DMARC specification the emerging industry standard for authentication will get you up to speed on everything you need to know about protecting our messaging streams, including: The complex and destructive nature of modern attacks. How the world s leading receivers and senders are battling back with DMARC. Why all senders need to adopt DMARC, and how easy it is to implement. Important business benefits achieved by DMARC adoption. 2
3 Digital messaging hinges on trust. Technology may be what powers our growing network of digital communications, but what actually makes it work as a viable medium for information exchange is trust. We need to believe that the name in the From line of an is the true sender, and that the content of the message is legitimate. Without that trust, not only is the authenticity of the message in question, but so is the validity of the entire ecosystem. And that leads to some dire consequences for the ability of businesses to communicate electronically. Consumers will be unwilling to engage in commerce or share information online. Interaction between companies and the vendors they rely on will become too risky because of compromised messaging security. 3
4 Security: Combating New Threats Authentication Unfortunately, from the moment became widely used for marketing communications, opportunistic scammers have tried to exploit it to seize financial data and personal information. industry developers have responded to these ongoing threats by introducing a variety of authentication standards designed to protect brands and their customers. The standards include efforts such as Domain Keys, Identified Internet Mail, Sender ID, ADSP and other methodologies, but for the purposes of the present discussion, we ll focus on the specifications central to DMARC: DKIM: DomainKeys Identified Mail SPF: Sender Policy Framework, AFRF: Authentication Failure Reporting Format Author Domain Signing Practices (ADSP) While it hasn t been widely adopted, ADSP is a forerunner to DMARC in that it provides a framework for senders to publish message handling instructions for non-compliant . From DMARC.org: ADSP enables domain owners to publish a policy telling compliant receivers to reject messages that fail to verify with DKIM. While ADSP never achieved widespread adoption, it was put into production by a number of senders and receivers at different times. SOURCE: DMARC Overview, used under creative commons license, CC By 3.0. Read on for more detailed descriptions of each. 4
5 [ Security: Combating New Threats ] DKIM DomainKeys Identified Mail (DKIM), specified in Internet-Draft, is a mechanism that allows verification of the source and contents of messages. Using DKIM, sending domains can include a cryptographic signature in outgoing messages. A message s signature may be verified by any (or all) MTAs (mail servers) during transit and by the Mail User Agent (MUA) upon delivery. A verified signature indicates the message was sent by the sending domain and the message was not altered in transit. A signature that fails verification indicates the message may have been altered during transit or that the sender is fraudulently using the sending domain name. Unsigned messages contain no guarantee about the sending domain or integrity of the message contents. Service providers may use the success or failure of DKIM signature verification, or the lack of a DKIM signature, to determine subsequent handling of incoming messages. Possible actions include dropping invalid messages without impact to the final recipient or exposing the results of DKIM verification, or the lack of a signature, directly to the recipient. Additionally, service providers may use signature verification as the basis for persistent reputation profiles to support anti-spam policy systems or to share with other service providers. It should also be noted that nothing in the DKIM standard requires any alignment between the actual signing domain and the domain in the FROM header. The Mathematician Who Shook Google The latest DKIM standards call for encryption keys of at least 1024 bits. Until recently, many leading senders were still using the far less secure 512-bit or 768-bit encryption. How the transition to the stronger keys came about is an interesting story. A university mathematician named Zach Harris was able to crack the weak 512-bit encryption keys used by Google, and he then benignly impersonated Google founders Sergey Brin and Larry Page via to alert the search giant to the vulnerability. He got the Internet industry s attention in a big way. Read more on the Message Systems blog or at the Return Path blog. 5
6 [ Security: Combating New Threats ] SPF Sender Policy Framework (SPF), defined in RFC 4408, is the second emerging standard for sender-based authentication under the DMARC umbrella. SPF provides a framework for administrators, through DNS TXT records, to specify authorized senders for the domains they control. The Sender Policy Framework allows admins to assign a unique SPF record in the DNS to each domain from which s are sent. This methodology provides a means for receivers to determine whether the sending MTA (mail server) is authorized (or not authorized) to send messages for the domain that the message is from. It should also be pointed out that the domain being validated is the MAIL FROM or return path domain. Specifically, SPFv1 performs validation on the domain found in the envelope sender (sometimes defined as the MAIL FROM header). SPFv2 (also known as Sender ID) supports MAIL FROM validation, but adds the concept of Purported Responsible Address (PRA), which defines an algorithm for selecting among a set of RFC2822 headers. The domain for validation is extracted from the appropriate header as defined by the PRA header selection algorithm. 6
