A recent vulnerability in the DomainKeys Identified Mail (DKIM) protocol allowed attackers to forge the authenticity...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
of email messages. What are the practical implications? Can DKIM no longer be trusted for email authentication?
Ask the Expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
DomainKeys Identified Mail is designed to cryptographically sign the From address in an email, giving users the option to only receive signed email from legitimate providers. The recently publicized vulnerability in DKIM affected large email providers and basically allowed attackers to forge DKIM-signed emails from the vulnerable providers. Email systems not using DKIM are vulnerable to the same issue of forged emails, but this vulnerability is particularly dangerous because of the element of trust involved with DKIM. Forged DKIM emails could be more effectively used as part of a phishing or social engineering attack than unsigned emails because they look more legitimate.
A classic problem in cryptography involves vulnerabilities arising in the implementation rather than in the cryptography itself. This vulnerability is found in the implementation of the protocol by the email providers, not in the DKIM protocol. These email providers used test or weak signing keys for the DKIM certificates in violation of the DKIM RFC. The weak signing keys used by these email providers stand in contrast with other areas of PKI that have stopped using certificates of less than 1,024-bit keys. Using test keys is like using a self-signed certificate on a website where a user is prompted with a pop-up asking the user if they want to trust the website. Email systems should never be configured to trust test certificates.
DKIM can still be used for email authentication, but enterprises should verify that the certificates in use for DKIM are 1,024 bits or greater, signed by a generally trusted certificate authority, and that their email systems are configured to not use or accept test certificates.
Related Q&A from Nick Lewis
As the Angler exploit kit evolves and adopts new functionality, it's becoming harder to detect and defend against. Enterprise threats expert Nick ...continue reading
A proof-of-concept attack on Apple's Siri allowed researchers to steal data from iOS. Learn more about the iStegSiri attack and how to defend against...continue reading
A new global email scam has cost enterprises millions. Expert Nick Lewis explains how to defend against man-in-the-email attacks with proper training...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.