skip to main content
10.1145/3589334.3645499acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article
Open Access

Unfiltered: Measuring Cloud-based Email Filtering Bypasses

Published:13 May 2024Publication History

ABSTRACT

Email service has increasingly been outsourced to cloud-based providers and so too has the task of filtering such messages for potential threats. Thus, customers will commonly direct that their incoming email is first sent to a third-party email filtering service (e.g., Proofpoint or Barracuda) and only the "clean" messages are then sent on to their email hosting provider (e.g., Gmail or Microsoft Exchange Online). However, this loosely coupled approach can, in theory, be bypassed if the email hosting provider is not configured to only accept messages that arrive from the email filtering service. In this paper we demonstrate that such bypasses are commonly possible. We document a multi-step methodology to infer if an organization has correctly configured its email hosting provider to guard against such scenarios. Then, using an empirical measurement of edu and com domains as a case study, we show that 80% of such organizations making use of popular cloud-based email filtering services can be bypassed in this manner. We also discuss reasons that lead to such misconfigurations and outline challenges in hardening the binding between email filtering and hosting providers.

Skip Supplemental Material Section

Supplemental Material

rfp1142.mp4

Supplemental video

mp4

28 MB

References

  1. Mike Afergan and Robert Beverly. 2005. The State of the Email Aaddress. ACM SIGCOMM Computer Communication Review (CCR), Vol. 35, 1 (2005), 29--36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Tony Akers. 2018. How attackers bypass third-party mail filtering to Office 365. (Nov. 2018). https://practical365.com/how-to-ensure-your-third-party-filtering-gateway-is-secureGoogle ScholarGoogle Scholar
  3. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium. Vancouver, BC, Canada, 1093--1110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, and Taejoong Chung. 2023. You've Got Report: Measurement and Security Implications of DMARC Reporting. In Proceedings of the 32nd USENIX Security Symposium. Anaheim, CA, USA, 4123--4137.Google ScholarGoogle Scholar
  5. Barracuda. 2023 a. Email Security Gateway. (Sept. 2023). https://www.barracuda.com/products/email-protection/email-security-gatewayGoogle ScholarGoogle Scholar
  6. Barracuda. 2023 b. How to Configure Microsoft 365 for Inbound and Outbound Mail. (Feb. 2023). https://campus.barracuda.com/product/emailgatewaydefense/doc/96022752/step-2-configure-microsoft-365-for-inbound-and-outbound-mail/.Google ScholarGoogle Scholar
  7. Steven M. Bellovin. 1989. Security Problems in the TCP/IP Protocol Suite. ACM SIGCOMM Computer Communication Review (CCR), Vol. 19, 2 (1989), 32--48.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Nathaniel Bennett, Rebekah Sowards, and Casey Deccio. 2022. Spfail: Discovering, Measuring, and Remediating Vulnerabilities in Email Sender Validation. In Proceedings of the 22nd ACM Internet Measurement Conference (IMC). Nice, France, 633--646.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jianjun Chen, Vern Paxson, and Jian Jiang. 2020. Composition Kills: A Case Study of Email Sender Authentication. In Proceedings of the 29th USENIX Security Symposium. Virtual Event, 2183--2199.Google ScholarGoogle Scholar
  10. Cisco. 2022. Configure Microsoft 365 with Secure Email. (Dec. 2022). https://www.cisco.com/c/en/us/support/docs/security/cloud-email-security/214812-configuring-office-365-microsoft-with.html.Google ScholarGoogle Scholar
  11. Stefan Czybik, Micha Horlboge, and Konrad Rieck. 2023. Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild. In Proceedings of the 23rd ACM Internet Measurement Conference (IMC). Montreal, QC, Canada.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Casey Deccio, Tarun Yadav, Nathaniel Bennett, Alden Hilton, Michael Howe, Tanner Norton, Jacob Rohde, Eunice Tan, and Bradley Taylor. 2021. Measuring Email Sender Validation in the Wild. In Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT). 230--242.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J. Alex Halderman. 2015a. A Search Engine Backed by Internet-Wide Scanning. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). Denver, Colorado, USA, 542--553.Google ScholarGoogle Scholar
