Educause Security Discussion mailing list archives
Re: Response to phishing e-mails
From: Nick Semenkovich <nick () SEMENKOVICH COM>
Date: Fri, 31 Oct 2014 11:21:09 -0500
On Thu, Oct 30, 2014 at 9:29 AM, Paul Chauvet <chauvetp () newpaltz edu> wrote:
Aside from two-factor (which we will have eventually), we already have in place many of the features you've had. I won't go into specifics, but most important services are only accessible via Campus IPs (or via VPN for some users). Doing that with email will never really be a viable option. We do have notices and alerts for 'abnormal' IP connections to our SMTP server. Faculty/staff who frequently travel to other countries do get whitelisted for these issues. The impact of a phished email account has been reduced.
That sounds great! I think you're probably better off than most institutions :)
What we haven't done is implement DMARC and SPF hard fails. DMARC has its own problems, especially with regards to mailing lists. In my opinion it is a solution that causes more problems than it fixes. SPF hardfail causes similar issues in my opinion.
Sure, I'll focus here, since this thread started on phishing. DMARC compliance has *really* improved ever since Yahoo, AOL, and others adopted a p=reject policy for their huge numbers of users. Many mailing lists (including this one) "just work". (Unfortunately, without a p=none [report-only] policy, you can't even tell if you'd have mailing list problems at all -- let alone who's sending mail as you!) Perhaps consider this perspective (which is an interesting one for TLS/HSTS, too): What if you dropped all the technical jargon, and had to ask the administration or legal counsel for approval? Then, the options look *really* different: (No DMARC) "Hey, I'd like to let anyone in the world send email and pretend to be us. Can legal sign off on that?" (p=none) "It'd like to let anyone send emails pretending to be us, but ... we can get a rough idea of who's sending things. Is that ok?" (p=quarantine) "Only we should be able to send mail as our university. Messages to old mailing lists might get quarantined, though this seems to work for Yahoo, AOL, ..."
The phishing attempts we do receive (that get through) aren't spoofing our domain.
Perhaps true, but I'll bet they're going to other domains (along with the usual spam, etc.) in your university's name. - Nick Again, I want to emphasize I mean none of this specifically about your institution. More broadly, I've seen a surprising amount of spam/phishing impersonating very high-profile .edu domains, either from compromised resnets that don't filter port 25 egress, or *no* SPF policies (which is absurd), etc. I'm happy there's an open thread on the topic -- thanks for replying! -- Nick Semenkovich Laboratory of Dr. Jeffrey I. Gordon Medical Scientist Training Program School of Medicine Washington University in St. Louis https://nick.semenkovich.com/
Current thread:
- Re: Response to phishing e-mails, (continued)
- Re: Response to phishing e-mails Thomas Carter (Oct 29)
- Re: Response to phishing e-mails Nick Semenkovich (Oct 29)
- Re: Response to phishing e-mails Brandon Hume (Oct 29)
- Re: Response to phishing e-mails Robert Meyers (Oct 29)
- Re: Response to phishing e-mails Paul Chauvet (Oct 29)
- Re: Response to phishing e-mails Nick Semenkovich (Oct 29)
- Re: Response to phishing e-mails Brandon Hume (Oct 29)
- Re: Response to phishing e-mails Jones, Mark B (Oct 29)
- Re: Response to phishing e-mails Kalal, Robert (Bob) (Oct 29)
- Re: Response to phishing e-mails Paul Chauvet (Oct 30)
- Re: Response to phishing e-mails Nick Semenkovich (Oct 31)
- Re: Response to phishing e-mails Andrew Daviel (Nov 13)
