SlideShare a Scribd company logo
1 of 24
Download to read offline
ALL YOUR EMAILS BELONG TO US
March 2017
Ilya Nesterov, Max Goncharov
Exploiting vulnerable email clients via domain name collision
Ilya Nesterov
I break things
I build things to break things
Security researcher
Shape Security
Who we are
Max Goncharov
Security researcher
Threat OSINT
Vuln. hunter
Shape Security
Email? What is wrong with that?
Email? What is wrong with that?
AUTODISCOVER
20102008 2009 20172006
Feature
for Office 2007
Autodiscover announced
as a feature for the
upcoming product release
Autodiscover : History
20102009 2017
Introduced
April 2008
Introduced as version 0.1
with preliminary
description of the service.
Autodiscover : History
20082006
20102009 2017
Thunderbird
config-v1.1.xml
Alternative of Autodiscover for
Thunderbird proposed in 2008
and released in 2009.
Autodiscover : History
2006 2008
2017
Lync Server
2010
Part of mobility program
for easier data exchange.
Introduced HTTP and
HTTPS Autodiscover
process.
Autodiscover : History
2006 2008 20102009
Here we are
With Autodiscover
We found severe
vulnerabilities in some
autodiscover client
implementations.
Autodiscover : History
2006 2008 2009 2010 2017
Autodiscover : Process
1. Define the candidate pool
2. Try each server from a list
Defining the candidate pool
1. Query LDAP or AD servers
2. Derive URL from the email address
3. Query DNS for Autodiscover SRV records
4. Send an unauthenticated GET request
5. Prioritize
Derive URL from the email
1. https://+ {domain} + /autodiscover/autodiscover.xml
2. https://autodiscover. + {domain} + /autodiscover/autodiscover.xml
tomknopf77@jarzt.com
jarzt.com
1. https://jarzt.com /autodiscover/autodiscover.xml
2. https://autodiscover.jarzt.com/autodiscover/autodiscover.xml
What can be wrong?
tomknopf77@jarzt.com
local@domain
Local: tomknopf77
Domain: jarzt.com
Email address complexity
tom@knopf77@jarzt.com
RFC 5321 RFC 5322 RFC 6531 RFC 6532
"()<>[]:,;@"!#$%&'-/=?^_`{}| ~.a"@example.org
"tom@knopf77"@jarzt.com
Samsung Mail Client
autodiscover.example.com.au
autodiscover.com.au
tomknopf77@example.com.au
Announced as fixed: January 2017
CVE-2016-9940
iOS Mail app
autodiscover. + <domain>
autodiscover.com
tomknopf77@example@com
21
Announced as fixed: March 2017. iOS 10.3
CVE-2017-2414
We need more data!
8K+
Mozilla public suffix list
1.5K+
IANA TLD list
Let’s build a hacking machine!*
* It’s just a simple HTTP sink
Email clients INTERNET
BUILD AND DEPLOY
- 26 autodiscover domains
- HTTP, HTTPS ports
- Certificates: Let’s Encrypt
- Accept all requests
HTTP servers
Data Store,
Analytics
Logs! This is … scary!
13MTotal requests received
26Domains in experiment
7Month period
Sep 2016 - March 2017
9MRequests with Basic
Authentication header
2473Different Autodiscover
client user-agents
212KEmail accounts affected from
65K different domains
RESULTS
Users:
- use recommended email clients
- install security updates
MITIGATION
Enterprise:
- follow official deployment guides
- use only supported email clients
- test all third party clients
- check your deployment regularly
Developers:
- follow Autodiscover specification
- derive local and domain parts properly
- remember TLD and public suffix list
- test, test, test
ICANN:
- ban autodiscover domain registration
EMAIL IS COMPLICATED
It is even more complicated than you think!
READ THE DOCS!
Even if you read it. Read between the lines
NOBODY IS PERFECT
We all make mistakes. Let’s learn from someone else’s experience
Conclusion
www.shapesecurity.comDemo!
www.shapesecurity.comThank You

More Related Content

Similar to Black Hat Asia 2017: ALL YOUR EMAILS BELONG TO US: EXPLOITING VULNERABLE EMAIL CLIENTS VIA DOMAIN NAME COLLISION

Think Tank - I.T. services
Think Tank - I.T. servicesThink Tank - I.T. services
Think Tank - I.T. servicesRohan Makkar
 
Containerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud MigrationContainerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud MigrationAmazon Web Services
 
How do Things talk? IoT Application Protocols 101
How do Things talk? IoT Application Protocols 101How do Things talk? IoT Application Protocols 101
How do Things talk? IoT Application Protocols 101Christian Götz
 
