I've been trying to wrap my head
around some of the information I've gathered online, and I was hoping for some
clarification.
We are using Office
365, for our email server.
A.) Are SPF records
and DKIM actually doing anything on their own, if DMARC is not enabled or set to
p=none
?
B.) SPF Record
dictates which Email servers, IP's or external domains are allowed to send email as our
domain, correct? For example, we could authorize gmail.com or yahoo.com to send email as
our domain with an SPF
record?
or
When
someone tries to send an email, from anywhere in the world as
user@ourdomain.com
, it would be our SPF record that checks the
email was sent from a valid source,
right?
C.) According to my DMARC
Reports, the only IP address that fails DKIM, is our internal corporate IP, why might
this be? Everything external passes
DKIM.
*Emails sent internally, from employee to
employee, the header states DKIM=none
*I can't
seem to find any emails that say DKIM=fail.
D.)
DKIM sounds more like us, protecting our customers from receiving fraudulent emails.
Unless, someone tries to spoof our domain and send us something.
Correct?
Answer
A) Yes, a spam filter for a receiving server
can use SPF and DKIM records on their own to evaluate mail that claims to be sent from
your domain. DMARC does add an additional layer of security, but also provides the
recipient a way to automatically report back to you on received mail. By parsing the XML
reports sent by mail recipients you can find out if mail is being sent as if from your
domain by third parties.
B) Yes. For
example: We send most of our mail via Microsoft EOP, but some is sent directly from a
local Postfix server. By adding a DNS alias for EOP and the specific IP address for our
local outbound server to our SPF record, we mark both sources as
legitimate.
Just to nit-pick, though: Your SPF
record by itself doesn’t check anything; it’s just a dumb text string. The checking is
performed by servers that compare the mail header contents with a few DNS TXT records
including SPF if it exists.
C) The behavior you
describe means you don’t use DKIM to sign mail in your own systems. This is pretty
common in Microsoft-based environments. Since the mail isn’t signed at all, you don’t
get a signature verification failure.
If you
instead would add a DKIM signature to your mail and have the header point at a public
DKIM key that didn’t mathematically correspond to the signature, or if you tampered with
a mail after it had been signed, you would end up with actual DKIM
failures.
D) DKIM is basically a digital
signature and a pointer to a public key. It tells the recipient that a mail with this
particular hash value did in fact pass through a mail server you trust as a valid
sender.
Comments
Post a Comment