In an attempt to block email spoofing attacks on yahoo.com addresses, Yahoo began imposing a stricter email validation policy that unfortunately breaks the usual workflow on legitimate mailing lists.
The problem is a new DMARC (Domain-based Message Authentication, Reporting and Conformance) “reject” policy advertised by Yahoo to third-party email servers, said John Levine, a long-time email infrastructure consultant and president of the Coalition Against Unsolicited Commercial Email (CAUCE), in a message sent to the Internet Engineering Task Force (IETF) mailing list Monday.
DMARC is a technical specification for implementing the SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) email validation and authentication mechanisms. These technologies were designed to prevent email address spoofing commonly used in spam and phishing attacks.
The goal of DMARC is to achieve a uniform implementation of SPF and DKIM among the top email service providers and other companies that want to benefit from email validation.
The specification introduces the concept of aligned identifiers, which requires the SPF or DKIM validation domains to be the same as or sub-domains of the domain for the email address in the “from” field. The domain owners can use a DMARC policy setting called “p=” to tell receiving email servers what should happen if the DMARC check fails. The possible values for this setting can be “none” or “reject.”
Over the weekend Yahoo published a DMARC record with “p=reject” essentially telling all receiving email servers to reject emails from yahoo.com addresses that don’t originate from its servers, Levine said.
While this is a good thing from an anti-spoofing perspective, it raises problems for legitimate mailing lists, according to the email expert.
“Lists invariably use their own bounce address in their own domain, so the SPF doesn’t match,” Levine said. “Lists generally modify messages via subject tags, body footers, attachment stripping, and other useful features that break the DKIM signature. So on even the most legitimate list mail like, say, the IETF’s, most of the mail fails the DMARC assertions, not due to the lists doing anything ‘wrong’.”
With the new policy, when a Yahoo user sends an email to a mailing list, the list’s server distributes that message to all subscribers, changing the headers and breaking DMARC validation. List subscribers with email accounts on servers that perform DMARC checks, such as Gmail, Hotmail (Outlook.com), Comcast or Yahoo itself, will reject the original message and respond back to the list with automated DMARC error messages.
For example, Gmail will respond with a message that reads: “smtp;550 5.7.1 Unauthenticated email from yahoo.com is not accepted due to domain’s DMARC policy. Please contact administrator of yahoo.com domain if this was a legitimate mail.”
So users of Gmail, Hotmail and other DMARC-enabled providers will not only fail to receive messages sent to the mailing list by Yahoo users, but will flood the list with bounce messages, risking to be bounced off the list themselves, Levine said.
The email expert recommended that mailing list operators suspend the list posting rights of yahoo.com users and ask them to re-subscribe to their lists with accounts from different email providers.
Yahoo did not immediately respond to an inquiry seeking clarification on whether its new DMARC policy is permanent or temporary.
Latest posts by TWR (see all)
- Connecting to Airport WiFi is Safe, Right?…..Wrong - December 5, 2017
- Your HP Wireless mouse can be Spoofed; Be careful - May 18, 2017
- E.U. Fines Facebook $122 Million for misleading information about WhatsApp acquisition - May 18, 2017