Chinese Journal of Network and Information Security ›› 2020, Vol. 6 ›› Issue (6): 69-79.doi: 10.11959/j.issn.2096-109x.2020083
• Special Column:Network Application and Protection Technology • Previous Articles Next Articles
Jingjing SHANG1,2,3,Yujia ZHU2,3(),Qingyun LIU2,3
Revised:
2020-07-03
Online:
2020-12-15
Published:
2020-12-16
Supported by:
CLC Number:
Jingjing SHANG,Yujia ZHU,Qingyun LIU. Analysis of security extension protocol in e-mail system[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 69-79.
参数 | 含义 |
v | DMARC版本号 |
p | 接收邮件策略 |
ri | 报告发送时间间隔 |
rua | 发送综合反馈的邮件地址 |
ruf | 发送消息详细故障信息的邮件地址 |
参数 | 含义 |
v | DMARC版本号 |
p | 接收邮件策略 |
ri | 报告发送时间间隔 |
rua | 发送综合反馈的邮件地址 |
ruf | 发送消息详细故障信息的邮件地址 |
国家 | 邮箱域名个数/个 |
中国 | 750 |
美国 | 2 392 |
日本 | 360 |
俄罗斯 | 164 |
国家 | 邮箱域名个数/个 |
中国 | 750 |
美国 | 2 392 |
日本 | 360 |
俄罗斯 | 164 |
国家 | 有SPF记录 | SPF记录无效 | SPF策略为“-” | SPF策略为“~” | SPF策略为“?” | SPF策略为“+” |
中国 | 40.00% | 3.23% | 55.64% | 44.36% | 0.00% | 0.00% |
美国 | 74.72% | 7.68% | 44.07% | 45.49% | 10.17% | 0.27% |
日本 | 93.33% | 1.19% | 58.01% | 41.39% | 0.60% | 0.00% |
俄罗斯 | 72.56% | 2.52% | 42.27% | 54.64% | 2.06% | 1.03% |
国家 | 有SPF记录 | SPF记录无效 | SPF策略为“-” | SPF策略为“~” | SPF策略为“?” | SPF策略为“+” |
中国 | 40.00% | 3.23% | 55.64% | 44.36% | 0.00% | 0.00% |
美国 | 74.72% | 7.68% | 44.07% | 45.49% | 10.17% | 0.27% |
日本 | 93.33% | 1.19% | 58.01% | 41.39% | 0.60% | 0.00% |
俄罗斯 | 72.56% | 2.52% | 42.27% | 54.64% | 2.06% | 1.03% |
国家 | 有DMARC记录 | DMARC记录无效 | DMARC策略为none | DMARC策略为quarantine | DMARC策略为reject |
中国 | 3.20% | 0.00% | 95.83% | 0.00% | 4.17% |
美国 | 26.66% | 9.58% | 38.85% | 6.83% | 54.30% |
日本 | 5.83% | 28.57% | 75.00% | 0.00% | 25.00% |
俄罗斯 | 21.34% | 20.00% | 41.18% | 14.71% | 44.12% |
国家 | 有DMARC记录 | DMARC记录无效 | DMARC策略为none | DMARC策略为quarantine | DMARC策略为reject |
中国 | 3.20% | 0.00% | 95.83% | 0.00% | 4.17% |
美国 | 26.66% | 9.58% | 38.85% | 6.83% | 54.30% |
日本 | 5.83% | 28.57% | 75.00% | 0.00% | 25.00% |
俄罗斯 | 21.34% | 20.00% | 41.18% | 14.71% | 44.12% |
邮件服务提供商 | 正常域 | 伪造域 | 伪造信头 | ||||||
正常邮件 | 空邮件 | 钓鱼url | 病毒附件 | 无DMARC | DMARC none | DMARC reject | 同域 | 不同域 | |
垃圾内容无SPFSPF~ | SPF-SPF~SPF- | SPF~SPF- | |||||||
126.com | ![]() | ||||||||
139 com | |||||||||
263.net | |||||||||
gmall.com | |||||||||
rambler ru | |||||||||
rediff.co in | |||||||||
tocom | |||||||||
yeah.nct | |||||||||
tutanota.com | |||||||||
protonmall.com | |||||||||
inbox Iv | |||||||||
seznam.cz | |||||||||
runbox com | |||||||||
p.pl | |||||||||
interia.pl | |||||||||
op.pl | |||||||||
zoho.com | |||||||||
email.hu | |||||||||
onu com | |||||||||
nall con | |||||||||
fastmail com | |||||||||
orlet | |||||||||
189cn | |||||||||
foxmail.com | |||||||||
qq.com | |||||||||
21cn.com | |||||||||
mail,r | |||||||||
aol.com | |||||||||
yahoo.com | |||||||||
yandex.com | |||||||||
outlook.com | |||||||||
aliyun.com | |||||||||
juno.com | |||||||||
excite.com | |||||||||
sina.com | |||||||||
163.com | |||||||||
naver com | |||||||||
vip.sina.com |
邮件服务提供商 | 正常域 | 伪造域 | 伪造信头 | ||||||