7 [ Security: Combating New Threats ] Sender ID What s the Difference Between SPF and Sender ID? There is much confusion around SPF and Sender ID. As noted above, the terms SPFv1 and SPFv2 are commonly used to describe the two specifications, but there are critical differences between them, and they are not interchangeable. A detailed description of the various differences can be found on the Open SPF website. Briefly, Sender ID was a protocol advanced by Microsoft that was never widely embraced, though still in use among some senders. The technical distinctions are outlined below. What is SPF? SPF (defined in RFC 4408) validates the HELO domain and the MAIL FROM address given as part of the SMTP protocol (RFC 2821 the envelope layer). The MAIL FROM address is usually displayed as Return-Path if you select the Show all headers option in your client. Domain owners publish records via DNS that describe their policy for which machines are authorized to use their domain in the HELO and MAIL FROM addresses, which are part of the SMTP protocol. What is Sender ID? Sender ID (defined in RFC 4406) is a Microsoft protocol derived from SPF (hence the identical syntax), which validates one of the message s address header fields defined by RFC Which one it validates is selected according to an algorithm called PRA (Purported Responsible Address, RFC 4407). The algorithm aims to select the header field with the address responsible for sending the message. Since it was derived from SPF, Sender ID can also validate the MAIL FROM. But it defines the new PRA identity to validate, and defines new sender policy record tags that specify whether a policy covers MAIL FROM (called MFROM by Sender ID), PRA, or both. SOURCE: Sender Policy Framework - SPF vs Sender ID, dual-licensed under the GNU GPL v2 and the Creative Commons CC BY-SA
8 [ Security: Combating New Threats ] AFRF and Abuse Reporting Feedback Loop Reporting has been an important concept in abuse and spam prevention for many years now. Basically, it provides a common way for inbox providers to report back to senders when individual users mark incoming messages as spam. The Abuse Report Format (ARF) (see: RFC 5965) has long been the standard, and the Authentication Failure Reporting Format (AFRF) distinction is simply a new report sub-type extension that allows for relaying of forensic details regarding an authentication failure within the DMARC framework. Authentication Failure Reporting Format (AFRF) Supports reporting of SPF and/or DKIM failures For SPF, reports the client IP address and the SPF record(s) that were retrieved, producing a fail result For DKIM, reports the canonicalized header and body that produced a failed signature, allowing forensic analysis by the signer to detect why the failure occurred Also supports ADSP reporting of messages that weren t signed but should have been This will be used by DMARC sites for reporting per-message failure details. An aggregate reporting format is suggested within an appendix of the DMARC specification. SOURCE: DMARC Overview, used under creative commons license, CC By
9 [ Security: Combating New Threats ] DMARC The Whole DMARC: Greater Than the Sum of Its Parts Although each of these specifications provides assurance about the sender s identity, each alone has vulnerabilities or limitations around handling and control that hindered widespread adoption. The DKIM standard has been largely embraced for its robustness, but it still left an opportunity for a comprehensive safeguard that would give senders the control to define delivery policies, while enabling receivers to a) determine whether incoming messages align with those policies, and b) act on those findings to report back to the sender on message disposition. In short, combining DKIM with SPF and the more detailed AFRF reporting standards represents the most comprehensive and most promising approach to preventing abuse that the Internet industry has ever mounted =
10 [ Security: Combating New Threats ] DMARC In Action In practice, DMARC is designed to fit into an organization s existing inbound authentication process. The way it works is to help receivers determine if the purported message aligns with what the receiver knows about the sender. If not, DMARC includes guidance on how to handle the non-aligned messages. For example, assuming that a receiver deploys SPF and DKIM, plus its own spam filters, the flow may look something like this: Author Composes and Sends Sending Mail Server Inserts DKIM Header Sent to Receiver IP Blocklists, Reputation, Rate Limits, etc. SENDER RECEIVER Validate and Apply Sender DMARC Policy Standard Validation Tests Retrieve Verified DKIM Domains Retrieve Envelope From via SPF Apply Appropriate DMARC Policy Anti-Spam Filters, etc. Standard Processing Passed Quarantine Update the periodic Aggregate Report to be sent to Sender Failure Report Sent to Sender SOURCE: DMARC Overview, used under creative commons license, CC By
