Creating these specific DNS records helps protect domains that do not send emails from being used in domain spoofing attacks.
Cet article s'articule autour des points suivants :
Copier le lien de l'article
Domains that do not send emails can still be used in email spoofing or phishing attacks, but there are specific types of DNS text (TXT) records that can be used to stifle attackers. Each of these records sets rules for how unauthorized emails should be treated by mail servers, making it harder for attackers to exploit these domains.
A DNS TXT record allows domain administrators to enter text into the Domain Name System (DNS). DNS TXT records are used for processes like email authentication because they can store important information that servers can use to confirm whether or not a domain has authorized an email sender to send messages on its behalf.
Examples of domains that do not send emails include domains purchased to protect a brand name or for a future business. Defunct, legacy domains also have no reason to send emails and could benefit from these types of records.
There are three main types of DNS TXT records used for email authentication. Each of them differs slightly in how they work:
Because these DNS records all function slightly differently, each of their components are unique.
SPF records can be formatted to protect domains against attempted phishing attacks by rejecting any emails sent from the domain. To do so, an SPF record must use the following format.
*Note, SPF records are set directly on the domain itself, meaning they do not require a special subdomain.
Here is what the individual components of this record mean:
v=spf1lets the server know that the record contains an SPF policy. All SPF records must begin with this component.
-alltells the server what to do with non-compliant emails or any senders that are not explicitly listed in the SPF record. With this type of SPF record, no IP addresses or domains are allowed, so
-allstates that all non-compliant emails will be rejected. For this type of record, all emails are considered non-compliant because there are no accepted IP addresses or domains.
DKIM records protect domains by ensuring emails were actually authorized by the sender using a public key and a private key. DKIM records store the public key that the email server then uses to authenticate that the email signature was authorized by the sender. For domains that do not send emails, the DKIM record should be configured without an associated public key. Below is an example:
*._domainkey.example.comis the specialized name for the DKIM record (where “example.com” should be replaced with your domain). In this example, the asterisk (referred to as the wildcard) is being used as the selector, which is a specialized value that the email service provider generates and uses for the domain. The selector is part of the DKIM header and the email server uses it to perform the DKIM lookup in the DNS. The wildcard covers all possible values for the selector.
TXTindicates the DNS record type.
v=DKIM1 setsthe version number and tells the server that this record references a DKIM policy.
pvalue helps authenticate emails by tying a signature to its public key. In this DKIM record, the
pvalue should be empty because there is no signature/public key to tie back to.
DMARC policies can also help protect domains that do not send emails by rejecting all emails that fail SPF and DKIM. In this case, all emails sent from a domain not configured to send emails would fail SPF and DKIM checks. Below is an example of how to format a policy this way:
_dmarc.example.com, which is required for DMARC policies.
TXTindicates the DNS record type.
v=DMARC1tells the server that this DNS record contains a DMARC policy.
p=rejectindicates that email servers should reject emails that fail DKIM and SPF checks.
adkim=srepresents something called the alignment mode. In this case, the alignment mode is set to “s” for strict. Strict alignment mode means that the server of the email domain that contains the DMARC record must exactly match the domain in the
Fromheader of the email. If it does not, the DKIM check fails.
aspf=sserves the same purpose as
adkim=s, but for SPF alignment.
The Cloudflare Email Security DNS Wizard makes it simple to set up the correct DNS TXT records and block spammers from using a domain. Read more about the Wizard here.
Navigation dans le centre d’apprentissage