SMTP smuggling exploits vulnerabilities in email server implementations, rather than the SMTP protocol itself, to bypass security measures like SPF, DKIM, and DMARC. This allows attackers to inject malicious content into email streams, leading to phishing attacks, spam, malware distribution, and potentially data breaches. The issue stems from deviations from SMTP standards, complex implementations, and insufficient security authorization. Microsoft has addressed this with updates to Exchange Online Protection, but broader prevention requires rigorous input validation, stricter adherence to standards, strong authentication, encryption, regular security audits, and a possible re-evaluation of existing email authentication methods, including concerns around ARC's trustworthiness.
11 marketer opinions
SMTP smuggling is a technique that exploits vulnerabilities in email server implementations and message formatting to bypass security measures like SPF, DKIM, and DMARC. Attackers inject malicious content into email headers and bodies, which recipient servers interpret as legitimate emails. This can lead to phishing attacks, spam, and malware distribution. The core problem isn't the SMTP protocol itself, but the security and authorization policies of inbound systems. Microsoft has patched this vulnerability, but broader solutions involve stricter adherence to SMTP standards, improved input validation, and robust email infrastructure security measures. There are also concerns about the effectiveness of ARC as a "trust me" system.
Marketer view
Marketer from Email Geeks explains that SMTP smuggling is an implementation issue, not a protocol issue.
30 Oct 2022 - Email Geeks
Marketer view
Email marketer from TheHackerNews explains that attackers are using SMTP smuggling to bypass traditional email security measures, such as SPF, DKIM, and DMARC, by manipulating the way email servers interpret message boundaries and headers.
29 Jan 2022 - TheHackerNews
4 expert opinions
The responses highlight several key aspects regarding SMTP smuggling. Firstly, stricter adherence to SMTP specifications might cause legitimate emails to fail. Secondly, there's a sentiment that email authentication methods need to be re-evaluated and potentially redesigned from the ground up. Thirdly, prevention involves rigorous input validation, strict adherence to standards, and implementing security measures. Finally, safeguarding email streams requires strong authentication, encryption, and regular security audits.
Expert view
Expert from Email Geeks shares that it will be interesting to see how many legit emails fail when folks start requiring compliance with the SMTP spec.
18 Aug 2023 - Email Geeks
Expert view
Expert from Email Geeks shares that after 20 years, it might be time to rethink authentication from the ground up due to issues that were previously dismissed.
18 Apr 2025 - Email Geeks
5 technical articles
SMTP smuggling, as highlighted by various documentation sources, presents a significant threat to email security due to deviations from SMTP standards and complex implementations across different servers. This allows attackers to manipulate message formatting and bypass security filters like DMARC, leading to potential data breaches and financial losses. Microsoft's Exchange Online Protection (EOP) has been updated with stricter header validation to mitigate these attacks.
Technical article
Documentation from RFC Editor explains that the SMTP protocol defines how email messages should be transmitted. Deviations from the standard can lead to vulnerabilities such as SMTP smuggling, where attackers manipulate message formatting to bypass security filters.
11 Dec 2022 - RFC Editor
Technical article
Documentation from IETF explains that the SMTP standards are complex, and variations in implementation across different email servers can create opportunities for attackers to exploit vulnerabilities like SMTP smuggling.
22 Feb 2024 - IETF
How are bad actors using Google Forms to send spam?
How can a phishing email pass SPF and DKIM authentication checks?
How can email senders and users prevent and identify phishing emails?
How can I protect my domain from being spoofed and blacklisted?
How can I use DMARC to prevent spammers from using my domain?