11 [ Security: Combating New Threats ] The Arrival of DMARC Great Progress Frustrated by the ongoing threats and limitations of the previous mechanisms, 15 organizations that included the world s largest service providers, financial institutions, and message security companies banded together in 2012 to create DMARC the Domain-based Message Authentication, Reporting and Conformance group. The coalition included Internet titans like Google, Microsoft and Yahoo!, as well as intelligence pioneer Return Path and financial services providers including PayPal, Fidelity and the Bank of America. Their goal was to establish a universally accepted authentication standard that allowed for senders and receivers to share information about how messages are processed, to allow for continuous improvement. PayPal had actually tested a similar system back in 2007, in partnership with Yahoo! and Gmail, which achieved a significant reduction in the number of threats masquerading as legitimate PayPal messages. By the time DMARC launched five years later, many of the largest-volume senders were eager to adopt it, including Amazon, LinkedIn, Facebook, ebay, Groupon and Netflix. First Year Out of the Gate With its collaborative approach and compelling benefits for both senders and receivers, it didn t take long for DMARC to catch on. In just its first year, DMARC has become the universal authentication standard for the world s leading providers and message senders. * These are just a few of the impressive achievements so far: 1.9 billion mailboxes protected 80% of U.S. consumer mailboxes, and 60% worldwide Over 325 million messages blocked by December 2012 Supported by Microsoft, Google, Yahoo!, AOL, Comcast, and international ISPs * In First Year, DMARC Protects 60 Percent of Global Consumer Mailboxes February 6,
12 State of the Republic The Long-Rumored Demise of DMARC came about at an interesting time in the evolution of the Internet right as mobile devices like smartphones and tablets have grown to eclipse desktop PCs as the primary access gateway for online life. With more messaging interactions happening in mobile-oriented message streams like SMS/MMS, IM chat and Push notifications, so began another round of chatter in 2012 that is on its way to obsolescence. We keep hearing that, as businesses and consumers are migrating to these new channels, social media and mobile applications will soon replace as the dominant method of messaging. And no doubt, the growth in in-app push notification messages in recent years has been astronomical. Yet the numbers for are still orders of magnitude greater than app-based messaging and growing steadily. Technology research firm The Radicati Group published a report * on the status of the market in October 2012, with a few key projections that show is still on the rise. traffic in 2012 Over 2.1 billion users worldwide 144 billion s exchanged daily Global revenues topped $8 billion Projected traffic in 2016 Expected to reach 2.7 billion users More than 192 billion daily s Revenue forecasts likely to surpass $12 billion * Statistics Report, , The Radicati Group. Apr 22nd,
13 [ State of the Republic ] Healthy Growth Evolving Expectations drives business and business drives The majority of traffic originates as automated corporate messages such as alerts, notifications and marketing communications. While we know that consumer messaging behaviors are indeed changing, businesses still depend heavily on due to its relatively low cost and well-established infrastructure. That s why security is so critical to the ongoing marketing and risk-mitigation efforts of retailers and other enterprises. In fact, according to the Radicati Group report, business use of will continue growing at an average rate of 13% through And despite the reality that a small negative growth rate is expected for consumer s over that same period, the mobile devices and apps touted as killers still use as a primary notification method and communication channel. , and security, will continue to be central to global business for the foreseeable future. Customer communication behaviors are changing While s central place in business and consumer messaging isn t in doubt, this does not mean the overall messaging environment is not in flux it is. In fact, consumer expectations of how companies engage with them have changed dramatically due to the proliferation of wireless technology and mobile devices *. More and more consumers today want and expect personalized, relevant communications that reach them wherever they are, via the most expedient messaging channel. In many ways, they want the interaction to emulate the way they communicate with friends. But in order for brands to meet this expectation and take advantage of the opportunity, consumers must be willing to share their data and preferences which makes the digital messaging linchpin of trust all the more vital. And that willingness is widespread. In a recent consumer survey, 69% of respondents said they were willing to give up personal data in exchange for more customized service. * Message Systems Report: Marketing Channel and Engagement Benchmark Survey. Oct Customer Experience in the Digital Age. David Kirkpatrick, Marketing Sherpa, April 30th,
