SlideShare a Scribd company logo
July 2018
Understanding DMARC
Gabriella Davis - IBM Lifetime Champion for Social Business
Technical Director
The Turtle Partnership
Date
CollabSphere 2018 Sponsors
Gab Davis
✤ Admin of all things and especially quite complicated
things where the fun is
✤ Working with the design, deployment and security of IBM
technologies within global infrastructures
✤ working with the real world security and privacy aspects
of expanding data ecosystems
✤ Stubborn and relentless problem solver
✤ http://turtleblog.infohttps://www.turtlepartnership.com
✤ IBM Lifetime Champion
The ProblemWith Mail
Relaying
✤ Using Your Servers
✤ Routing mail through “good” servers that are owned by a company gives “bad” mail validity
✤ Properly configured servers stop that happening
✤ It takes only a few poor configured servers to successfully route millions of emails
✤ This is an administrative not a user problem
✤ It doesn’t hurt your users who don’t receive the mail
✤ It does cause bottlenecks on your servers trying to send mail
✤ Receiving hosts are often designed to check that the claimed sending domain matches the address header
✤ It can result in your servers being blacklisted and not being able to send mail
Blacklists
My SMTP host listening on port
25/465 for any mail SMTP mail
not just for my domain:
turtleweb.com
My SMTP host listening on port
25/465 for any mail SMTP mail
not just for my domain:
turtleweb.com
Spam Generating Server
domain: fakemail.com
Scans for any open listening host
which will accept mail not for their
own domain
Domain being spammed
domain: rivers.com
Carries the return_path in the message header
Preventing and Protecting Relaying
✤ Lock down servers to only accept mail for your own domains
✤ Use an edge service to verify valid domains
✤ Use SPF records
✤ These define the identities of servers sending mail from your domains
✤ Receiving servers can check if the domain in the message header has an SPF record for the
connecting server
✤ Many receiving domains and servers do not accept mail without SPF validation now
✤ SPF records are no longer enough
SPF
gab@turtleweb.com
creates email to
tim@gmail.com
turtleweb.com SMTP Server
ip: mail.turtleinfo.net gmail.com SMTP listener
turtleweb.com DNS Record
SPF Entry
turtleweb.com.  IN TXT "v=spf1 mx a
ip4:79.99.66.142 a:mail.turtleinfo.net”
gmail	checks	SPF	record	in	DNS	
to	verify	if	the	sending	server	is	approved
Phishing
✤ Phishing - collecting personal information voluntarily from the user
✤ Phishing scams can use spoofing techniques in order to seem more genuine to the user
✤ Over 30% of phishing emails are opened
✤ Phishing can often be combined with spoofing to give the request more authenticity
but the goal is to gather information
✤ the goal of spoofing is usually to deliver a malicious payload
✤ Preventing phishing should simply be a case of user awareness
Why Don’tTheseTechniquesWork
✤ Technical solutions do work if deployed rigidly, however:
✤ Mail systems are often complex
✤ If I want a user to send mail via my SMTP server, I can’t relay check
✤ The risk of rejecting valid mail is greater than the risk of accepting
fraudulent mail
✤ People I want to receive email from often haven’t set up their own SPF
records
UserTraining Isn’t Enough
✤ Phishing increasingly relies on sophisticated social engineering designed to
win trust
✤ Users are aware of risk so the mails have become more sophisticated
✤ The iOS problem
✤ Verbal verification is not always possible
✤ We need better ways of validating the source of mail before it reaches the user
and becomes their responsibility
Content Filtering
✤ Edge services specifically designed to check content
✤ estimates put the % of spam to around 90% of received mail
✤ Filtering has moved from checking for certain words or phrases to checking
message structure
✤ it didn’t take long for spammers to work out how to fool word filters
Defining DMARC
DMARC
✤ Domain Message Authentication Reporting and Conformance
✤ created by Google, Paypal, Microsoft and Yahoo
✤ A combination of processes and policies that provide both validation of
messages and reporting of fraudulent attempts
✤ These include SPF, content scanning, and DKIM
✤ DMARC policies tell the receiver what to do with non-validated messages,
resulting in useful data returned to the sender
SPF
gab@turtleweb.com
creates email to
tim@gmail.com
turtleweb.com SMTP Server
ip: mail.turtleinfo.net gmail.com SMTP listener
turtleweb.com DNS Record
SPF Entry
turtleweb.com.  IN TXT "v=spf1 mx a
ip4:79.99.66.142 a:mail.turtleinfo.net”
gmail	checks	SPF	record	in	DNS	
to	verify	if	the	sending	server	is	approved
