Contact form
Tel: +48 695 742 350
E-mail: biuro@roan24.pl
on working days Mon-Fri.
at. 7:00-21:00
© 2005-2021 ROAN Maria Łukin Interactive Agency. Using the site means you accept the cookie policy.
Contact form
Tel: +48 695 742 350
E-mail: biuro@roan24.pl
on working days Mon-Fri.
at. 7:00-21:00
© 2005-2021 ROAN Agencja Interaktywna Maria Łukin. Using the site means you accept the cookie policy.
Please be advised that by using the website, without changing your browser settings, you agree to the privacy policy and the storage of cookies that allow our website to function efficiently.
Introduction of DMARC
What is DMARC
Spis treści
DMARC is an extension of SPF and DKIM security, also acting on a DNS entry but not only based on it. The basic principle of DMARC is to inform domain administrators that someone is trying to impersonate their domain and send fake emails from it.
The first thing we need to know about DMARC is that it requires SPF and DKIM input. Without both of these extensions DMARC can cause a lot of confusion in our mail and even prevent it from being sent to servers that support it. Sample DMARC entry:
You can immediately notice that DMARC entry, similarly to SPF, is always in one place ( _dmarc.domain.pl txt record), it does not require knowledge of the selector as it is in the case of DKIM. The rest look similar to SPF but there are some exceptions:
P and SP – the tags given take three options
Aspf – An important element that will soon be set to s in our post – that is strict where the message must pass the SPF and DKIM test perfectly, in case. While the second option is the default r – that is relaxed, the message may pass the SPF or DKIM test only in part, for example a valid DKIM signature but an invalid domain.
Gathering all the information I recommend to start by using the entry as given for our domain only change the email address to yours and test. If the tests are successful slowly change.
Sample reports
That is, the reports we got from hotmail.com, for example:
[codeblocks name='hotmail']
Where you can immediately see that hotmail had a temporary problem connecting to one of our DNS servers because the IP address was perfectly valid, and next to DKIM and SPF we can see that this is just a temporary error. Another important piece of information is the time range given as a unix time stamp. Which helps later to determine the time when the message was sent if it was sent from our server.
163.com, on the other hand, sent us:
[codeblocks name='163']
After which it is clear that someone tried to impersonate our domain address, but as you can see the message failed both the DKIM and SPF tests.
Summary
DMARC is the cherry on the cake with DKIM and SPF because it helps to clearly determine what to do with what message and who to inform about possible attempts to impersonate our domain.
For more information, you can reach out to the project’s main website : . Or ask in the comments.