正常邮件 | 空邮件 | 钓鱼url | 病毒附件 | 无DMARC | DMARC none | DMARC reject | 同域 | 不同域 | |
垃圾内容无SPFSPF~ | SPF-SPF~SPF- | SPF~SPF- | |||||||
126.com | ![]() | ||||||||
139 com | |||||||||
263.net | |||||||||
gmall.com | |||||||||
rambler ru | |||||||||
rediff.co in | |||||||||
tocom | |||||||||
yeah.nct | |||||||||
tutanota.com | |||||||||
protonmall.com | |||||||||
inbox Iv | |||||||||
seznam.cz | |||||||||
runbox com | |||||||||
p.pl | |||||||||
interia.pl | |||||||||
op.pl | |||||||||
zoho.com | |||||||||
email.hu | |||||||||
onu com | |||||||||
nall con | |||||||||
fastmail com | |||||||||
orlet | |||||||||
189cn | |||||||||
foxmail.com | |||||||||
qq.com | |||||||||
21cn.com | |||||||||
mail,r | |||||||||
aol.com | |||||||||
yahoo.com | |||||||||
yandex.com | |||||||||
outlook.com | |||||||||
aliyun.com | |||||||||
juno.com | |||||||||
excite.com | |||||||||
sina.com | |||||||||
163.com | |||||||||
naver com | |||||||||
vip.sina.com |
[1] | POSTEL J B . Request for comments:number 821 simple mail transfer protocol[M]. RFC Editor, 1982. |
[2] | FOSTER I D , LARSON J , MASICH M ,et al. Security by any other name:on the effectiveness of provider based email security[C]// ACM Conference on Computer and Communications Security (CCS). 2015: 450-464. |
[3] | FREED N , BORENSTEIN N . Request for comments:number 2045 multipurpose internet mail extensions (MIME) part one:format of internet message bodies[M]. RFC Editor, 1996. |
[4] | ATKINS D , STALLINGS W , ZIMMERMANN P . Request for comments:number 1991PGP message exchange formats[M]. RFC Editor, 1996. |
[5] | RAMSDELL B . Request for comments:number 2633 S/MIME version 3 message specification[M]. RFC Editor, 1999. |
[6] | HOFFMAN P E . Request for comments:number 3207 SMTP service extension for secure SMTP over transport layer security[M]. RFC Editor, 2002. |
[7] | KITTERMAN S . Request for comments:number 7208 sender policy framework (SPF) for authorizing use of domains in email,version 1[M]. RFC Editor, 2014. |
[8] | KUCHERAWY M , CROCKER D , HANSEN T . Request for comments:number 6376 domain keys identified mail (DKIM) signatures[M]. RFC Editor, 2001. |
[9] | KUCHERAWY M , ZWICKY E . Request for comments:number 7489 domain-based message authentication,reporting,and conformance (DMARC)[M]. RFC Editor, 2015. |
[10] | 柏宗超, 姚健康, 孔宁 . 基于DANE的电子邮件安全研究[J]. 计算机系统应用, 2018,27(7): 73-79. |
BAI Z C , YAO J K , KONG N . Research on email security based on DANE[J]. Computer System Application, 2018,27(7): 73-79. | |
[11] | HOFFMAN P , SCHLYTER J . Request for comments:number 6698 the DNS-based authentication of named entities (DANE) transport layer security (TLS) protocol:TLSA[M]. RFC Editor, 2012. |
[12] | DURUMERIC Z , ADRIAN D , MIRIAN A ,et al. Neither snow nor rain nor MITM:an empirical analysis of email delivery security[C]// Internet Measurement Conference (IMC). 2015: 27-39. |
[13] | HU H , WANG G . End-to-end measurements of email spoofing attacks[C]// USENIX Security Symposium (USENIX Security). 2018: 1095-1112. |
[14] | HU H , PENG P , WANG G . Towards understanding the adoption of anti-spoofing protocols in email systems[C]// IEEE Secure Development Conference (SecDev). 2018: 94-101. |
[1] | Yingjun ZHANG,Ushangqi LI,Mu YANG,Haixia ZHANG,Kezhen HUANG. Survey on anomaly detection technology based on logs [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 1-12. |
[2] | Xiaobing XIONG,Hui SHU,Fei KANG. Method of diversity software protection based on fusion compilation [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 13-24. |
[3] | Xin ZHANG,Weizhong QIANG,Yueming WU,Deqing ZOU,Hai JIN. Mining behavior pattern of mobile malware with convolutional neural network [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 35-44. |
[4] | Tianyu ZHOU,Wenbo SHEN,Nanzi YANG,Jinku LI,Chenggang QIN,Wang YU. Analysis of DoS attacks on Docker inter-component stdio copy [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 45-56. |
[5] | Biao WANG,Xingyang LIU,Ka XU,Wangyang LIU,Kenan WANG,Yuqing XIA. Research on national security risk assessment model of open government data [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 80-87. |
[6] | Gang XIONG,Yuwei GE,Yanjie CHU,Weiquan CAO. Model of cyberspace threat early warning based on cross-domain and collaboration [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 88-96. |
[7] | Qi WU,Hongchang CHEN. Low failure recovery cost controller placement strategy in software defined networks [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 97-104. |
[8] | Guojie LIU,Jianbiao ZHANG. TPCM-based trusted PXE boot method for servers [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 105-111. |
[9] | Yihan YU,Yu FU,Xiaoping WU. Evaluation method of privacy protection effect based on multi-layer fuzzy comprehensive evaluation [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 121-127. |
[10] | Liutao ZHAO,Lin ZHONG,Jidong LIU,Caiqun WANG,Dan WU. Triple receiver public key encryption cryptosystem [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 128-136. |
[11] | Jian JIA,Linfeng LIU,Jiagao WU. Charging pile recommendation method for idle electric taxis based on recurrent neural network [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 152-163. |
[12] | Lei HAN,Jiqiang LIU,Jian WANG,Bo SHI,Xudong HE. Quantitative threat situational assessment method for higher secure attribute value device [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 54-66. |
[13] | Yang SUN,Chunjie CAO,Junxiao LAI,Tianjiao YU. AntiGPS spoofing method for UAV based on LSTM-KF model [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 80-88. |
[14] | Xiao ZHANG,Qinglei ZHOU,Bin LI. Research and implementation of reconfigurable SM4 cryptographic algorithm based on HRCA [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 101-109. |
[15] | Yunfei XIA,Li ZHANG,Kun YANG,Peijie LI,Liming XU. Architecture design of multi-protocol controller based on software definition [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 139-147. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||