  14. Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael Bailey, and J. Alex Halderman. 2015b. Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security. In Proceedings of the 2015 Internet Measurement Conference (IMC). Tokyo, Japan, 27--39.Google ScholarGoogle Scholar
  15. Tobias Fiebig, Seda Gurses, Carlos H. Ganan, Erna Kotkamp, Fernando Kuipers, and Taritha Sari. 2023. Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom. Proceedings of the Privacy Enhancing Technologies Symposium (PETS) , Vol. 2 (2023), 117--150.Google ScholarGoogle ScholarCross RefCross Ref
  16. Forrester. 2023. The Forrester Wave: Enterprise Email Security, Q2 2023. (June 2023). https://reprints2.forrester.com/#/assets/2/108/RES178496/reportGoogle ScholarGoogle Scholar
  17. Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko. 2015. Security by Any Other Name: On the Effectiveness of Provider Based Email Security. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). Denver, Colorado, USA, 450--464.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Abhishek Ghosh. 2019. Fix: gsuite username is a reserved word Error (postmaster, abuse email). (May 2019). https:// thecustomizewindows.com/2019/05/fix-gsuite-username- is-a-reserved-word-error-postmaster-abuse-email/.Google ScholarGoogle Scholar
  19. Google. 2022. About CrUX. (June 2022). https://developer.chrome.com/docs/crux/about/Google ScholarGoogle Scholar
  20. Google. 2023. Handling reports of abuse and technical issues. (May 2023). https://support.google.com/a/answer/33389Google ScholarGoogle Scholar
  21. The Radicati Group. 2023. Secure Email -- Market Quadrant 2023. (March 2023). https://docs.broadcom.com/doc/radicati-secure-email-market-quadrant-2023Google ScholarGoogle Scholar
  22. Justin Hoeft. 2021. Google Workspace Rejecting Sophos Setup Messages (and other important messages). (Jan. 2021). https://community.sophos.com/sophos-email/f/discussions/133526/google-workspace-rejecting-sophos-setup-messages-and-other-important-messagesGoogle ScholarGoogle Scholar
  23. Ralph Holz, Johanna Amann, Olivier Mehani, Matthias Wachs, and Mohamed Ali Kaafar. 2015. TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. arXiv preprint arXiv:1511.00341 (2015).Google ScholarGoogle Scholar
  24. Florian Holzbauer, Johanna Ullrich, Martina Lindorfer, and Tobias Fiebig. 2022. Not that Simple: Email Delivery in the 21st Century. In 2022 USENIX Annual Technical Conference (USENIX ATC). Carlsbad, CA, USA, 295--308.Google ScholarGoogle Scholar
  25. Hang Hu and Gang Wang. 2018. End-to-End Measurements of Email Spoofing Attacks. In Proceedings of the 27th USENIX Security Symposium. Baltimore, MD, 1095--1112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Liz Izhikevich, Gautam Akiwate, Briana Berger, Spencer Drakontaidis, Anna Ascheman, Paul Pearce, David Adrian, and Zakir Durumeric. 2022. ZDNS: A Fast DNS Toolkit for Internet Measurement. Proceedings of the 22nd ACM Internet Measurement Conference (IMC). Nice, France, 33--43.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Kitterman. 2014. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1. RFC 7208. RFC Editor. http://www.rfc-editor.org/rfc/rfc7208.txt http://www.rfc-editor.org/rfc/rfc7208.txt.Google ScholarGoogle Scholar
  28. Dr. John C. Klensin. 2008. Simple Mail Transfer Protocol. RFC 5321. (Oct. 2008). https://doi.org/10.17487/RFC5321Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. KnowBe4. 2023. How to Whitelist by IP Address in Google Workspace. (Oct. 2023). https://support.knowbe4.com/hc/en-us/articles/115002797527-Whitelisting-by-IP-Address-in-Google-Workspace.Google ScholarGoogle Scholar
  30. Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, and Taejoong Chung. 2022. Under the Hood of DANE Mismanagement in SMTP. Proceedings of the 31st USENIX Security Symposium. Boston, MA, USA, 1--16.Google ScholarGoogle Scholar
  31. Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, and Taejoong Chung. 2020. A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. In Proceedings of the 29th USENIX Security Symposium. Virtual Event, 613--630.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, and Vern Paxson. 2016. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. In Proceedings of the 25th USENIX Security Symposium. Austin, TX, USA, 1033--1050.Google ScholarGoogle Scholar
  33. Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, and Stefan Savage. 2023. Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. In Proceedings of the 8th IEEE European Symposium on Security and Privacy (EuroS&P). Delft, Netherlands.Google ScholarGoogle ScholarCross RefCross Ref