14 [ State of the Republic ] In the Crosshairs Spearphishing These factors together a fast-evolving communications environment, consumers becoming more comfortable sharing data with businesses create fertile ground for scams and cybercrime. And a company s messaging stream is often the first place cybercriminals strike. Not only is the channel an inherently vulnerable access point, it also tends to be rich with personal data and more importantly these days provides easy access to more valuable targets. Once this perimeter has been breached, threats are frequently able to proceed unchecked even with robust network security in place. Not coincidentally, cybercriminals are keeping up with consumer expectations for digital communication just as well as marketers. As the demand for highly targeted, personalized messaging increases, so do the schemes that exploit these same tactics. Today s biggest threats aren t the broad, indiscriminate attacks that flood ISPs with crudely spoofed . Now, the real danger comes from the sophisticated spearphishing scams aimed at specific individuals and organizations, which subvert the ecosystem from the inside. Delivered with hacktivist sensibilities, these attacks are also known as advanced persistent threats (APTs) because they move between service providers, enterprises, and consumers through a combination of identity theft, spoofing, and malware *. Criminals are going farther and farther up the ladder in compromising the trust supply chain. They re attacking one company, service provider, ad network or certificate authority just as a way to attack another entity farther down the ladder of trust and ultimately exploit thousands or millions of unsuspecting users. Craig Spiezle, Executive Director, Online Trust Alliance * white Paper: Safeguarding Messaging Streams for Enterprises and Service Providers Technology Principles for Architecting a Secure Messaging Environment 14
15 [ State of the Republic ] Persistent Response What makes APTs particularly sinister is that the goals are often far more ambitious than the simple theft of data assets; they tend to focus on hijacking the identity and reputation of a company, or completely taking over its systems. That way, malicious s can be disseminated directly from the compromised senders using their own trusted brand names, authenticated domains, and IPs to masquerade as legitimate communications and improve the odds of avoiding detection. And yet, while APTs are far more sophisticated and insidious than the earlier generation of attacks, they still use messaging streams as the entry point. The integration of messaging streams with data sources and operating systems means that today s multi-faceted attacks need only compromise one access point to infiltrate the others. As a result, risk can no longer be defined by functional areas alone. Spearphishing and other APTs are too intelligent and highly targeted, not mere brute force assaults that can be thwarted by strengthening the network perimeter. Therefore, the security response must become as persistent as the threats, and all players in the ecosystem need to work together, exchanging information and protecting one another. Because if one pillar falls prey to an APT, then all are at much greater risk. That s where DMARC comes in. 15
16 A New Standard DMARC extends authentication and enhances control It was in this fast-changing information security environment that the founders of DMARC began planning a new standard for authentication. And there s a lot more to DMARC than just authentication. In fact, DMARC doesn t even provide a new form of authentication; it allows senders to choose between existing forms of SPF and DKIM authentication, either one or both. The key technical benefits it offers are enhanced control and visibility with regard to message processing. In addition to indicating which of the two authentication protocols is protecting their messages, senders also get to tell receivers how to handle messages if neither method can be validated. They can request that rejected s be bounced or marked as junk whereas, in the past, ISPs had to make this call on their own. Senders were not given any input or visibility into the way messages were being processed, thus making it extremely difficult for them to optimize security mechanisms or deliverability rates. Mutually Beneficial Feedback Loop With DMARC, senders share their handling preferences and receivers respond with daily results reporting so all parties know which messages passed and failed authentication. This mutually beneficial feedback loop takes most of the guesswork out of message processing and threat assessment, reducing risk and increasing trust on all sides including, most importantly, the consumers at the end of the messaging stream. The widespread adoption of DMARC as a universal standard by receivers is primarily what has made these benefits possible. As more and more members of the community of senders follow suit in the months and years ahead, so will the promise of an abuse-free messaging ecosystem progress. DMARC Highlights Uses existing path-based SPF or signature-based DKIM authentication Senders choosing DKIM must use the robust 1024-bit encryption standard Senders share message handling preferences with receivers Receivers provide visibility into message processing via daily reports 16
17 [ A New Standard ] Deliverability and Business Benefits Authentication has been an important factor in deliverability for several years, but now it s an absolute requirement for ensuring reliable inbox delivery. All the major inbox providers have expanded their authentication policies in recent years due to the rise in phishing and APTs. The good news is that DMARC makes it easier than ever to stay in compliance with these more stringent requirements because nearly all major receivers are now on board with the same methodology. Deciding which messages to authenticate, and how to do so, used to be a much more complicated process especially for multi-tenant environments that require greater flexibility in authentication policies. But the visibility and control achieved through DMARC go a long way toward alleviating this burden for service providers and enterprises with numerous internal clients. The long-term gains for a brand s bottom-line are substantial, and the ease of implementation ensures a quick return on investment. The Standard The most current standard for DMARC that is under consideration by the Internet Engineering Task Force was drafted under the editorship of Facebook engineer Murray Kucherwary. This document sets the following high level requirement for DMARC: Minimize false positives. Provide robust authentication reporting. Allow senders to assert policy for consumption by receivers. Reduce the amount of successfully delivered phish. Work at Internet scale. Minimize complexity. Business benefits of DMARC Higher deliverability rates Enhanced user trust in legitimacy Stronger brand reputation and loyalty 17