Building Windows - how the bits flow from check-in to the fast-ring
Building Windows - how the bits flow from check-in to the fast-ringBuilding Windows - how the bits flow from check-in to the fast-ring
Building Windows - how the bits flow from check-in to the fast-ringMicrosoft Tech Community
 
Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Jorgen Thelin
 
Tutorial: Building Your First App with MongoDB Stitch
Tutorial: Building Your First App with MongoDB StitchTutorial: Building Your First App with MongoDB Stitch
Tutorial: Building Your First App with MongoDB StitchMongoDB
 
Patch Tuesday - August 2017 - Ivanti
Patch Tuesday - August 2017 - IvantiPatch Tuesday - August 2017 - Ivanti
Patch Tuesday - August 2017 - IvantiErica Azad
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overviewMotty Ben Atia
 
Sprayer: low latency, reliable multichannel messaging
Sprayer: low latency, reliable multichannel messagingSprayer: low latency, reliable multichannel messaging
Sprayer: low latency, reliable multichannel messagingPablo Enfedaque
 
NoSQL Matters BCN 2013. Sprayer Low Latency, Reliable, Mutichannel Messaging
NoSQL Matters BCN 2013. Sprayer Low Latency, Reliable, Mutichannel MessagingNoSQL Matters BCN 2013. Sprayer Low Latency, Reliable, Mutichannel Messaging
NoSQL Matters BCN 2013. Sprayer Low Latency, Reliable, Mutichannel MessagingJavier Arias Losada
 
27.2.12 lab interpret http and dns data to isolate threat actor
27.2.12 lab   interpret http and dns data to isolate threat actor27.2.12 lab   interpret http and dns data to isolate threat actor
27.2.12 lab interpret http and dns data to isolate threat actorFreddy Buenaño
 
Get your site microsoft edge ready
Get your site microsoft edge readyGet your site microsoft edge ready
Get your site microsoft edge readyMostafa
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10dianacheng
 
Building Your First App with MongoDB Stitch
Building Your First App with MongoDB StitchBuilding Your First App with MongoDB Stitch
Building Your First App with MongoDB StitchMongoDB
 

Similar to Black Hat Asia 2017: ALL YOUR EMAILS BELONG TO US: EXPLOITING VULNERABLE EMAIL CLIENTS VIA DOMAIN NAME COLLISION (20)

Think Tank - I.T. services
Think Tank - I.T. servicesThink Tank - I.T. services
Think Tank - I.T. services
 
Web Hosting Pricing for 2010 2013
Web Hosting Pricing for 2010 2013Web Hosting Pricing for 2010 2013
Web Hosting Pricing for 2010 2013
 
Containerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud MigrationContainerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud Migration
 
How do Things talk? IoT Application Protocols 101
How do Things talk? IoT Application Protocols 101How do Things talk? IoT Application Protocols 101
How do Things talk? IoT Application Protocols 101
 
Building Windows - how the bits flow from check-in to the fast-ring
Building Windows - how the bits flow from check-in to the fast-ringBuilding Windows - how the bits flow from check-in to the fast-ring
Building Windows - how the bits flow from check-in to the fast-ring
 
Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
Tutorial: Building Your First App with MongoDB Stitch
Tutorial: Building Your First App with MongoDB StitchTutorial: Building Your First App with MongoDB Stitch
Tutorial: Building Your First App with MongoDB Stitch
 
IoT-javascript-2019-fosdem
IoT-javascript-2019-fosdemIoT-javascript-2019-fosdem
IoT-javascript-2019-fosdem
 
Patch Tuesday - August 2017 - Ivanti
Patch Tuesday - August 2017 - IvantiPatch Tuesday - August 2017 - Ivanti
Patch Tuesday - August 2017 - Ivanti
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overview
 
Sprayer: low latency, reliable multichannel messaging
Sprayer: low latency, reliable multichannel messagingSprayer: low latency, reliable multichannel messaging
Sprayer: low latency, reliable multichannel messaging
 
NoSQL Matters BCN 2013. Sprayer Low Latency, Reliable, Mutichannel Messaging
NoSQL Matters BCN 2013. Sprayer Low Latency, Reliable, Mutichannel MessagingNoSQL Matters BCN 2013. Sprayer Low Latency, Reliable, Mutichannel Messaging
NoSQL Matters BCN 2013. Sprayer Low Latency, Reliable, Mutichannel Messaging
 
Kenta Yasukawa - IoT World 2018
Kenta Yasukawa - IoT World 2018Kenta Yasukawa - IoT World 2018
Kenta Yasukawa - IoT World 2018
 
resume
resumeresume
resume
 
resume
resumeresume
resume
 
27.2.12 lab interpret http and dns data to isolate threat actor
27.2.12 lab   interpret http and dns data to isolate threat actor27.2.12 lab   interpret http and dns data to isolate threat actor
27.2.12 lab interpret http and dns data to isolate threat actor
 
Get your site microsoft edge ready
Get your site microsoft edge readyGet your site microsoft edge ready
Get your site microsoft edge ready
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10
 
Building Your First App with MongoDB Stitch
Building Your First App with MongoDB StitchBuilding Your First App with MongoDB Stitch
Building Your First App with MongoDB Stitch
 

Recently uploaded

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Black Hat Asia 2017: ALL YOUR EMAILS BELONG TO US: EXPLOITING VULNERABLE EMAIL CLIENTS VIA DOMAIN NAME COLLISION

  • 1. ALL YOUR EMAILS BELONG TO US March 2017 Ilya Nesterov, Max Goncharov Exploiting vulnerable email clients via domain name collision
  • 2. Ilya Nesterov I break things I build things to break things Security researcher Shape Security Who we are Max Goncharov Security researcher Threat OSINT Vuln. hunter Shape Security
  • 3. Email? What is wrong with that?
  • 4. Email? What is wrong with that? AUTODISCOVER
  • 5. 20102008 2009 20172006 Feature for Office 2007 Autodiscover announced as a feature for the upcoming product release Autodiscover : History
  • 6. 20102009 2017 Introduced April 2008 Introduced as version 0.1 with preliminary description of the service. Autodiscover : History 20082006
  • 7. 20102009 2017 Thunderbird config-v1.1.xml Alternative of Autodiscover for Thunderbird proposed in 2008 and released in 2009. Autodiscover : History 2006 2008
  • 8. 2017 Lync Server 2010 Part of mobility program for easier data exchange. Introduced HTTP and HTTPS Autodiscover process. Autodiscover : History 2006 2008 20102009
  • 9. Here we are With Autodiscover We found severe vulnerabilities in some autodiscover client implementations. Autodiscover : History 2006 2008 2009 2010 2017
  • 10. Autodiscover : Process 1. Define the candidate pool 2. Try each server from a list
  • 11. Defining the candidate pool 1. Query LDAP or AD servers 2. Derive URL from the email address 3. Query DNS for Autodiscover SRV records 4. Send an unauthenticated GET request 5. Prioritize
  • 12. Derive URL from the email 1. https://+ {domain} + /autodiscover/autodiscover.xml 2. https://autodiscover. + {domain} + /autodiscover/autodiscover.xml tomknopf77@jarzt.com jarzt.com 1. https://jarzt.com /autodiscover/autodiscover.xml 2. https://autodiscover.jarzt.com/autodiscover/autodiscover.xml
  • 13. What can be wrong? tomknopf77@jarzt.com local@domain Local: tomknopf77 Domain: jarzt.com
  • 14. Email address complexity tom@knopf77@jarzt.com RFC 5321 RFC 5322 RFC 6531 RFC 6532 "()<>[]:,;@"!#$%&'-/=?^_`{}| ~.a"@example.org "tom@knopf77"@jarzt.com
  • 16. iOS Mail app autodiscover. + <domain> autodiscover.com tomknopf77@example@com 21 Announced as fixed: March 2017. iOS 10.3 CVE-2017-2414
  • 17. We need more data! 8K+ Mozilla public suffix list 1.5K+ IANA TLD list
  • 18. Let’s build a hacking machine!* * It’s just a simple HTTP sink Email clients INTERNET BUILD AND DEPLOY - 26 autodiscover domains - HTTP, HTTPS ports - Certificates: Let’s Encrypt - Accept all requests HTTP servers Data Store, Analytics
  • 19. Logs! This is … scary!
  • 20. 13MTotal requests received 26Domains in experiment 7Month period Sep 2016 - March 2017 9MRequests with Basic Authentication header 2473Different Autodiscover client user-agents 212KEmail accounts affected from 65K different domains RESULTS
  • 21. Users: - use recommended email clients - install security updates MITIGATION Enterprise: - follow official deployment guides - use only supported email clients - test all third party clients - check your deployment regularly Developers: - follow Autodiscover specification - derive local and domain parts properly - remember TLD and public suffix list - test, test, test ICANN: - ban autodiscover domain registration
  • 22. EMAIL IS COMPLICATED It is even more complicated than you think! READ THE DOCS! Even if you read it. Read between the lines NOBODY IS PERFECT We all make mistakes. Let’s learn from someone else’s experience Conclusion