
SMTP Vulnerabilities Catalog
A comprehensive database of SMTP vulnerabilities, attack vectors, and mitigation strategies for security professionals.
Email Authentication Vulnerabilities Research
Researchers from UC Berkeley and ICSI (Jianjun Chen, Vern Paxson, and Jian Jiang) identified 18 different attacks on email sender authentication mechanisms affecting major email providers and clients. Their research demonstrates how inconsistencies between different components in the email authentication process can be exploited to bypass security controls.
Vulnerability Catalog
Email Authentication Overview
Email authentication relies on three main protocols that work together to verify the sender's identity:
SPF (RFC 7208)
Sender Policy Framework verifies the IP address of the sending domain. Domain owners publish authorized IP lists via DNS, and receiving servers check if the sender's IP matches these lists.
DKIM (RFC 6376)
DomainKeys Identified Mail verifies that the email is signed by the sending domain. Senders generate a DKIM signature with their private key, and receivers validate it with the public key retrieved from DNS.
DMARC (RFC 7489)
Domain-based Message Authentication, Reporting & Conformance provides a policy framework for SPF and DKIM. It checks alignment between the From header domain and the domains verified by SPF or DKIM.
Key Vulnerability: Inconsistent Processing
The fundamental issue identified by researchers is that inconsistencies between different components in the email authentication process can lead to security vulnerabilities. When an ambiguous input is processed differently by different components, attackers can exploit these differences.
For example, SPF might verify the HELO domain while DMARC uses the MAIL FROM domain, or DKIM might verify one From header while the email client displays another. These inconsistencies allow attackers to bypass authentication while still appearing legitimate to end users.