18 [ A New Standard ] The Road Ahead DMARC is still in its relative infancy, having celebrated its first anniversary early in The visibility and control it provides over messaging streams will continue to develop even further as the standard matures. New products and services that leverage DMARC reporting capabilities are already on the horizon and, as motivated members of the ecosystem push for options specific to their unique needs, authentication policies will soon evolve beyond the basic set available today. We re also likely to see additional visibility into the authenticity of messages for endusers, something akin to existing infrastructures around Extended Validation Certificates and SSL certificates. The key takeaway for senders is to put the foundation in place for your business now, and then you ll be ready for enhanced authentication capabilities as soon as new innovations are introduced
19 Implementation Four Essential Steps For senders, implementing DMARC will be an ongoing process. As more receivers adopt the standard, the reports flowing back to senders will become more detailed with richer data. These steadily improving data streams will thereby enable senders to modify and optimize their sending streams over time. That s the longterm view. To initiate a DMARC program, senders must first take these four basic steps: Implement DKIM Implement SPF Create and publish a DMARC policy or resource record Implement reporting and analysis Publishing DKIM Records DKIM requires that you generate private and public encryption keys (1024-bit random numbers), and that you publish the public key selector record to your DNS. Several free DKIM key generators are available online. If your domain were whitehouse.gov and your selector was s768 the public record will look similar to the following: Name s768._domainkey.whitehouse.gov Value t=y;o=~; k=rsa; p=migfma0gcsqgsib3dqe <snip> 3pmCktutYJNilQIDAQAB 19
20 [ Implementation ] Implement DKIM Sending Servers Set up: The domain owner (typically the team running the systems within a company or service provider) generates a public/private key pair to use for signing all outgoing messages (multiple key pairs are allowed). The public key is published in DNS, and the private key is made available to their DKIM-enabled outbound servers. This is step in the diagram. Signing: When each is sent by an authorized enduser within the domain, the DKIM-enabled system automatically uses the stored private key to generate a digital signature of the message. This signature is included in a DKIM-Signature header and prepended to the . The is then sent on to the recipient s mail server. This is step in the diagram. Sending Mail Server DNS Receiving Mail Server Mailbox Receiving Servers 1. Preparation: The DKIM-enabled receiving system extracts and parses the message s DKIM-Signature header. The signing domain asserted by the header is used to fetch the signer s public key from DNS. This is step in the diagram. 2. Verification: The signer s public key is then used by the receiving mail system to verify that the signature contained in the DKIM-Signature header was generated by the sending domain s private key. This proves that the was truly sent by, and with the permission of, the claimed sending domain. It also provides that all the headers signed by the sending domain and the message body were not altered during transit. 3. Delivery: The receiving system uses the outcome of signature verification along with other local policies and tests to determine the disposition of the message. If local policy does not prohibit delivery, the message is passed to the user s inbox. Optionally, the recipient may be informed of the results of the signature verification. This is step in the diagram. 20
21 [ Implementation ] Implement SPF SPF consists of two basic components: Sender side: senders publish DNS records that describe their policies. Receiver side: receivers use a parsing engine that looks up the published policies for inbound mail and takes actions based on it. the parts of an SPF record v=spf1 SPF version 1 mx a:pluto.example.net include:aspmx.googl .com -all The incoming mail servers (MXes) of the domain are authorized to also send mail for example.net The machine pluto.example.net is authorized, too Everything considered legitimate by gmail.com is legitimate for example.net, too All other machines are not authorized SOURCE: OpenSPF.org 21