DKIM - DomainKeys Identified Mail (simplified)
✤ A public/private key pair used to process every sending message
✤ DKIM ensures the receiving server that the message is valid and has not been tampered with
turtleweb.com sending server
creates a hash using its private key containing
both my sending address and the subject and
attaches it to the message header before
sending
gmail.com receiving server
decrypts the hash using the public key to
verify it is both correct and unchanged before
delivering the mail to tim
DNS
turtleweb.com's DNS record contains the public key used by
mail.turtleweb.com to encrypt “sender and subject”
sends	an	email	
to	tim@gmail.com
DMARC Policies
✤ Faked mail appears and disappears often without the genuine domain owner knowing
✤ most systems just bounce, delete or quarantine the messages
✤ without knowing the scale of faked mail or even that someone is impersonating my company how can I
stop it?
✤ DMARC configuration has two parts
✤ telling the receiving server what to do with non genuine mail
✤ telling the receiving server where to send summary reports of non genuine mail
✤ DMARC deployed correctly allows us to both pre-emptively manage faked mail and have visibility of its
existence
Deploying DMARC
Constructing SPF Records
✤ Several sites help you construct your SPF records including
✤ spfwizard.net and mxtoolbox.com
✤ If you are unsure of the syntax, use one of these sites
✤ Mail failing a SPF check is then tagged
✤ Fail - resulting in non delivery
✤ Softfail - increased likelihood of being tagged as spam
✤ Neutral - ignore failure
Deploying DKIM
✤ The sending mail server must support DKIM encryption
✤ If it doesn’t then you will either have to install a DKIM custom package or route mail through a server
that does support it
✤ Some DKIM mail services http://dkim.org/deploy/index.html
✤ The inbound server must support DKIM decryption
✤ many edge mail services do (postini, proofpoint, barracuda, O365 etc)
✤ IBM have a tech request open from 2011 for DKIM but there isn’t enough demand for it in Domino
(especially now).
✤ If you’re interested the SPR is JFBM7ELEQY
Creating A DKIM Record
✤ Use OpenSSL or a site such as
✤ https://www.socketlabs.com/domainkey-dkim-generation-wizard
✤ https://www.port25.com/dkim-wizard
✤ Store the generated public key in a TXT record in your domain
✤ Configure the DKIM package or enabled server to use the private key
DMARC Planning
✤ Enabling DMARC takes a significant amount of planning and testing
✤ The point of DMARC is to tell receiving servers to reject, delete or deliver your mail
✤ configured incorrectly it can result in all your sent mail disappearing
✤ Start with test domains!
✤ Start with reporting-only policies
✤ Ensure you have an email address / mailbox configured for the DMARC reports
✤ These will tell you if someone is sending mail as your domain that don’t meet your SPF and DKIM
settings
DMARC Deployment
✤ Use a DMARC wizard such as https://mxtoolbox.com/DMARCRecordGenerator.aspx or https://
www.unlocktheinbox.com/dmarcwizard/ to review your options and create the right syntax
✤ DMARC questions include:
✤ How do you want mail that fails DMARC to be treated by the recipient?
✤ Where do you want your aggregate reports sent to?
✤ Do you want forensic (individual) reports generated on specific failures such as SPF or DKIM
✤ Zone file TXT entry
✤ "v=DMARC1; p=none; sp=none; rua=mailto:dmarcreport@turtleweb.com;
ruf=mailto:dmarcanalysis@turtleweb.com; rf=afrf; pct=100; ri=86400”
DMARC and Domino
✤ Domino doesn’t support
✤ SPF checking
✤ DKIM key encryption
✤ DKIM decryption
✤ It’s unlikely to do so
✤ Edge services do support both SPF checking and DKIM encryption
✤ For DKIM encryption outbound, Domino mail can be routed through a SMTP relay with an installed DKIM package
✤ or someone could write a DKIM add in for Domino
DMARCWithout DKIM
✤ It’s possible to deploy DMARC records that only have rules for SPF not DKIM
✤ Why would you do that?
✤ To get analysis reports on sent mail behaviour (example from dmarc.org)
Create DMARC Record
✤ From mxtoolbox.com
Create DMARC Record
✤ From mxtoolbox.com
Summary
✤ Email isn’t going away
✤ DMARC isn’t a single solution, it’s a combination of technical tools and processes
✤ Many of the technical tools have been around for years including SPF, Reverse DNS and DKIM
✤ but not deployed widely as being too complex
✤ We have to take more responsibility for protecting people from sophisticated phishing attempts
not just from content
✤ DMARC is increasingly being required by receiving servers wanting to protect their customers
but it can also help you identify your threat level

