Skip to content
  • Home
  • Services
    • Combo Plans
      • Shared Support
      • Semi Dedicated Support
      • Dedicated Support
    • Control Panel Support
      • DirectAdmin Support
      • cPanel Support
      • Plesk Support
    • Server Setup & Support
  • Products
    • Managed Migration
    • Nginx Support
    • Varnish Support
    • Shield
  • Careers
    • Internship Programme
  • KnowledgeBase
  • Contact Us
  • Blog
  • About Us

WHM-cPanel Control Panel

4
  • How to log in to cPanel?
  • How to find outdated services in cPanel
  • Exclude services from the outdated services script’s check in cPanel
  • catch-all accounts, and how to add that in cPanel

Email

3
  • How to install mail function on a Centos server.
  • SPF, DKIM, and DMARC records explained
  • How to configure an Email account manually on the Thunderbird client

SSL certificates

3
  • How to install SSL on nginx with Let’s Encrypt
  • SSL installation and renewal on an Nginx server
  • Installation of SSL in Haproxy and HTTP to HTTPS Redirection

Webservers

1
  • Enable GZIP compression in Nginx

Security

1
  • Disabling mail alerts from LFD

News

46
  • White House report on Open-source AI models
  • Linux Kernel 6.9 – End of Life
  • Verify if SystemD or not on Linux
  • SLUBStick: A Groundbreaking Kernel Exploitation Technique
  • Top 5 Linux Distros for Every User Level
  • Alpaca: The Open-Source AI Model for Linux Enthusiasts
  • Zero-Day Threat: The Risks of the IP Address Exploit
  • Intel Engineer Boosts Linux Kernel Boot Time by 0.035 Seconds
  • Canonical’s New Aggressive Kernel Policy: Ubuntu Releases
  • KDE Frameworks 6.5 Released: What’s New?
  • Ubuntu 24.10 to Feature the Latest Linux Kernel
  • Linux 6.11-rc3 Released: Performance Boosts and Key Fixes
  • The Open Model Initiative Joins the Linux Foundation
  • New Study Debunks Fears of AI Threats
  • AI-Powered Screenshot Search for Pixel 9 Devices
  • Fastfetch: A High-Performance Alternative to Neofetch
  • Containers: Efficient OS-Level Virtualization & Top Tools
  • Tails 6.6-Enhanced Security, Anonymity,Decentralized Features
  • Kubernetes 1.31 “Elli” Release: New Features and Updates
  • Unleashing the Power of Arch Linux with Archinstall 2.8.2
  • Deepin 23 Released with Atomic Updates and Broad CPU Support
  • Secure Your Linux Systems with Expert Cybersecurity
  • NGINX Fixes Buffer Overread Vulnerability (CVE-2024-7347)
  • Linux Kernel Flaw Lets Attackers Bypass CPU and Write to Memory
  • 0.0.0.0 Day Vulnerability:18-Year-Old Browser Flaw
  • CachyOS August 2024: Open NVIDIA Modules & COSMIC Desktop
  • Windows Update Breaks Linux Boot on Dual-Boot Systems
  • EasyOS 6.2 Released: Lightweight Linux Distro-New Features
  • Upstreaming Linux Kernel Support for Raspberry Pi 5
  • Canonical Pauses Ubuntu Kernel Updates Until October 2024
  • 9 Years of LVFS: Transforming Linux Firmware Updates
  • Record Bounty Awarded for LiteSpeed Cache Vulnerability
  • Red Hat OpenShift Lightspeed: AI Assistant for OpenShift
  • Linux 6.12 Introduces QR Code in DRM Panic Handler
  • Rust for Linux Maintainer Resigns Amid ‘Nontechnical Nonsense’
  • Ubuntu 24.10 to Feature Latest Linux 6.11 Kernel
  • LinkedIn Migrates from CentOS to Azure Linux
  • Linux 6.11-rc5 Released with Streamlined Bcachefs Fixes
  • AMD Preferred Core Fix Arrives Before Linux 6.11-rc6
  • Debian 12.7 Released: 55 Security Updates, 51 Bug Fixes
  • 4MLinux 46 Released: New Apps, LAMP Server Included
  • Cicada3301 Ransomware Targets VMware ESXi Systems
  • Advanced Linux Persistence Techniques: Elastic Security’s Insights
  • Sedexp Malware Evades Detection for Two Years on Linux
  • Minimal Linux Runs on Raspberry Pi’s RP2350 Microcontroller
  • Manage Linux User Activity with Acct/Psacct

Operating System

1
  • CentOS 7 End-of-Life: What You Need to Know and How to Migrate
  • Home
  • KnowledgeBase
  • Email
  • SPF, DKIM, and DMARC records explained
View Categories

SPF, DKIM, and DMARC records explained

5 min read

SPF #

SPF (Sender Policy Framework) is another email authentication method designed to detect email spoofing. It allows the owner of a domain to specify which mail servers are authorized to send emails on behalf of that domain.