22 [ Implementation ] Publish a DMARC Policy DMARC policies are published in a sender s Domain Name Server (DNS) as text (TXT) resource records (RR) and announce what an receiver should do with nonaligned mail it receives. Consider an example DMARC TXT RR for the domain sender.dmarcdomain.com that reads: v=dmarc1;p=reject;pct=100;rua=mailto: [email protected] In this example, the sender requests that the receiver rejects all non-aligned messages outright and send a report, in a specified aggregate format, about the rejections to a specified address. If the sender was testing its configuration, it could replace reject with quarantine which would tell the receiver they shouldn t necessarily reject the message, but consider quarantining it. DMARC records follow the extensible tag-value syntax for DNS-based key records defined in DKIM. The chart below illustrates some of the available tags. Tag Name Purpose Sample v Protocol version v=dmarc1 pct Percentage of messages subjected to filtering pct=20 ruf Reporting URI for forensic reports ruf=mailto:[email protected] rua Reporting URI of aggregate reports rua=mailto:[email protected] p Policy for organizational domain p=quarantine sp Policy for subdomain of the OD sp=reject adklm Alignment mode for DKIM adklm=s aspf Alignment mode for SPF aspf=r NOTE: The examples in this chart are illustrative only and should not be relied upon in lieu of the specification. Please refer to the specification page for the most up-to-date and accurate version. SOURCE: DMARC Overview, used under creative commons license, CC By
23 [ Implementation ] Reporting & Analysis: Overview Early adopters of DMARC quickly realized that putting in place processes and tools for handling incoming reports from senders is a key element for a successful DMARC implementation. First of all, the volume of data streaming in from senders can be quite large. Secondly, these reports will contain data that may require immediate action. For example, let s say you own a domain, the giant.com and you implement DKIM and SPF and publish a DMARC record requesting reports. Within 24 hours or so, you begin receiving data reports from the ISPs and inbox providers that have adopted DMARC. These reports will contain very detailed information on the following: You will get statistics on all messages that claim to come from your domain from all DMARC receivers. So, you will suddenly be able to see how many fraudulent messages are using your domain, where they re coming from, and whether or not they would be stopped by a DMARC quarantine or reject policy. The report from each receiver is an XML file that includes the following fields: Every IP address using your domain to send A count of messages from each of those IP addresses What was done with these messages per the DMARC policy shown SPF results for these messages DKIM results for these messages SOURCE: DMARC Overview, used under creative commons license, CC By
24 [ Implementation ] Reporting & Analysis: Tools With the level of detail contained in DMARC reports, high volume senders won t be able to simply skim through the data to identify problems or fraudulent activity. Getting clear visibility into DMARC reports will require the ability to quickly parse and act on large amounts of raw data. Companies like Return Path, which is one of the founding firms that shaped the DMARC ecosystem, provide exactly these kinds of tools and capabilities. Any DMARC security solution you chose should feature the following: Big data storage capacity for mailbox provider reports, with real-time processing functionality. Support not just for aggregate-level data but also actual message and forensic level data also. Data visualization and normalization tools to display results in real time, making it fast and easy for customers to understand complex mailbox provider data streams. Alerting capabilities to flag critical issues and enable you to take real-time corrective action to ensure the health of your mail environment. Additionally, the most valuable DMARC reporting solutions providers will be those that have industry-wide partnerships with inbox providers. These kinds of partnerships provide access to phishing data intelligence from across the receiving community, and help to identify phishing attacks as they arise. 24
25 Message Systems Stands Behind DMARC By now it should be clear that adopting the DMARC authentication standard is essential to the success of every company s digital messaging. One of the easiest ways to implement DMARC for your brand is through the Message Systems Momentum platform. Message Systems has been DMARC-compliant since the beginning and, as a leader in digital messaging, the company has a long history of aggressively supporting authentication standards before that. SPF and DomainKeys have been supported on Message Systems platforms since 2004; SenderID and DKIM protocols since As DMARC evolves, and other technologies are developed, Message Systems will continue to be at the forefront of messaging security. There are a variety of ways to protect your messaging streams, but only Message Systems technology includes authentication and security as part of a comprehensive, future-proof messaging solution. To learn more about best practices and solutions for your operations, call or visit us at messagesystems.com 2013 Message Systems, Inc., all rights reserved guilford road suite 100 columbia maryland tel toll free usa messagesystems.com 25
THE DMARC GUIDE. Understanding DMARC for Securing Email
THE DMARC GUIDE Understanding DMARC for Securing Email The History - Introduction Email despite its importance, ubiquity, and staying power has never been secure. Prior attempts at security have failed
The What, Why, and How of Email Authentication
The What, Why, and How of Email Authentication by Ellen Siegel: Director of Technology and Standards, Constant Contact There has been much discussion lately in the media, in blogs, and at trade conferences
This user guide provides guidelines and recommendations for setting up your business s domain authentication to improve your deliverability rating.