  34. Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, and Geoffrey M. Voelker. 2021. Who's Got Your Mail? Characterizing Mail Service Provider Usage. In Proceedings of the 21st ACM Internet Measurement Conference (IMC). Virtual Event, 122--136.Google ScholarGoogle Scholar
  35. Yu Liu, Matthew R. Squires, Curtis R. Taylor, Robert J. Walls, and Craig A. Shue. 2019. Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks. In Security and Privacy in Communication Networks, , Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, and Aziz Mohaisen (Eds.). Cham, 26--46.Google ScholarGoogle Scholar
  36. Zoho Mail. 2023. Spam Control Guidelines and Best Practices. (2023). https://www.zoho.com/mail/help/guidelines-spam-control.htmlGoogle ScholarGoogle Scholar
  37. Wilfried Mayer, Aaron Zauner, Martin Schmiedecker, and Markus Huber. 2016. No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large. In Proceedings of the 2016 International Conference on Availability, Reliability and Security (ARES). Salzburg, Austria, 10--20.Google ScholarGoogle ScholarCross RefCross Ref
  38. Microsoft. 2022. External Domain Name System records for Office 365. (Dec. 2022). https://learn.microsoft.com/en-us/microsoft-365/enterprise/external-domain-name-system-recordsGoogle ScholarGoogle Scholar
  39. Microsoft. 2023 a. Configure mail flow using connectors in Exchange Online. (May 2023). https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flowGoogle ScholarGoogle Scholar
  40. Microsoft. 2023 b. How to set up a multifunction device or application to send email using Microsoft 365 or Office 365. (March 2023). https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/ how-to-set-up-a-multifunction-device-or-application-to-send- email-using-microsoft-365-or-office-365.Google ScholarGoogle Scholar
  41. Microsoft. 2023 c. Mail flow rules (transport rules) in Exchange Online. (Feb. 2023). https://learn.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/mail-flow-rulesGoogle ScholarGoogle Scholar
  42. Microsoft. 2023 d. Manage mail flow using a third-party cloud service with Exchange Online. (Feb. 2023). https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/manage-mail-flow-using-third-party-cloudGoogle ScholarGoogle Scholar
  43. Microsoft. 2023 e. Office 365 URLs and IP address ranges. (April 2023). https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwideGoogle ScholarGoogle Scholar
  44. Microsoft. 2023 f. Set up connectors for secure mail flow with a partner organization in Exchange Online. (Feb. 2023). https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/set-up-connectors-for-secure-mail-flow-with-a-partner.Google ScholarGoogle Scholar
  45. Microsoft. 2023 g. Use Directory-Based Edge Blocking to reject messages sent to invalid recipients in Exchange Online. (Feb. 2023). https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/use-directory-based-edge-blocking.Google ScholarGoogle Scholar
  46. Mimecast. 2023 a. Email Security Cloud Gateway -- Connect Process -- Office 365 mail lockdown. (March 2023). https://community.mimecast.com/s/article/email-security-cloud-gateway-connect-process-0365-mail-lockdown.Google ScholarGoogle Scholar
  47. Mimecast. 2023 b. Email Security Cloud Gateway -- Setting Up Your Inbound Email. (March 2023). https://community.mimecast.com/s/article/email-security-cloud-gateway-setting-up-your-inbound-email.Google ScholarGoogle Scholar
  48. o365info. 2023. How to find Microsoft 365 MX record. (Aug. 2023). https://o365info.com/microsoft-365-mx-record/Google ScholarGoogle Scholar
  49. Will Pearce and Nick Landers. 2019. The answer to life, the universe, and everything offensive security. (Sept. 2019). https://github.com/moohax/Talks/blob/master/slides/DerbyCon19.pdfGoogle ScholarGoogle Scholar
  50. Damian Poddebniak, Fabian Ising, Hanno Böck, and Sebastian Schinzel. 2021. Why TLS is Better Without STARTTLS: A Security Analysis of STARTTLS in the Email Context. In Proceedings of the 30th USENIX Security Symposium. Virtual Event, 4365--4382.Google ScholarGoogle Scholar
  51. Proofpoint. 2023 a. Configuring Google Workspace (Gsuite) for Proofpoint Essentials. (May 2023). https://help.proofpoint.com/Proofpoint_Essentials/Email_Security/Administrator_Topics/hostedemailservices/Configuring_Google_Workspace_(Gsuite)_for_Proofpoint_EssentialsGoogle ScholarGoogle Scholar