Here’s a simplified example of how SPF works:

  1. Mitchell sends an email to Elliot
  1. The email server that Elliot uses checks the SPF record for Mitchell’s domain to see if the server that sent the email is listed as an authorized server.
  1. If the server is listed in the SPF record, the email is considered to be legitimate and delivered to Elliot’s inbox.
  1. If the server is not listed in the SPF record, the email may be marked as suspicious or rejected.

 Here’s an example of what an SPF record might look like:

dig TXT <example.com>

v=spf1 mx a ip4:11.123.44.55 ~all

This SPF record specifies that the domain’s mail exchange (MX) servers and the server with the IP address 11.123.44.55 are authorised to send emails on behalf of the domain.

The “~all” at the end indicates that other servers may send emails from the domain, but it is marked as suspicious. If the “~all” symbol is replaced with “-all” other servers can’t send email from the domain.

DKIM #

DKIM (DomainKeys Identified Mail) is an email authentication method designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is valid by checking the digital signature that the domain owner adds to outgoing mail.

Here’s a simplified example of how DKIM works:

  1. Mitchell sends an email to Elliot
  1. The email server that Mitchell uses adds a DKIM signature to the email message. The signature includes a hashed version of the message and a special DKIM key that is associated with Mitchell’s domain.
  1. The email is delivered to Elliot’s email server.
  1. Elliot’s email server retrieves the DKIM key for Mitchell’s domain from the domain’s DNS (Domain Name System) records.
  1. The email server uses the DKIM key to verify the DKIM signature on the email message. If the signature is valid, it indicates that the email was likely sent by the domain it claims to be sent from and that it hasn’t been modified in transit.

DMARC #

DMARC, or Domain-based Message Authentication, Reporting, and Conformance is a security standard that helps protect email recipients from spam, phishing, and other types of email fraud. It does this by using two other email authentication standards, SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Mail), to verify that an incoming message was actually sent by the domain it claims to be sent from.

Here’s how it works: When an email is sent, the sender’s email server adds a special DMARC record to the message’s header. This record contains information about the sender’s SPF and DKIM policies as well as instructions for the recipient’s email server on what to do if the message fails the authentication check.

Here’s an example of what a DMARC record might look like:

v=DMARC1; p=none; rua=mailto:dmarc-reports@example.com ruf=mailto:dmarcforensic@example.com; fo=1; adkim=r; aspf=r;

Or you can use the below formats too:

v=DMARC1; p=quarantine; rua=mailto:postmaster@example.com;
v=DMARC1; adkim=s; aspf=s; p=none

These records specify the following:

  •  v=DMARC1: This indicates that the record is a DMARC record and specifies the version of DMARC being used.
  • p=none: This specifies the sender’s policy for handling messages that fail the DMARC check. In this case, the policy is “none,” which means that the recipient’s email server should not take any special action on messages that fail the check. Other possible values for this field include “quarantine” and “reject,” which instruct the recipient’s email server to send failed messages to the spam folder or reject them outright, respectively.
  • If “p=quarantine” In this case, the policy is set to quarantine, which means that any message that fails DMARC checks should be quarantined (i.e., placed in the recipient’s spam or junk folder.
  • rua=mailto:dmarc-reports@example.com: This specifies the email address where DMARC aggregate reports should be sent. These reports contain information about messages that have passed or failed the DMARC check.
  • ruf=mailto:dmarc-forensic@example.com: This specifies the email address where DMARC forensic reports should be sent. These reports contain detailed information about specific messages that have failed the DMARC check and are intended for use in forensic investigations.

The “rua” and “ruf” values can be set according to the requirement. When setting these values ensure that email accounts given here do exist in the domain.

  • fo=1: This specifies that DMARC forensic reports should be generated for all messages that fail the DMARC check, regardless of whether they were sent to the domain specified in the “From” field or to a subdomain of that domain.
  • adkim=r: This specifies that DMARC alignment should be strict when checking the DKIM signature. This means that the domain specified in the DKIM signature must exactly match the domain in the “From” field of the message.
  • aspf=r: This specifies that DMARC alignment should be strict when checking the SPF record. This means that the IP address of the sender’s email server must be listed in the sender’s SPF record in order for the message to pass the DMARC check.

To put it simply, these are all ways to help protect your domain from being used to send spam or phishing emails. They allow you to specify which servers are authorised to send email from your domain and to check that incoming email from your domain is legitimate.


Share This Article :
  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on February 9, 2024

Powered by BetterDocs

Table of Contents
  • SPF
  • DKIM
  • DMARC

The last technical support you will ever need!

select one of our plans and start building the most wanted app/website available today. We make sure every aspect of the server maintenance are handled with  a level of expertise needed for growing your business!

Copyright 2024 techprovidence