BLUEHORNET USER GUIDE EMAIL AUTHENTICATION AND DOMAIN MONITORING TOOLS This user guide provides guidelines and recommendations for setting up your business s domain authentication to improve your deliverability
Protect your brand from phishing emails by implementing DMARC 1
Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers
DomainKeys Identified Mail DKIM authenticates senders, message content
DomainKeys Identified Mail DKIM authenticates senders, message content Alt-N Technologies, Ltd. 2201 East Lamar Blvd, Suite 270 Arlington, Texas 76006 Phone: (817) 525-2005 Fax: (817) 525-2019 http://www.altn.com/
2014-10-07. Email security
Email security Simple Mail Transfer Protocol First defined in RFC821 (1982), later updated in RFC 2821 (2001) and most recently in RFC5321 (Oct 2008) Communication involves two hosts SMTP Client SMTP Server
Curbing Email Threats & Spear Phishing The Promise & Results with DMARC
SESSION ID: TECH-W03 Curbing Email Threats & Spear Phishing The Promise & Results with DMARC MODERATOR: Craig Spiezle Executive Director & President Online Trust Alliance @otalliance PANELISTS: Pat Peterson
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
IronPort Email Authentication
IronPort Email Authentication W h i t e P a p e r Executive Summary The problems of spam, viruses, phishing and most email denial-of-service attacks can all be traced back to a single common cause lack
A New Way For Emailers To Defend Themselves Against Email Fraud
June 27, 2012 Defining DMARC A New Way For Emailers To Defend Themselves Against Email Fraud by Shar VanBoskirk with Sarah Glass and Elizabeth Komar Why Read This Report Hundreds of brands are hijacked
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
DMA s E-Mail Authentication Requirement: FAQs and Best Practices
DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going
How emails are sent from Xero
How emails are sent from Xero Technical discussion In June 2013 we made a change to the way emails are sent from Xero. Some of our users have asked us why the change was necessary and whether we are planning
DomainKeys Identified Mail (DKIM) Murray Kucherawy The Trusted Domain Project <[email protected]>
DomainKeys Identified Mail (DKIM) Murray Kucherawy The Trusted Domain Project PART ONE Origins Phishing was beginning to appear in earnest early in the last decade Spoofing was
Email Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
Email Security - DMARC ed Encryption
Email Security - DMARC ed Encryption non perdere tempo, non perdere dati e soprattutto evitare le trappole Cristiano Cafferata Claudia Parodi Mauro Cicognini
Protect Outbound Mail with DMARC
MDaemon Messaging Server How To Quick Start Guide Protect Outbound Mail with DMARC To protect outbound mail from your domain, you will need to create a DMARC record for your domain. We recommend carefully
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
BITS EMAIL SECURITY TOOLKIT:
BITS EMAIL SECURITY TOOLKIT: PROTOCOLS AND RECOMMENDATIONS FOR REDUCING THE RISKS A PUBLICATION OF THE BITS SECURITY AND RISK ASSESSMENT WORKING GROUP April 2007 BITS The Financial Services Roundtable
Email Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand [email protected] (408) 834-7577 x125
Email Marketing 201 How a SPAM Filter Works Craig Stouffer Pinpointe On-Demand [email protected] (408) 834-7577 x125 Mark Feldman NetProspexVP Marketing [email protected] (781) 290-5714 www.twitter.com/pinpointe
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application
WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the
DMARC and your.bank Domain. September 2015 v
DMARC and your.bank Domain September 2015 v EMAIL MAKES IT EASY FOR CRIMINALS TO REACH YOUR CUSTOMERS USING YOUR BRAND Phishing and brand abuse erode consumer trust Attacks cause lasting brand damage Fallout
Internet Standards. Sam Silberman, Constant Contact
Internet Standards Sam Silberman, Constant Contact What are Standards? World without Standards We live in a connected world Topics DMARC (Indirect flows) Security/Privacy TLS over SMTP End-to-end encryption
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
Trust in Email Begins with Authentication
Abstract Trust in Email Begins with Authentication Issued by the Messaging Anti-Abuse Working Group (MAAWG) March 2008 Edited by Dave Crocker Brandenburg InternetWorking The Internet s growth allows us
