SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
Philadelphia, April 26-27 2018
13
Understanding DMARC
Gabriella Davis - IBM Lifetime Champion for Social Business
Technical Director
The Turtle Partnership
Gab Davis
• Admin of all things and especially quite complicated
things where the fun is
• Working with the design, deployment and security of
IBM technologies within global infrastructures
• working with the real world security and privacy
aspects of expanding data ecosystems
• Stubborn and relentless problem solver
• http://turtleblog.infohttps://
www.turtlepartnership.com
• IBM Lifetime Champion
PLATINUM	SPONSOR
GOLD	SPONSORS
SILVER	SPONSORS
			GOLD+		SPONSOR
Social Connections 13 Philadelphia, April 26-27 2018
13
The Problem With Mail
Social Connections 13 Philadelphia, April 26-27 2018
Relaying
• Using Your Servers
• Routing mail through “good” servers that are owned by a company gives “bad”
mail validity
• Properly configured servers stop that happening
• It takes only a few poor configured servers to successfully route millions of emails
• This is an administrative not a user problem
• It doesn’t hurt your users who don’t receive the mail
• It does cause bottlenecks on your servers trying to send mail
• Receiving hosts are often designed to check that the claimed sending domain matches
the address header
• It can result in your servers being blacklisted and not being able to send mail
Social Connections 13 Philadelphia, April 26-27 2018
Blacklists
My	SMTP	host	listening	on	port	
25/465	for	any	mail	SMTP	mail	not	
just	for	my	domain:	turtleweb.com	
My	SMTP	host	listening	on	port	
25/465	for	any	mail	SMTP	mail	not	
just	for	my	domain:	turtleweb.com	
Spam	Generating	Server	
domain:	fakemail.com	
Scans	for	any	open	listening	host	which	
will	accept	mail	not	for	their	own	
domain
Domain	being	spammed	
domain:	rivers.com
Carries	the	return_path	in	the	message	header
Social Connections 13 Philadelphia, April 26-27 2018
Preventing and Protecting Relaying
• Lock down servers to only accept mail for your own domains
• Use an edge service to verify valid domains
• Use SPF records
• These define the identities of servers sending mail from your
domains
• Receiving servers can check if the domain in the message
header has an SPF record for the connecting server
• Many receiving domains and servers do not accept mail without SPF
validation now
• SPF records are no longer enough
Social Connections 13 Philadelphia, April 26-27 2018
SPF
gab@turtleweb.com	
creates	email		to	
tim@gmail.com
turtleweb.com	SMTP	Server	
ip:	mail.turtleinfo.net gmail.com	SMTP	listener
turtleweb.com	DNS	Record	
SPF	Entry	
turtleweb.com.		IN	TXT	"v=spf1	mx	a	ip4:79.99.66.142	
a:mail.turtleinfo.net”
gmail	checks	SPF	record	in	DNS	
to	verify	if	the	sending	server	is	approved
Social Connections 13 Philadelphia, April 26-27 2018
Phishing
• Phishing - collecting personal information voluntarily from the
user
• Phishing scams can use spoofing techniques in order to seem
more genuine to the user
• Over 30% of phishing emails are opened
• Phishing can often be combined with spoofing to give the
request more authenticity but the goal is to gather information
• the goal of spoofing is usually to deliver a malicious payload
• Preventing phishing should simply be a case of user awareness
Social Connections 13 Philadelphia, April 26-27 2018
Why Don’t These Techniques Work
• Technical solutions do work if deployed rigidly, however:
• Mail systems are often complex
• If I want a user to send mail via my SMTP server, I can’t relay
check
• The risk of rejecting valid mail is greater than the risk of accepting
fraudulent mail
• People I want to receive email from often haven’t set up their own
SPF records
Social Connections 13 Philadelphia, April 26-27 2018
User Training Isn’t Enough
• Phishing increasingly relies on sophisticated social
engineering designed to win trust
• Users are aware of risk so the mails have become more
sophisticated
• The iOS problem
• Verbal verification is not always possible
• We need better ways of validating the source of mail
before it reaches the user and becomes their responsibility
Social Connections 13 Philadelphia, April 26-27 2018
Content Filtering
• Edge services specifically designed to check content
• estimates put the % of spam to around 90% of
received mail
• Filtering has moved from checking for certain words
or phrases to checking message structure
• it didn’t take long for spammers to work out how
to fool word filters
Social Connections 13 Philadelphia, April 26-27 2018
13
Defining DMARC
Social Connections 13 Philadelphia, April 26-27 2018
DMARC
• Domain Message Authentication Reporting and Conformance
• created by Google, Paypal, Microsoft and Yahoo
• A combination of processes and policies that provide both
validation of messages and reporting of fraudulent attempts
• These include SPF, content scanning, and DKIM
• DMARC policies tell the receiver what to do with non-
validated messages, resulting in useful data returned to
the sender
Social Connections 13 Philadelphia, April 26-27 2018
SPF
gab@turtleweb.com	
creates	email		to	
tim@gmail.com
turtleweb.com	SMTP	Server	
ip:	mail.turtleinfo.net gmail.com	SMTP	listener
turtleweb.com	DNS	Record	
SPF	Entry	
turtleweb.com.		IN	TXT	"v=spf1	mx	a	ip4:79.99.66.142	
a:mail.turtleinfo.net”
gmail	checks	SPF	record	in	DNS	
to	verify	if	the	sending	server	is	approved
Social Connections 13 Philadelphia, April 26-27 2018
DKIM - DomainKeys Identified Mail (simplified)
• A public/private key pair used to process every sending message
• DKIM ensures the receiving server that the message is valid and has not
been tampered with
turtleweb.com	sending	server	
creates	a	hash	using	its	private	key	containing	
both	my	sending	address	and	the	subject	and	
attaches	it	to	the	message	header	before	sending
gmail.com	receiving	server	
decrypts	the	hash	using	the	public	key	to	verify	it	
is	both	correct	and	unchanged	before	delivering	
the	mail	to	tim
DNS	
turtleweb.com's	DNS	record	contains	the	public	key	used	by	
mail.turtleweb.com	to	encrypt	“sender	and	subject”
sends	an	email	
to	tim@gmail.com
Social Connections 13 Philadelphia, April 26-27 2018
DMARC Policies
• Faked mail appears and disappears often without the genuine domain owner
knowing
• most systems just bounce, delete or quarantine the messages
• without knowing the scale of faked mail or even that someone is
impersonating my company how can I stop it?
• DMARC configuration has two parts
• telling the receiving server what to do with non genuine mail
• telling the receiving server where to send summary reports of non genuine
mail
• DMARC deployed correctly allows us to both pre-emptively manage faked mail
and have visibility of its existence
Social Connections 13 Philadelphia, April 26-27 2018
13
Deploying DMARC
Social Connections 13 Philadelphia, April 26-27 2018
Constructing SPF Records
• Several sites help you construct your SPF records
including
• spfwizard.net and mxtoolbox.com
• If you are unsure of the syntax, use one of these sites
• Mail failing a SPF check is then tagged
• Fail - resulting in non delivery
• Softfail - increased likelihood of being tagged as spam
• Neutral - ignore failure
Social Connections 13 Philadelphia, April 26-27 2018
Deploying DKIM
• The sending mail server must support DKIM encryption
• If it doesn’t then you will either have to install a DKIM custom package or route
mail through a server that does support it
• http://dkim.org/deploy/index.html
• The inbound server must support DKIM decryption
• most edge mail services do
• Use OpenSSL or a site such as
• https://www.socketlabs.com/domainkey-dkim-generation-wizard
• https://www.port25.com/dkim-wizard
• Store the generated public key in a TXT record in your domain
• Configure the DKIM package or enabled server to use the private key
Social Connections 13 Philadelphia, April 26-27 2018
DMARC Planning
• Enabling DMARC takes a significant amount of planning and testing
• The point of DMARC is to tell receiving servers to reject, delete or
deliver your mail
• configured incorrectly it can result in all your sent mail disappearing
• Start with test domains!
• Start with reporting-only policies
• Ensure you have an email address / mailbox configured for the
DMARC reports
• These will tell you if someone is sending mail as your domain that
don’t meet your SPF and DKIM settings
Social Connections 13 Philadelphia, April 26-27 2018
DMARC Deployment
• Use a DMARC wizard such as https://mxtoolbox.com/
DMARCRecordGenerator.aspx or https://www.unlocktheinbox.com/
dmarcwizard/ to review your options and create the right syntax
• DMARC questions include:
• How do you want mail that fails DMARC to be treated by the recipient?
• Where do you want your aggregate reports sent to?
• Do you want forensic (individual) reports generated on specific failures
such as SPF or DKIM
• Zone file TXT entry
• "v=DMARC1; p=none; sp=none; rua=mailto:dmarcreport@turtleweb.com;
ruf=mailto:dmarcanalysis@turtleweb.com; rf=afrf; pct=100; ri=86400”
Social Connections 13 Philadelphia, April 26-27 2018
DMARC and Domino
• Domino doesn’t support
• SPF checking
• DKIM key encryption
• DKIM decryption
• It’s unlikely to do so
• Edge services do support both SPF checking and DKIM encryption
• For DKIM encryption outbound, Domino mail can be routed
through a SMTP relay with an installed DKIM package
• or someone could write a DKIM add in for Domino
Social Connections 13 Philadelphia, April 26-27 2018
Summary
• Email isn’t going away
• DMARC isn’t a single solution, it’s a combination of technical tools
and processes
• Many of the technical tools have been around for years including
SPF, Reverse DNS and DKIM
• but not deployed widely as being too complex
• We have to take more responsibility for protecting people from
sophisticated phishing attempts not just from content
• DMARC is increasingly being required by receiving servers wanting to
protect their customers
PLATINUM	SPONSOR
GOLD	SPONSORS
SILVER	SPONSORS
			GOLD+		SPONSOR

Contenu connexe

Tendances

Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active DirectorySunny Neo
 
October OpenNTF Webinar - What we like about Domino/Notes 12, recommended new...
October OpenNTF Webinar - What we like about Domino/Notes 12, recommended new...October OpenNTF Webinar - What we like about Domino/Notes 12, recommended new...
October OpenNTF Webinar - What we like about Domino/Notes 12, recommended new...Howard Greenberg
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyMostafa El Lathy
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserAnton Chuvakin
 
DerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting RevisitedDerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting RevisitedWill Schroeder
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNSMen and Mice
 
Engage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsEngage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsGabriella Davis
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016Lance Peterman
 
IBM Lotus Domino Domain Monitoring (DDM)
IBM Lotus Domino Domain Monitoring (DDM)IBM Lotus Domino Domain Monitoring (DDM)
IBM Lotus Domino Domain Monitoring (DDM)Austin Chang
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
IBM Domino / IBM Notes Performance Tuning
IBM Domino / IBM Notes Performance Tuning IBM Domino / IBM Notes Performance Tuning
IBM Domino / IBM Notes Performance Tuning Vladislav Tatarincev
 
Die ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web AdministratorenDie ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web Administratorenpanagenda
 
Hot potato Privilege Escalation
Hot potato Privilege EscalationHot potato Privilege Escalation
Hot potato Privilege EscalationSunny Neo
 

Tendances (20)

Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
 
October OpenNTF Webinar - What we like about Domino/Notes 12, recommended new...
October OpenNTF Webinar - What we like about Domino/Notes 12, recommended new...October OpenNTF Webinar - What we like about Domino/Notes 12, recommended new...
October OpenNTF Webinar - What we like about Domino/Notes 12, recommended new...
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
SPF, DKIM en DMARC
SPF, DKIM en DMARCSPF, DKIM en DMARC
SPF, DKIM en DMARC
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
 
DerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting RevisitedDerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting Revisited
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
Engage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsEngage2022 - Domino Admin Tips
Engage2022 - Domino Admin Tips
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
 
NTLM
NTLMNTLM
NTLM
 
IBM Lotus Domino Domain Monitoring (DDM)
IBM Lotus Domino Domain Monitoring (DDM)IBM Lotus Domino Domain Monitoring (DDM)
IBM Lotus Domino Domain Monitoring (DDM)
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
IBM Domino / IBM Notes Performance Tuning
IBM Domino / IBM Notes Performance Tuning IBM Domino / IBM Notes Performance Tuning
IBM Domino / IBM Notes Performance Tuning
 
Die ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web AdministratorenDie ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web Administratoren
 
Hot potato Privilege Escalation
Hot potato Privilege EscalationHot potato Privilege Escalation
Hot potato Privilege Escalation
 

Similaire à An Introduction To The DMARC SMTP Validation Requirements

An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsGabriella Davis
 
Fighting Email Abuse with DMARC
Fighting Email Abuse with DMARCFighting Email Abuse with DMARC
Fighting Email Abuse with DMARCKurt Andersen
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
 
Getting startedwithdmarc5
 Getting startedwithdmarc5 Getting startedwithdmarc5
Getting startedwithdmarc5grafica_corella
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2BCamp
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingTarun Arora
 
SeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeSeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeWendy Knox Everette
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCMailkit
 
Data Migration Best Practices
Data Migration Best PracticesData Migration Best Practices
Data Migration Best PracticesJennifer Soares
 
ThaiNOG 5: Security Tutorial
ThaiNOG 5: Security TutorialThaiNOG 5: Security Tutorial
ThaiNOG 5: Security TutorialAPNIC
 
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCYour Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCStephen Mitchell
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domainsCTM360
 
4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...
4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...
4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...APNIC
 
Protecting Users from Fraud
Protecting Users from FraudProtecting Users from Fraud
Protecting Users from FraudBarry Jones
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsNetFort
 
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security SolutionsSafeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security SolutionsyourDMARC
 
Neuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdShankar Suman
 
DMARC360 Guide
DMARC360 GuideDMARC360 Guide
DMARC360 GuideDMARC360
 
AusCERT2023: Analysis of SMTP TLS Implementations
AusCERT2023: Analysis of SMTP TLS ImplementationsAusCERT2023: Analysis of SMTP TLS Implementations
AusCERT2023: Analysis of SMTP TLS ImplementationsAPNIC
 

Similaire à An Introduction To The DMARC SMTP Validation Requirements (20)

An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation Requirements
 
Fighting Email Abuse with DMARC
Fighting Email Abuse with DMARCFighting Email Abuse with DMARC
Fighting Email Abuse with DMARC
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
Getting startedwithdmarc5
 Getting startedwithdmarc5 Getting startedwithdmarc5
Getting startedwithdmarc5
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
 
SeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeSeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & Me
 
Jak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARCJak ochránit vaší značku a doménu s technologií DMARC
Jak ochránit vaší značku a doménu s technologií DMARC
 
Data Migration Best Practices
Data Migration Best PracticesData Migration Best Practices
Data Migration Best Practices
 
ThaiNOG 5: Security Tutorial
ThaiNOG 5: Security TutorialThaiNOG 5: Security Tutorial
ThaiNOG 5: Security Tutorial
 
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCYour Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
 
4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...
4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...
4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...
 
Protecting Users from Fraud
Protecting Users from FraudProtecting Users from Fraud
Protecting Users from Fraud
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analytics
 
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security SolutionsSafeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
Safeguard Your Brand: Introducing yourDMARC's Advanced Email Security Solutions
 
Neuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt Ltd
 
DMARC360 Guide
DMARC360 GuideDMARC360 Guide
DMARC360 Guide
 
AusCERT2023: Analysis of SMTP TLS Implementations
AusCERT2023: Analysis of SMTP TLS ImplementationsAusCERT2023: Analysis of SMTP TLS Implementations
AusCERT2023: Analysis of SMTP TLS Implementations
 

Plus de Gabriella Davis

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience ProjectGabriella Davis
 
Domino Server Health - Monitoring and Managing
 Domino Server Health - Monitoring and Managing Domino Server Health - Monitoring and Managing
Domino Server Health - Monitoring and ManagingGabriella Davis
 
Face Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesFace Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesGabriella Davis
 
Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Gabriella Davis
 
An Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerAn Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerGabriella Davis
 
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...Gabriella Davis
 
An introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerAn introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerGabriella Davis
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryGabriella Davis
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsGabriella Davis
 
What's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesWhat's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesGabriella Davis
 
An Introduction To Docker
An Introduction To DockerAn Introduction To Docker
An Introduction To DockerGabriella Davis
 
An Introduction To Docker
An Introduction To  DockerAn Introduction To  Docker
An Introduction To DockerGabriella Davis
 
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudSetting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudGabriella Davis
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterpriseGabriella Davis
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Gabriella Davis
 

Plus de Gabriella Davis (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project
 
Domino Server Health - Monitoring and Managing
 Domino Server Health - Monitoring and Managing Domino Server Health - Monitoring and Managing
Domino Server Health - Monitoring and Managing
 
Face Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesFace Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On Premises
 
60 Admin Tips
60 Admin Tips60 Admin Tips
60 Admin Tips
 
Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10
 
An Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerAn Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for Docker
 
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
 
An introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerAn introduction to configuring Domino for Docker
An introduction to configuring Domino for Docker
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & Discovery
 
Brand Yourself
Brand YourselfBrand Yourself
Brand Yourself
 
Home Working
Home WorkingHome Working
Home Working
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration Solutions
 
The Imposter Syndrome
The Imposter SyndromeThe Imposter Syndrome
The Imposter Syndrome
 
What's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesWhat's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-Premises
 
An Introduction To Docker
An Introduction To DockerAn Introduction To Docker
An Introduction To Docker
 
An Introduction To Docker
An Introduction To  DockerAn Introduction To  Docker
An Introduction To Docker
 
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudSetting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 

Dernier

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 

Dernier (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 

An Introduction To The DMARC SMTP Validation Requirements

  • 1. Philadelphia, April 26-27 2018 13 Understanding DMARC Gabriella Davis - IBM Lifetime Champion for Social Business Technical Director The Turtle Partnership
  • 2. Gab Davis • Admin of all things and especially quite complicated things where the fun is • Working with the design, deployment and security of IBM technologies within global infrastructures • working with the real world security and privacy aspects of expanding data ecosystems • Stubborn and relentless problem solver • http://turtleblog.infohttps:// www.turtlepartnership.com • IBM Lifetime Champion
  • 4. Social Connections 13 Philadelphia, April 26-27 2018 13 The Problem With Mail
  • 5. Social Connections 13 Philadelphia, April 26-27 2018 Relaying • Using Your Servers • Routing mail through “good” servers that are owned by a company gives “bad” mail validity • Properly configured servers stop that happening • It takes only a few poor configured servers to successfully route millions of emails • This is an administrative not a user problem • It doesn’t hurt your users who don’t receive the mail • It does cause bottlenecks on your servers trying to send mail • Receiving hosts are often designed to check that the claimed sending domain matches the address header • It can result in your servers being blacklisted and not being able to send mail
  • 6. Social Connections 13 Philadelphia, April 26-27 2018 Blacklists My SMTP host listening on port 25/465 for any mail SMTP mail not just for my domain: turtleweb.com My SMTP host listening on port 25/465 for any mail SMTP mail not just for my domain: turtleweb.com Spam Generating Server domain: fakemail.com Scans for any open listening host which will accept mail not for their own domain Domain being spammed domain: rivers.com Carries the return_path in the message header
  • 7. Social Connections 13 Philadelphia, April 26-27 2018 Preventing and Protecting Relaying • Lock down servers to only accept mail for your own domains • Use an edge service to verify valid domains • Use SPF records • These define the identities of servers sending mail from your domains • Receiving servers can check if the domain in the message header has an SPF record for the connecting server • Many receiving domains and servers do not accept mail without SPF validation now • SPF records are no longer enough
  • 8. Social Connections 13 Philadelphia, April 26-27 2018 SPF gab@turtleweb.com creates email to tim@gmail.com turtleweb.com SMTP Server ip: mail.turtleinfo.net gmail.com SMTP listener turtleweb.com DNS Record SPF Entry turtleweb.com. IN TXT "v=spf1 mx a ip4:79.99.66.142 a:mail.turtleinfo.net” gmail checks SPF record in DNS to verify if the sending server is approved
  • 9. Social Connections 13 Philadelphia, April 26-27 2018 Phishing • Phishing - collecting personal information voluntarily from the user • Phishing scams can use spoofing techniques in order to seem more genuine to the user • Over 30% of phishing emails are opened • Phishing can often be combined with spoofing to give the request more authenticity but the goal is to gather information • the goal of spoofing is usually to deliver a malicious payload • Preventing phishing should simply be a case of user awareness
  • 10. Social Connections 13 Philadelphia, April 26-27 2018 Why Don’t These Techniques Work • Technical solutions do work if deployed rigidly, however: • Mail systems are often complex • If I want a user to send mail via my SMTP server, I can’t relay check • The risk of rejecting valid mail is greater than the risk of accepting fraudulent mail • People I want to receive email from often haven’t set up their own SPF records
  • 11. Social Connections 13 Philadelphia, April 26-27 2018 User Training Isn’t Enough • Phishing increasingly relies on sophisticated social engineering designed to win trust • Users are aware of risk so the mails have become more sophisticated • The iOS problem • Verbal verification is not always possible • We need better ways of validating the source of mail before it reaches the user and becomes their responsibility
  • 12. Social Connections 13 Philadelphia, April 26-27 2018 Content Filtering • Edge services specifically designed to check content • estimates put the % of spam to around 90% of received mail • Filtering has moved from checking for certain words or phrases to checking message structure • it didn’t take long for spammers to work out how to fool word filters
  • 13. Social Connections 13 Philadelphia, April 26-27 2018 13 Defining DMARC
  • 14. Social Connections 13 Philadelphia, April 26-27 2018 DMARC • Domain Message Authentication Reporting and Conformance • created by Google, Paypal, Microsoft and Yahoo • A combination of processes and policies that provide both validation of messages and reporting of fraudulent attempts • These include SPF, content scanning, and DKIM • DMARC policies tell the receiver what to do with non- validated messages, resulting in useful data returned to the sender
  • 15. Social Connections 13 Philadelphia, April 26-27 2018 SPF gab@turtleweb.com creates email to tim@gmail.com turtleweb.com SMTP Server ip: mail.turtleinfo.net gmail.com SMTP listener turtleweb.com DNS Record SPF Entry turtleweb.com. IN TXT "v=spf1 mx a ip4:79.99.66.142 a:mail.turtleinfo.net” gmail checks SPF record in DNS to verify if the sending server is approved
  • 16. Social Connections 13 Philadelphia, April 26-27 2018 DKIM - DomainKeys Identified Mail (simplified) • A public/private key pair used to process every sending message • DKIM ensures the receiving server that the message is valid and has not been tampered with turtleweb.com sending server creates a hash using its private key containing both my sending address and the subject and attaches it to the message header before sending gmail.com receiving server decrypts the hash using the public key to verify it is both correct and unchanged before delivering the mail to tim DNS turtleweb.com's DNS record contains the public key used by mail.turtleweb.com to encrypt “sender and subject” sends an email to tim@gmail.com
  • 17. Social Connections 13 Philadelphia, April 26-27 2018 DMARC Policies • Faked mail appears and disappears often without the genuine domain owner knowing • most systems just bounce, delete or quarantine the messages • without knowing the scale of faked mail or even that someone is impersonating my company how can I stop it? • DMARC configuration has two parts • telling the receiving server what to do with non genuine mail • telling the receiving server where to send summary reports of non genuine mail • DMARC deployed correctly allows us to both pre-emptively manage faked mail and have visibility of its existence
  • 18. Social Connections 13 Philadelphia, April 26-27 2018 13 Deploying DMARC
  • 19. Social Connections 13 Philadelphia, April 26-27 2018 Constructing SPF Records • Several sites help you construct your SPF records including • spfwizard.net and mxtoolbox.com • If you are unsure of the syntax, use one of these sites • Mail failing a SPF check is then tagged • Fail - resulting in non delivery • Softfail - increased likelihood of being tagged as spam • Neutral - ignore failure
  • 20. Social Connections 13 Philadelphia, April 26-27 2018 Deploying DKIM • The sending mail server must support DKIM encryption • If it doesn’t then you will either have to install a DKIM custom package or route mail through a server that does support it • http://dkim.org/deploy/index.html • The inbound server must support DKIM decryption • most edge mail services do • Use OpenSSL or a site such as • https://www.socketlabs.com/domainkey-dkim-generation-wizard • https://www.port25.com/dkim-wizard • Store the generated public key in a TXT record in your domain • Configure the DKIM package or enabled server to use the private key
  • 21. Social Connections 13 Philadelphia, April 26-27 2018 DMARC Planning • Enabling DMARC takes a significant amount of planning and testing • The point of DMARC is to tell receiving servers to reject, delete or deliver your mail • configured incorrectly it can result in all your sent mail disappearing • Start with test domains! • Start with reporting-only policies • Ensure you have an email address / mailbox configured for the DMARC reports • These will tell you if someone is sending mail as your domain that don’t meet your SPF and DKIM settings
  • 22. Social Connections 13 Philadelphia, April 26-27 2018 DMARC Deployment • Use a DMARC wizard such as https://mxtoolbox.com/ DMARCRecordGenerator.aspx or https://www.unlocktheinbox.com/ dmarcwizard/ to review your options and create the right syntax • DMARC questions include: • How do you want mail that fails DMARC to be treated by the recipient? • Where do you want your aggregate reports sent to? • Do you want forensic (individual) reports generated on specific failures such as SPF or DKIM • Zone file TXT entry • "v=DMARC1; p=none; sp=none; rua=mailto:dmarcreport@turtleweb.com; ruf=mailto:dmarcanalysis@turtleweb.com; rf=afrf; pct=100; ri=86400”
  • 23. Social Connections 13 Philadelphia, April 26-27 2018 DMARC and Domino • Domino doesn’t support • SPF checking • DKIM key encryption • DKIM decryption • It’s unlikely to do so • Edge services do support both SPF checking and DKIM encryption • For DKIM encryption outbound, Domino mail can be routed through a SMTP relay with an installed DKIM package • or someone could write a DKIM add in for Domino
  • 24. Social Connections 13 Philadelphia, April 26-27 2018 Summary • Email isn’t going away • DMARC isn’t a single solution, it’s a combination of technical tools and processes • Many of the technical tools have been around for years including SPF, Reverse DNS and DKIM • but not deployed widely as being too complex • We have to take more responsibility for protecting people from sophisticated phishing attempts not just from content • DMARC is increasingly being required by receiving servers wanting to protect their customers
  • 25.