More Related Content

PDF
IBM Traveler Management, Security and Performance
PDF
IBM Notes Traveler Best Practices
PDF
Domino policies deep dive
PDF
HCL Sametime V11 installation - tips
POTX
IBM Domino / IBM Notes Performance Tuning
PDF
IBM Notes Traveler administration and Log troubleshooting tips
PPTX
How to fix ‘database is corrupt: cannot allocate space’ error in lotus notes
PDF
HCL Sametime 12.0 on Docker - Step-By-Step.pdf
IBM Traveler Management, Security and Performance
IBM Notes Traveler Best Practices
Domino policies deep dive
HCL Sametime V11 installation - tips
IBM Domino / IBM Notes Performance Tuning
IBM Notes Traveler administration and Log troubleshooting tips
How to fix ‘database is corrupt: cannot allocate space’ error in lotus notes
HCL Sametime 12.0 on Docker - Step-By-Step.pdf

What's hot (20)

PDF
Important tips on Router and SMTP mail routing
PDF
Domino Server Health - Monitoring and Managing
PPTX
Active Directory component
PDF
Domino Adminblast
PPTX
What is active directory
PPTX
Dc domain controller
PPTX
Best Practice TLS for IBM Domino
PDF
Engage 2018: IBM Notes and Domino Performance Boost - Reloaded
PPT
Active Directory
PDF
SQL Server Tuning to Improve Database Performance
PDF
Intro to DNS
PDF
60 Admin Tips
PDF
HCL Sametime 12.0 – Converting from native Domino Directory to LDAP and Migra...
PDF
Real life challenges and configurations when implementing HCL Sametime v12.0....
PPTX
Dns(Domain name system)
PDF
HTTP - The Other Face Of Domino
PPTX
DNS ( Domain Name System)
PPTX
Active Directory
Important tips on Router and SMTP mail routing
Domino Server Health - Monitoring and Managing
Active Directory component
Domino Adminblast
What is active directory
Dc domain controller
Best Practice TLS for IBM Domino
Engage 2018: IBM Notes and Domino Performance Boost - Reloaded
Active Directory
SQL Server Tuning to Improve Database Performance
Intro to DNS
60 Admin Tips
HCL Sametime 12.0 – Converting from native Domino Directory to LDAP and Migra...
Real life challenges and configurations when implementing HCL Sametime v12.0....
Dns(Domain name system)
HTTP - The Other Face Of Domino
DNS ( Domain Name System)
Active Directory
Ad

Similar to An Introduction To The DMARC SMTP Validation Requirements (20)

PDF
An Introduction To The DMARC SMTP Validation Requirements
PDF
Protect your domain with DMARC
PPTX
Fighting Email Abuse with DMARC
PDF
DMARC Overview
PDF
B2B Email Deliverability - Getting to the Inbox
PPTX
What is dmarc
PDF
DMARC Implementation across all domains
PDF
Massive emailing with Linux, Postfix and Ruby on Rails
PDF
Green Locks for You and Me
PPTX
SeaSec East: Green Locks For You & Me
PDF
GoDMARC - Block Email Phishing
PPTX
Jak ochránit vaší značku a doménu s technologií DMARC
PPTX
Enable DKIM on EDGE Server
PDF
Getting startedwithdmarc5
PDF
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
PDF
Async os dkim-dmarc-guide
PDF
How to use Domino as a Mail Server in a Modern World
PPTX
Technical Guide to Great Delivery
PDF
Analysis of SMTP TLS Implementations - BtCIRT National Cybersecurity Conferen...
PPT
"Being creative with data" 25th November - Neteffekt presentation
An Introduction To The DMARC SMTP Validation Requirements
Protect your domain with DMARC
Fighting Email Abuse with DMARC
DMARC Overview
B2B Email Deliverability - Getting to the Inbox
What is dmarc
DMARC Implementation across all domains
Massive emailing with Linux, Postfix and Ruby on Rails
Green Locks for You and Me
SeaSec East: Green Locks For You & Me
GoDMARC - Block Email Phishing
Jak ochránit vaší značku a doménu s technologií DMARC
Enable DKIM on EDGE Server
Getting startedwithdmarc5
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
Async os dkim-dmarc-guide
How to use Domino as a Mail Server in a Modern World
Technical Guide to Great Delivery
Analysis of SMTP TLS Implementations - BtCIRT National Cybersecurity Conferen...
"Being creative with data" 25th November - Neteffekt presentation
Ad