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Deliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
DKIM last chance for mail service? TFMC2 01/2006
DKIM last chance for mail service? TFMC2 01/2006 Mail service status More and more spam, fishing, spoofing, virus More and more energy in spam fighting More and more messages lost because : Imperfect automatic
Exchange Online Protection In-Depth
Exchange Online Protection In-Depth Mike Crowley Baseline Technologies Session Agenda Introduction to EOP Administration DMARC, SPF & DKIM Advanced Threat Protection EOP Deployment Tips Introduction to
How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
Email Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
4 Critical Risks Facing Microsoft Office 365 Implementation
4 Critical Risks Facing Microsoft Office 365 Implementation So, your organization has chosen to move to Office 365. Good choice. But how do you implement it AND deal with the following issues: Keep email
DomainKeys Identified Mail (DKIM): Introduction and Overview. Eric Allman Chief Science Officer Sendmail, Inc.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc. The Context Traditional Content Scanning is reaching its limits Increasing interest in making
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
Access Webmail, Collaboration Tools, and Sync Mobile Devices from Anywhere
P a g e 1 Steadfast email Steadfast email delivers Exchange-level mail server features at a lower cost. With lower end user requirements, superior stability, and reduced maintenance costs Steadfast email
DST EMAIL. Product FAQs. Thank you for using our products. DST UK www.dstsystems.co.uk
EFFECTIVE PERSONALISED PRINT AND E-COMMUNICATION SOLUTIONS DESIGNED WITH YOU IN MIND DSTSYSTEMS.CO.UK DST EMAIL Product FAQs version 01 Thank you for using our products. DST UK www.dstsystems.co.uk DST
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
MDaemon Vs. Microsoft Exchange Server 2013 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
Knowledge Guide: Deliverability. Your Reputation Holds the Key to Deliverability. virtualroi May 2009. by: Return Path
Knowledge Guide: Deliverability Your Reputation Holds the Key to Deliverability virtualroi May 2009 by: Return Path Your Reputation Holds the Key to Deliverability Twenty percent of legitimate email never
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Sender Authentication Technology Deployment and Authentication Identifiers
2. Sender Authentication Technology Deployment and Authentication Identifiers In this report we will present an overview of spam trends for week 14 through week 26 of 2012. The ratio of spam has dropped
1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...
1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5
Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education
White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets
Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
INinbox Start-up Pack
2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the
2015 Online Trust Audit & Honor Roll Email Practices Deep Dive July 7, 2015. 2015 All rights reserved. Online Trust Alliance (OTA) Slide 1
2015 Online Trust Audit & Honor Roll Email Practices Deep Dive July 7, 2015 Mike Jones Director Agari Craig Spiezle Executive Director & President Online Trust Alliance Brian Westnedge Sr. Director, Client
Migration Quick Reference Guide for Administrators
Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps
Libra Esva. Whitepaper. Glossary. How Email Really Works. Email Security Virtual Appliance. May, 2010. It's So Simple...or Is It?
Libra Esva Email Security Virtual Appliance Whitepaper May, 2010 How Email Really Works Glossary 1 2 SMTP is a protocol for sending email messages between servers. DNS (Domain Name System) is an internet
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Email Authentication Policy and Deployment Strategy for Financial Services Firms
Email Authentication Policy and Deployment Strategy for Financial Services Firms A PUBLICATION OF THE BITS SECURITY PROGRAM February 2013 BITS/The Financial Services Roundtable 1001 Pennsylvania Avenue
ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust
THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily
