I've been trying to wrap my head
            around some of the information I've gathered online, and I was hoping for some
            clarification.
We are using Office
            365, for our email server.
A.) Are SPF records
            and DKIM actually doing anything on their own, if DMARC is not enabled or set to
            p=none?
B.) SPF Record
            dictates which Email servers, IP's or external domains are allowed to send email as our
            domain, correct? For example, we could authorize gmail.com or yahoo.com to send email as
            our domain with an SPF
            record?
or
When
            someone tries to send an email, from anywhere in the world as
            user@ourdomain.com, it would be our SPF record that checks the
            email was sent from a valid source,
            right?
C.) According to my DMARC
            Reports, the only IP address that fails DKIM, is our internal corporate IP, why might
            this be? Everything external passes
            DKIM.
*Emails sent internally, from employee to
            employee, the header states DKIM=none
*I can't
            seem to find any emails that say DKIM=fail.
D.)
            DKIM sounds more like us, protecting our customers from receiving fraudulent emails.
            Unless, someone tries to spoof our domain and send us something.
            Correct?
Answer
A) Yes, a spam filter for a receiving server
            can use SPF and DKIM records on their own to evaluate mail that claims to be sent from
            your domain. DMARC does add an additional layer of security, but also provides the
            recipient a way to automatically report back to you on received mail. By parsing the XML
            reports sent by mail recipients you can find out if mail is being sent as if from your
            domain by third parties.
B) Yes. For
            example: We send most of our mail via Microsoft EOP, but some is sent directly from a
            local Postfix server. By adding a DNS alias for EOP and the specific IP address for our
            local outbound server to our SPF record, we mark both sources as
            legitimate.
Just to nit-pick, though: Your SPF
            record by itself doesn’t check anything; it’s just a dumb text string. The checking is
            performed by servers that compare the mail header contents with a few DNS TXT records
            including SPF if it exists.
C) The behavior you
            describe means you don’t use DKIM to sign mail in your own systems. This is pretty
            common in Microsoft-based environments. Since the mail isn’t signed at all, you don’t
            get a signature verification failure.
If you
            instead would add a DKIM signature to your mail and have the header point at a public
            DKIM key that didn’t mathematically correspond to the signature, or if you tampered with
            a mail after it had been signed, you would end up with actual DKIM
            failures.
D) DKIM is basically a digital
            signature and a pointer to a public key. It tells the recipient that a mail with this
            particular hash value did in fact pass through a mail server you trust as a valid
            sender.
Comments
Post a Comment