  52. Proofpoint. 2023 b. Configuring Microsoft 365 for Proofpoint Essentials. (March 2023). https://web.archive.org/web/20230328135954/https://help.proofpoint.com/Proofpoint_Essentials/Email_Security/Administrator_Topics/hostedemailservices/Configuring_Microsoft_365_for_Proofpoint_EssentialsGoogle ScholarGoogle Scholar
  53. Proofpoint. 2023 c. Email Protection Solutions - Secure Email Provider. (Sept. 2023). https://www.proofpoint.com/us/products/email-security-and-protection/email-protectionGoogle ScholarGoogle Scholar
  54. F Rahmad, Y Suryanto, and K Ramli. 2020. Performance Comparison of Anti-Spam Technology Using Confusion Matrix Classification. In IOP Conference Series: Materials Science and Engineering, Vol. 879. 012076.Google ScholarGoogle Scholar
  55. Keegan Ryan, Kaiwen He, George Arnold Sullivan, and Nadia Heninger. 2023. Passive SSH Key Compromise via Lattices. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS). Copenhagen, Denmark, 2886--2900.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Jamie Scaife. 2023. Using SPF Macros to Solve the Operational Challenges of SPF. (10 2023). https://www.jamieweb.net/blog/using-spf-macros-to-solve-the-operational-challenges-of-spf/Google ScholarGoogle Scholar
  57. Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, and Min Yang. 2021. Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. In Proceedings of the 30th USENIX Security Symposium. Virtual Event, 3201--3217.Google ScholarGoogle Scholar
  58. Sophos. 2023. Configure Microsoft 365. (March 2023). https://docs.sophos.com/central/customer/help/en-us/ManageYourProducts/EmailSecurity/SophosGateway/ExternalServices/ConfigureM365/index.htmlGoogle ScholarGoogle Scholar
  59. Christian Stransky, Oliver Wiese, Volker Roth, Yasemin Acar, and Sascha Fahl. 2022. 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. In Proceedings of the 2022 IEEE Symposium on Security and Privacy. 860--875.Google ScholarGoogle ScholarCross RefCross Ref
  60. Vircom Support. 2023. Configuring Google Workspace (Gsuite) for Proofpoint Essentials. (April 2023). https://vircomhelp.freshdesk.com/support/solutions/articles/48001171784-configuring-google-workspace-gsuite-for-proofpoint-essentials.Google ScholarGoogle Scholar
  61. Ali Tajran. 2023. How to configure Microsoft 365 to only accept mail from third-party spam filter. (May 2023). https://www.alitajran.com/only-accept-from-third-party-spam-filter.Google ScholarGoogle Scholar
  62. Dennis Tatang, Florian Zettl, and Thorsten Holz. 2021. The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws. In Proceedings of the 2021 International Symposium on Research in Attacks, Intrusions and Defenses (RAID). San Sebastian, Spain, 354--369.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. TrendMicro. 2023. Adding Office 365 Inbound Connectors. (Oct. 2023). https://success.trendmicro.com/dcx/s/solution/000250836-trend-micro-email-security-integration-with-microsoft-office-365.Google ScholarGoogle Scholar
  64. Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, and Aiko Pras. 2016. A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE Journal on Selected Areas in Communications, Vol. 34, 6 (2016), 1877--1888.Google ScholarGoogle ScholarCross RefCross Ref
  65. Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, and Qingfeng Pan. 2022. A Large-scale and Longitudinal Measurement Study of DKIM Deployment. In Proceedings of the 31st USENIX Security Symposium. Boston, MA, USA, 1185--1201.Google ScholarGoogle Scholar
  66. Wikipedia. 2023. Bounce message. (May 2023). https://en.wikipedia.org/wiki/Bounce_messageGoogle ScholarGoogle Scholar
  67. Sophia Willows. 2023. How to access your Google Workplace's postmaster@ inbox. (May 2023). https://sophiabits.com/blog/how-to-access-google-postmaster-emailGoogle ScholarGoogle Scholar

Index Terms

  1. Unfiltered: Measuring Cloud-based Email Filtering Bypasses

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WWW '24: Proceedings of the ACM on Web Conference 2024
        May 2024
        4826 pages
        ISBN:9798400701719
        DOI:10.1145/3589334

        Copyright © 2024 Owner/Author

        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 May 2024

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,899of8,196submissions,23%
      • Article Metrics

        • Downloads (Last 12 months)28
        • Downloads (Last 6 weeks)27

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader