all-in-one privacy solution":["Proton Unlimited es una solución de privacidad todo en uno"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Sin publicidad. La privacidad por bandera."],"People before profits":["Nos importan las personas, no los beneficios"],"Security through transparency":["Seguridad con transparencia"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Las mejores ofertas del ${ BLACK_FRIDAY } de Proton Mail"],"The world’s only community- supported email service":["El único servicio de correo electrónico financiado la comunidad"]},"specialoffer:limited":{"${ hours } hour":["${ hours } hora","${ hours } horas"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Tiempo restante: ${ hoursLeft }, ${ minutesLeft } y ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minutos"],"${ seconds } second":["${ seconds } segundo","${ seconds } segundos"],"Limited time offer":["Oferta por tiempo limitado"]},"specialoffer:listitem":{"Create multiple addresses":["Crea varias direcciones"],"Hide-my-email aliases":["Alias de hide-my-email"],"Quickly unsubscribe from newsletters":["Date de baja rápidamente de boletines"],"Use your own domain name":["Usa tu propio nombre de dominio"]},"specialoffer:logos":{"As featured in":["Hablan de nosotros"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Apuesta por un servicio de correo electrónico cifrado que protege tu privacidad"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Rebajas de Black Friday de Proton: hasta un 40 % de descuento"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Contrata Proton Mail con hasta un 40 % de descuento en las rebajas de Black Friday. Encontrarás nuestros planes de correo electrónico cifrado de extremo a extremo al mejor precio."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Rebajas de Black Friday en Proton Mail | Correo electrónico seguro con hasta un 40 % de descuento"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* A un precio de ${ TOTAL_SUM } durante el primer año"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*A un precio de ${ TOTAL_SUM } durante los 2 primeros años"],"30-day money-back guarantee":["Garantía de devolución de 30 días"],"Billed at ${ TOTAL_SUM } for the first 2 years":["A un precio de ${ TOTAL_SUM } durante los 2 primeros años"],"Billed at ${ TOTAL_SUM } for the first year":["A un precio de ${ TOTAL_SUM } durante el primer año"],"You save ${ SAVE_SUM }":["Ahorras ${ SAVE_SUM }"]},"specialoffer:off":{"${ PERCENT_OFF } off":["−${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Adoro ProtonMail"],"My favorite email service":["Mi servicio de correo electrónico favorito"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Gracias, Proton, por brindarnos protección en este mundo salvaje de Internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Dan justo lo que prometen. Si las grandes tecnológicas te ofrecen algo gratis, se aprovechan de ti, por eso dejé de usar Gmail y me pasé a @ProtonMail"]},"specialoffer:time":{"Days":["días"],"Hours":["horas"],"Min":["min"]},"specialoffer:title":{"And much more":["Y mucho más"],"Safe from trackers":["Evita los rastreadores"],"Stay organized":["Mantén el orden"],"Black Friday email deals":["Ofertas en correo electrónico del Black Friday"],"Don’t just take our word for it":["Lee testimonios de otras personas"],"Make your inbox yours":["Toma posesión de tu bandeja de entrada"],"Our story":["Nuestra historia"],"Transfer your data from Google in one click":["Transfiere tus datos de Google con un clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Accede a contenido bloqueado y navega con privacidad. Incluye ${ TOTAL_VPN_SERVERS } servidores en más de ${ TOTAL_VPN_COUNTRIES } países. Conecta hasta 10 dispositivos, accede a servicios de streaming de todo el mundo, bloqueadores de malware y anuncios, etc."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Comparte tu calendario con familiares, amigos y compañeros fácilmente y consulta calendarios externos."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Incluye compatibilidad con 1 dominio de correo electrónico personalizado, 10 direcciones de correo electrónico, 10 alias de hide-my-email, posibilidad de compartir calendario, etc."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Incluye compatibilidad con 3 dominios de correo electrónico personalizado, 15 direcciones de correo electrónico, alias ilimitados de hide-my-email, posibilidad de compartir calendario, etc."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Gestiona hasta 25 calendarios protegidos con cifrado de extremo a extremo y con opción, por ejemplo, de importar los de Google con un solo clic."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Hay problemas con el servicio de Proton VPN en estos momentos"]},"Status banner":{"Learn more":["Más información"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Ten presente que, en estos momentos, el servicio de ${ issues[0] } está dando problemas de funcionamiento."],"We are experiencing issues with one or more services at the moment.":["Uno o varios servicios están dando problemas de funcionamiento en estos momentos."]},"steps":{"Step":["Paso"]},"suggestions":{"Suggestions":["Sugerencias"]},"Support":{"Sub category":["Subcategoría","Subcategorías"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categoría","Categorías"],"Didn’t find what you were looking for?":["¿No has encontrado lo que buscabas?"],"General contact":["Contacto para consultas generales"],"Get help":["Obtener ayuda"],"Legal contact":["Contacto para cuestiones legales"],"Media contact":["Contacto para prensa y medios de comunicación"],"Partnerships contact":["Contacto para colaboraciones"],"Reading":["Lectura"]},"Support Form Platform option":{"VPN for Android TV":["VPN para Android TV"],"VPN for Apple TV":["VPN para Apple TV"],"VPN for Chromebook":["VPN para Chromebook"]},"Support troubleshooting":{"App version":["Versión de la aplicación"],"Browser":["Navegador"],"Check if this helps":["Comprueba a ver si te sirve"],"Choose a product":["Elegir producto"],"Did this solve your issue?":["¿Te ha resultado útil para resolver el problema?"],"Faster assistance is just a few clicks away":["Solo te separan unos clics de una asistencia más rápida"],"How can we help?":["¿Cómo podemos ayudarte?"],"No, contact support":["No, contactar con el equipo de asistencia"],"Please fill out one field after another":["Rellena un campo después de otro"],"Please make your selections":["Realiza tus selecciones"],"Proton account":["Cuenta de Proton"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Gracias por tus comentarios"],"What can we help with?":["¿En qué podemos ayudarte?"],"Yes":["Sí"]},"support_modal_search_query":{"Search query":["Consulta de búsqueda"]},"support_search_button":{"Search":["Buscar"]},"support_search_i_am_looking_for":{"I'm looking for":["Busco"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Para una resolución más rápida, informa del problema desde la aplicación Bridge: Ayuda > Notificar un problema."],"Information":["Información"]},"SupportForm:option":{"Account Security":["Seguridad de la cuenta"],"Contacts":["Contactos"],"Custom email domain":["Dominio de correo electrónico personalizado"],"Email delivery and Spam":["Envío de correos electrónico y spam"],"Encryption":["Cifrado"],"Login and password":["Inicio de sesión y contraseña"],"Merge aliases and accounts":["Fusionar seudónimos y cuentas"],"Migrate to Proton":["Migrar a Proton"],"Notifications":["Notificaciones"],"Other":["Otro"],"Plans and billing":["Planes y facturación"],"Proton for Business":["Proton for Business"],"Sign up":["Regístrate"],"Storage":["Almacenamiento"],"Users, addresses, and identities":["Usuarios, direcciones e identidades"]},"SupportForm:optionIntro":{"Select a topic":["Selecciona un tema"]},"Testimonial":{"Awards":["Premios"],"Customers":["Clientes"],"Featured":["Destacado"],"Go to testimonial source":["Ir a la fuente del testimonio"],"Open source of award":["Fuente disponible del premio"],"Open source of quote":["Fuente disponible del testimonio"],"Reviews":["Opiniones"],"Videos":["Vídeos"],"Watch on TikTok":["Ver en TikTok"],"Watch on YouTube":["Ver en YouTube"]},"TestimonialCategory":{"Awards":["Premios"],"Customers":["Clientes"],"Featured":["Destacado"],"Media":["Medios"],"Reviews":["Opiniones"],"Videos":["Vídeos"]},"Text":{"If you need help, check out our ${ supportLink }.":["Si necesitas ayuda, consulta nuestra ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Es posible que la página que buscas haya sido eliminada o que sea un\nenlace antiguo."],"Your question may already have an answer in our knowledge base:":["Puede que haya respuesta a tu pregunta en nuestra base de conocimientos:"]},"Title":{"On this page":["En esta página"],"Page not found":["No se encontró la página"],"Related articles":["Artículos relacionados"],"Share ${ thisPage }":["Compartir ${ thisPage }"],"Switch to Proton Pass - Contact us":["Cambia a Proton Pass - Contáctanos"],"Thank you!":["¡Gracias!"],"this page":["esta página"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accede a contenido bloqueado y navega en privado. Tendrás a tu disposición más de ${ TOTAL_VPN_SERVERS } servidores en más de ${ TOTAL_VPN_COUNTRIES } países, VPN de máxima velocidad, ${ TOTAL_VPN_CONNECTIONS } conexiones VPN, servicios de streaming en todo el mundo, bloqueadores de malware y anuncios, y mucho más."]},"vpn_servers":{"Get Proton VPN Plus":["Obtener Proton VPN Plus"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Obtener Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Guía sobre Bitcoin"],"Proton Wallet news":["Novedades sobre Proton Wallet"],"Proton Wallet support":["Soporte para Proton Wallet"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Incluye todas las funciones en Proton Unlimited y"],"Limited availability":["Disponibilidad limitada"],"The easiest way to securely own, send, and receive Bitcoin":["La forma más fácil de retener, enviar y recibir Bitcoin con seguridad"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Descubre Proton Wallet"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Almacena Bitcoin y negocia de forma privada con una cartera de autocustodia cifrada."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Infórmate sobre Bitcoin, la red de valor de internet."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Asegúrate de tener siempre el control de tu Bitcoin."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["La cartera cifrada de código abierto que te permite controlarlo todo."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
On 1 December 2021, we began receiving sporadic reports of delivery failures from proton.me addresses to Gmail. This corresponded with a dramatic decline in proton.me’s domain reputation as seen via Gmail Postmaster Tools and an increase in sending from known bad IP addresses.
It was clear both from the bad sending IPs (mostly in Russia) and our own metrics that the spam emails damaging Proton Mail’s domain reputation were not coming from our servers. However, the Postmaster Tools indicated that all emails being received by Gmail from proton.me were “fully authenticated”, including the fraudulent ones.
This, in turn, caused the fraudulent emails to feed into Google’s algorithm for determining domain reputation and lowered it enough that the deliverability of legitimate emails from our servers was affected as well.
We suspected a DKIM replay attack, where a single spam email originally sent from Proton Mail was being resent to many Gmail users in an attempt to exploit our deliverability and reputation to get around Google’s anti-spam measures. At one point, roughly 98% of the emails Gmail received that claimed to be from Proton Mail were actually spam, meaning the spammers were sending an amount of emails that was equivalent to 50 times our normal outgoing traffic to Google.
We immediately rotated our DKIM signing key to (temporarily) prevent the emails from passing DKIM and contacted Google’s counter-abuse team, who quickly implemented a fix to Gmail’s spam filters and restored legitimate email delivery.
Emails sent from proton.me, proton.me/mail, and custom domains were not affected by this issue.
How DKIM replay attacks work
Before we can explain how this happened, we first need to outline how emails are structured, delivered, and authenticated on the internet.
Emails are MIME (Multipurpose Internet Mail Extensions) messages, consisting of headers and sections that contain the message body and possibly attachments. The headers contain some fields that will be familiar to any email user (To, CC, From, Subject) but also hidden information that is used to authenticate the email.
However, none of the headers are actually used to route the email to its final destination. The recipient and sender of the email are specified separately as part of the email envelope, which is a very suitable metaphor. If the email message, including its headers, is equivalent to a paper letter, then the email envelope in which the “letter” is placed contains the recipient and return addresses, like a real envelope.
The key point is that the recipient on the envelope does not have to match any recipient in the To or CC headers — typical examples of this are emails sent via BCC or addressed to “undisclosed recipients”.
Perhaps even more surprisingly, the envelope sender does not have to match the email From header. This also has a legitimate purpose — mass mailings often specify a different “return address” than the From header to analyze deliverability problems or use third-party services to send emails. This flexibility is also important for enabling users to forward messages from one mailbox to another.
These return addresses are authenticated via SPF (Sender Policy Framework), which authorizes the sending of messages by specific servers or IP addresses using special DNS records. But this only validates the server sending the email; it does not ensure that the email’s content has not been tampered with. For that, we need DKIM (Domain Keys Identified Mail).
DKIM also uses special DNS records, but rather than a list of IP addresses, these records contain keys used to sign the email content and certain associated headers. The resulting cryptographic signature is appended to the message as a special header, and the recipient mail server or client can verify this signature against the email content on delivery. But the DKIM domain in the signature can also be different from the one in the From header in the message itself. If the DKIM signature is verified, this only confirms that the message went through the signing domain’s mail servers and has not been modified since, not that the message originated from where it claims.
To actually verify that the domain in the From header sent the message, we need DMARC (Domain-based Message Authentication, Reporting, and Conformance). To pass DMARC, an email must pass either SPF or DKIM, and the domain in the From header must be “aligned” with the corresponding SPF or DKIM domain. The From header is what the user ultimately sees, so DMARC is a critical part of ensuring that an email originated from where it claims it did as it is the only policy that connects the From header to either the sending or signing domain.
Now let’s return to the attack. The reason that DKIM replay attacks work and why Gmail considered those replayed spam mails “authenticated” comes down to the fact that DMARC requires DKIM or SPF alignment, but not both. The replayed message itself had a valid DKIM signature from proton.me, which meant it passed DMARC. This message was then sent enough times that it influenced proton.me’s domain reputation in Gmail’s system, eventually becoming low enough to affect deliverability for legitimate email.
How we prevent replay attacks
The fact that DMARC passes if either the DKIM domain or the SPF domain align with the From domain is a feature of the specification, not a bug. In particular, it enables email forwarding and allows email sending by trusted third parties. However, for email service providers, such as Proton, Gmail, or Yahoo, it also enables these kinds of replay attacks, as any user can send an email, get it signed by the corresponding domain, then resend it with the signature intact.
This is one reason that Proton and other email providers invest heavily in their own anti-spam technology and systems. These systems are complex and often rely on complicated heuristics to separate spam from legitimate email. In this case, the attackers found a vulnerability in Gmail’s anti-spam system and were able to exploit it.
We appreciate Google’s responsiveness in addressing the issue.
How you can prevent domain impersonation on your domain
DKIM replay attacks are an issue primarily for email service providers or other organizations that offer email addresses on a shared domain. However, email authentication attacks in general are a risk for any organization. Here are some tips to help you ensure no one else can impersonate your domain or use it to send fraudulent messages.
Set up SPF, DKIM, and DMARC – Although imperfect, these policies are key to ensuring that your emails are delivered and resistant to being spoofed. If you use Proton to host your domain, our domain setup wizard will explain how to set it up and protect it from being spoofed.
Rotate your DKIM keys regularly – Rotating our DKIM keys allowed us to quickly stop the attack and buy time for the permanent solution. Although tedious and risky to do manually, Proton’s DKIM key management system(ventana nueva) allowed us to easily do this in minutes, and this system is the same system used for all domains hosted at Proton. The system also automatically rotates keys regularly to reduce the risk of key compromise.
Oversign From, To, and CC headers – Most DKIM implementations always sign the From, To, and CC headers if they are present in an email, preventing them from being modified if the message is resent. However, if these headers are missing, they are often unsigned, opening the door to replay attacks with forged headers that make the fraudulent emails seem legitimate. Oversigning mitigates these attacks by signing these sensitive headers in all cases, even if they are blank. If you use Proton to send your email, this oversigning is done for you automatically by our mail servers.
Be careful of subdomains – If you use CNAME records to delegate parts of your website to third parties, you may be also allowing these third parties to send email on behalf of your main domain. This is because, by default, DMARC considers domains aligned if they have a parent-child relationship — that is, sub.example.com aligns with example.com. You can force exact match alignment for SPF, DKIM, or both with the aspf and adkim options in your DMARC policy. However, be aware that this can affect third-party mailing service integrations.
A lot happens after you click Send in Proton Mail
If we’re doing everything correctly on our end, email delivery seems as easy as a single click, but the truth is that it relies on a complex web of interlocking, interdependent policies. Events like this replay attack demonstrate just how complicated it can be to verify something as seemingly simple as “Who sent this email?”
At Proton Mail, we are constantly investigating new protocols and policies to ensure that the millions of emails sent using our platform every day are delivered reliably and securely. We also continuously monitor incoming mail to ensure our authentication checking has been optimized and we have systems and analysts in place 24/7 to mitigate spam and phishing attacks.
This is a vital part of creating an internet where privacy is the default, and we could not do it without the support of the Proton community. Thank you.