More from Gabriella Davis (20)

PDF
A Domino Admins Adventures (Engage 2024)
PDF
Engage2022 - Domino Admin Tips
PDF
. Design Decisions: Developing for Mobile - The Template Experience Project
PDF
Face Off Domino vs Exchange On Premises
PDF
Adminlicious - A Guide To TCO Features In Domino v10
PDF
An Introduction to Configuring Domino for Docker
PDF
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
PDF
An introduction to configuring Domino for Docker
PDF
How To Approach GDPR Preparation & Discovery
PDF
Brand Yourself
PDF
Home Working
PDF
A Guide To Single Sign-On for IBM Collaboration Solutions
PDF
The Imposter Syndrome
PDF
What's New in Notes, Sametime and Verse On-Premises
PDF
An Introduction To Docker
PDF
An Introduction To Docker
PDF
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
PDF
Embracing iot in the enterprise
PDF
Benefits and Risks of a Single Identity - IBM Connect 2017
PDF
Domino in the Back, Party In The Front
A Domino Admins Adventures (Engage 2024)
Engage2022 - Domino Admin Tips
. Design Decisions: Developing for Mobile - The Template Experience Project
Face Off Domino vs Exchange On Premises
Adminlicious - A Guide To TCO Features In Domino v10
An Introduction to Configuring Domino for Docker
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
An introduction to configuring Domino for Docker
How To Approach GDPR Preparation & Discovery
Brand Yourself
Home Working
A Guide To Single Sign-On for IBM Collaboration Solutions
The Imposter Syndrome
What's New in Notes, Sametime and Verse On-Premises
An Introduction To Docker
An Introduction To Docker
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Embracing iot in the enterprise
Benefits and Risks of a Single Identity - IBM Connect 2017
Domino in the Back, Party In The Front

Recently uploaded (20)

PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Introduction to the IoT system, how the IoT system works
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
E -tech empowerment technologies PowerPoint
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Internet___Basics___Styled_ presentation
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
DOCX
Unit-3 cyber security network security of internet system
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
SASE Traffic Flow - ZTNA Connector-1.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Introduction to the IoT system, how the IoT system works
Decoding a Decade: 10 Years of Applied CTI Discipline
E -tech empowerment technologies PowerPoint
PptxGenJS_Demo_Chart_20250317130215833.pptx
Module 1 - Cyber Law and Ethics 101.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
introduction about ICD -10 & ICD-11 ppt.pptx
Funds Management Learning Material for Beg
522797556-Unit-2-Temperature-measurement-1-1.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Internet___Basics___Styled_ presentation
Cloud-Scale Log Monitoring _ Datadog.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Unit-3 cyber security network security of internet system
The Internet -By the Numbers, Sri Lanka Edition
Introuction about ICD -10 and ICD-11 PPT.pptx

An Introduction To The DMARC SMTP Validation Requirements

  • 1. July 2018 Understanding DMARC Gabriella Davis - IBM Lifetime Champion for Social Business Technical Director The Turtle Partnership
  • 3. Gab Davis ✤ Admin of all things and especially quite complicated things where the fun is ✤ Working with the design, deployment and security of IBM technologies within global infrastructures ✤ working with the real world security and privacy aspects of expanding data ecosystems ✤ Stubborn and relentless problem solver ✤ http://turtleblog.infohttps://www.turtlepartnership.com ✤ IBM Lifetime Champion
  • 5. Relaying ✤ Using Your Servers ✤ Routing mail through “good” servers that are owned by a company gives “bad” mail validity ✤ Properly configured servers stop that happening ✤ It takes only a few poor configured servers to successfully route millions of emails ✤ This is an administrative not a user problem ✤ It doesn’t hurt your users who don’t receive the mail ✤ It does cause bottlenecks on your servers trying to send mail ✤ Receiving hosts are often designed to check that the claimed sending domain matches the address header ✤ It can result in your servers being blacklisted and not being able to send mail
  • 6. Blacklists My SMTP host listening on port 25/465 for any mail SMTP mail not just for my domain: turtleweb.com My SMTP host listening on port 25/465 for any mail SMTP mail not just for my domain: turtleweb.com Spam Generating Server domain: fakemail.com Scans for any open listening host which will accept mail not for their own domain Domain being spammed domain: rivers.com Carries the return_path in the message header
  • 7. Preventing and Protecting Relaying ✤ Lock down servers to only accept mail for your own domains ✤ Use an edge service to verify valid domains ✤ Use SPF records ✤ These define the identities of servers sending mail from your domains ✤ Receiving servers can check if the domain in the message header has an SPF record for the connecting server ✤ Many receiving domains and servers do not accept mail without SPF validation now ✤ SPF records are no longer enough
  • 8. SPF gab@turtleweb.com creates email to tim@gmail.com turtleweb.com SMTP Server ip: mail.turtleinfo.net gmail.com SMTP listener turtleweb.com DNS Record SPF Entry turtleweb.com.  IN TXT "v=spf1 mx a ip4:79.99.66.142 a:mail.turtleinfo.net” gmail checks SPF record in DNS to verify if the sending server is approved
  • 9. Phishing ✤ Phishing - collecting personal information voluntarily from the user ✤ Phishing scams can use spoofing techniques in order to seem more genuine to the user ✤ Over 30% of phishing emails are opened ✤ Phishing can often be combined with spoofing to give the request more authenticity but the goal is to gather information ✤ the goal of spoofing is usually to deliver a malicious payload ✤ Preventing phishing should simply be a case of user awareness
  • 10. Why Don’tTheseTechniquesWork ✤ Technical solutions do work if deployed rigidly, however: ✤ Mail systems are often complex ✤ If I want a user to send mail via my SMTP server, I can’t relay check ✤ The risk of rejecting valid mail is greater than the risk of accepting fraudulent mail ✤ People I want to receive email from often haven’t set up their own SPF records
  • 11. UserTraining Isn’t Enough ✤ Phishing increasingly relies on sophisticated social engineering designed to win trust ✤ Users are aware of risk so the mails have become more sophisticated ✤ The iOS problem ✤ Verbal verification is not always possible ✤ We need better ways of validating the source of mail before it reaches the user and becomes their responsibility
  • 12. Content Filtering ✤ Edge services specifically designed to check content ✤ estimates put the % of spam to around 90% of received mail ✤ Filtering has moved from checking for certain words or phrases to checking message structure ✤ it didn’t take long for spammers to work out how to fool word filters
  • 14. DMARC ✤ Domain Message Authentication Reporting and Conformance ✤ created by Google, Paypal, Microsoft and Yahoo ✤ A combination of processes and policies that provide both validation of messages and reporting of fraudulent attempts ✤ These include SPF, content scanning, and DKIM ✤ DMARC policies tell the receiver what to do with non-validated messages, resulting in useful data returned to the sender
  • 15. SPF gab@turtleweb.com creates email to tim@gmail.com turtleweb.com SMTP Server ip: mail.turtleinfo.net gmail.com SMTP listener turtleweb.com DNS Record SPF Entry turtleweb.com.  IN TXT "v=spf1 mx a ip4:79.99.66.142 a:mail.turtleinfo.net” gmail checks SPF record in DNS to verify if the sending server is approved
  • 16. DKIM - DomainKeys Identified Mail (simplified) ✤ A public/private key pair used to process every sending message ✤ DKIM ensures the receiving server that the message is valid and has not been tampered with turtleweb.com sending server creates a hash using its private key containing both my sending address and the subject and attaches it to the message header before sending gmail.com receiving server decrypts the hash using the public key to verify it is both correct and unchanged before delivering the mail to tim DNS turtleweb.com's DNS record contains the public key used by mail.turtleweb.com to encrypt “sender and subject” sends an email to tim@gmail.com
  • 17. DMARC Policies ✤ Faked mail appears and disappears often without the genuine domain owner knowing ✤ most systems just bounce, delete or quarantine the messages ✤ without knowing the scale of faked mail or even that someone is impersonating my company how can I stop it? ✤ DMARC configuration has two parts ✤ telling the receiving server what to do with non genuine mail ✤ telling the receiving server where to send summary reports of non genuine mail ✤ DMARC deployed correctly allows us to both pre-emptively manage faked mail and have visibility of its existence
  • 19. Constructing SPF Records ✤ Several sites help you construct your SPF records including ✤ spfwizard.net and mxtoolbox.com ✤ If you are unsure of the syntax, use one of these sites ✤ Mail failing a SPF check is then tagged ✤ Fail - resulting in non delivery ✤ Softfail - increased likelihood of being tagged as spam ✤ Neutral - ignore failure
  • 20. Deploying DKIM ✤ The sending mail server must support DKIM encryption ✤ If it doesn’t then you will either have to install a DKIM custom package or route mail through a server that does support it ✤ Some DKIM mail services http://dkim.org/deploy/index.html ✤ The inbound server must support DKIM decryption ✤ many edge mail services do (postini, proofpoint, barracuda, O365 etc) ✤ IBM have a tech request open from 2011 for DKIM but there isn’t enough demand for it in Domino (especially now). ✤ If you’re interested the SPR is JFBM7ELEQY
  • 21. Creating A DKIM Record ✤ Use OpenSSL or a site such as ✤ https://www.socketlabs.com/domainkey-dkim-generation-wizard ✤ https://www.port25.com/dkim-wizard ✤ Store the generated public key in a TXT record in your domain ✤ Configure the DKIM package or enabled server to use the private key
  • 22. DMARC Planning ✤ Enabling DMARC takes a significant amount of planning and testing ✤ The point of DMARC is to tell receiving servers to reject, delete or deliver your mail ✤ configured incorrectly it can result in all your sent mail disappearing ✤ Start with test domains! ✤ Start with reporting-only policies ✤ Ensure you have an email address / mailbox configured for the DMARC reports ✤ These will tell you if someone is sending mail as your domain that don’t meet your SPF and DKIM settings
  • 23. DMARC Deployment ✤ Use a DMARC wizard such as https://mxtoolbox.com/DMARCRecordGenerator.aspx or https:// www.unlocktheinbox.com/dmarcwizard/ to review your options and create the right syntax ✤ DMARC questions include: ✤ How do you want mail that fails DMARC to be treated by the recipient? ✤ Where do you want your aggregate reports sent to? ✤ Do you want forensic (individual) reports generated on specific failures such as SPF or DKIM ✤ Zone file TXT entry ✤ "v=DMARC1; p=none; sp=none; rua=mailto:dmarcreport@turtleweb.com; ruf=mailto:dmarcanalysis@turtleweb.com; rf=afrf; pct=100; ri=86400”
  • 24. DMARC and Domino ✤ Domino doesn’t support ✤ SPF checking ✤ DKIM key encryption ✤ DKIM decryption ✤ It’s unlikely to do so ✤ Edge services do support both SPF checking and DKIM encryption ✤ For DKIM encryption outbound, Domino mail can be routed through a SMTP relay with an installed DKIM package ✤ or someone could write a DKIM add in for Domino
  • 25. DMARCWithout DKIM ✤ It’s possible to deploy DMARC records that only have rules for SPF not DKIM ✤ Why would you do that? ✤ To get analysis reports on sent mail behaviour (example from dmarc.org)
  • 26. Create DMARC Record ✤ From mxtoolbox.com
  • 27. Create DMARC Record ✤ From mxtoolbox.com
  • 28. Summary ✤ Email isn’t going away ✤ DMARC isn’t a single solution, it’s a combination of technical tools and processes ✤ Many of the technical tools have been around for years including SPF, Reverse DNS and DKIM ✤ but not deployed widely as being too complex ✤ We have to take more responsibility for protecting people from sophisticated phishing attempts not just from content ✤ DMARC is increasingly being required by receiving servers wanting to protect their customers but it can also help you identify your threat level