We Are Hiring

DMARC: Domain-based Message Authentication, Reporting & Conformance


Posted on

The following is a guest post from SendGrid’s Compliance Desk.

DMARC and YOU. The future of email authentication.

What-is-DMARC?What is it?

Have you ever received an email message that claimed to be from a company or a brand and clearly wasn’t? This “phishy” behavior is often the result of domain spoofing, and is likely the work of someone trying to phish personal details of the messages’ recipients. Current email infrastructure standards aren’t perfect, and can sometimes be exploited. So how do you protect your own domain or brand from being spoofed in this way?

Enter DMARC–Domain-based Message Authentication, Reporting & Conformance. DMARC was created to tell a participating receiving server what to do with a message that fails both SPF and DKIM validation. In other words, what to do if a message claims to be from you, but isn’t.

So, how do I implement DMARC with SendGrid?

Deploying DMARC for your email systems is a powerful way to help prevent malicious entities from potentially spoofing or otherwise tarnishing your good name. But DMARC isn’t for everyone–if you own a small domain, you’re probably ok without it. If you have ever had problems with phishing in the past, or have a business that is financial-oriented in nature, it might be right for you.

DMARC, in conjunction with a dedicated IP on a (Silver or higher) SendGrid package is a great start to getting industry-supported peace of mind. The DMARC aggregate and forensic reports are designed to be machine readable, and can be difficult for humans to make sense of. You will also need to utilize a DMARC report monitoring service to collect the reports and present the information in a meaningful way that leads to actionable insights. Return Path’s Brand Monitor is one, and Agari is another.

This process involves 5 phases:

1. Deploy DKIM & SPF by Whitelabeling your Sendgrid IP.

Start by completing the Whitelabel process for your account. This ensures that emails sent through your SendGrid account will be properly signed using DKIM and SPF for your unique domain. For more information on completing this process, visit our documentation here.

2. Ensure proper DKIM and SPF signing for your Whitelabel domain.

Send yourself some test emails if you’re unsure of this step. You’re looking to verify that the DKIM and SPF signatures in your email headers align to the domain you’ve Whitelabeled your SendGrid account with. As long as both are passing, you’re in business!

SPFDKIMheader

3. Publish a DMARC record with your DNS registrar, then monitor the results.

Within your DNS registrar, you’ll need to create a TXT resource record that receivers can use to determine your DMARC preferences. This is done within the DNS registrar of the domain host, likely the same place you created the DNS records for the Whitelabel. This record is made at the root level for the domain, not the subdomain.

DMARCTXTGODADDY

A simple DMARC record looks like this:

“v=DMARC1; p=quarantine; pct=100; rua=<a href="mailto:postmaster@whitelabeldomain.com">mailto:dmarc.rua@whitelabeldomain.com</a>”

Let’s break this record down:

  • v=DMARC1;
    Version – It is set to use DMARC version 1, there are no other versions at present. So always set 1.
  • p=quarantine;
    Policy – Tell receiver to QUARANTINE unqualified mail, which generally means “send this directly to the spam folder.”
  • pct=100;
    Percent – Assess 100% of messages claiming to be from the domain, this can be any number between 1 and 100.
  • rua=mailto:dmarc.rua@whitelabeldomain.com
    Reporting URI of aggregate reports – Send aggregate reports to dmarc.rua@whitelabeldomain.com, set this to an email address you control that is closely monitored.

*This example uses the p=quarantine policy, but always start out using the p=none policy at first.

Policies

This is where the magic happens. The policy you select in your DMARC record will tell the participating recipient mail server what to do with mail that doesn’t pass SPF and DKIM, but claims to be from your domain that contains the DMARC record. There are 3 records you can set: p=none, p=quarantine, and p=reject.

  • p=none – Tell the receiver to perform no actions against unqualified mail, but still send email reports to the mailto: in the DMARC record for any infractions.
  • p=quarantine – Tell receiver to quarantine unqualified mail, which generally means “send this directly to the spam folder.”
  • p=reject – Tell the receiver to completely deny any unqualified mail for the domain. With this enabled, only mail that is verified as 100% being signed by your domain will even have a chance at the inbox. Any mail that does not pass is blackholed, not bounced, so there’s no way to catch false positives.

4. Analyze the feedback you receive, and adjust your mail streams as needed.

If unqualified mail gets sent to, and received by recipients participating in DMARC, the recipient will generate reports for these messages and send them back to the mailto: address specified in your DMARC record. These reports will give you the information required to help you evaluate and tune your mail streams with the end goal of determining exactly what services might be sending mail on behalf of your domain.

Here is a sample report with only one record, showing the results for 2 pieces of mail. *Please note that the listed SPF and DKIM auth_results are raw results, regardless of the s= alignment. The filename is formatted as: filename = receiver “!” policy-domain “!” begin-timestamp “!” end-timestamp “.” extension  (Example: receiver.org!sender.com!1335571200!1335657599.zip)

<!--?xml version="1.0" encoding="UTF-8" ?-->

<report_metadata>
<org_name>receiver.com
noreply-dmarc-support@receiver.com
<extra_contact_info>http://receiver.com/dmarc/support
<report_id>9391651994964116463
<date_range>
1335571200
1335657599

 

<policy_published> sender.com
r
r

none

none

100

<source_ip>72.150.241.94
2 <policy_evaluated> none
fail
pass
<header_from>sender.com
<auth_results>

sender.com
fail
<human_result>

sender.net
pass
<human_result>

sender.com
pass

*Note: Aggregate reports are sent as a .zip attachment, so be sure the address you’re defining is able to accept attachments in this file type.

5. Escalate your DMARC policy tags from p=none to p=quarantine to p=reject as you gain experience.

Now that you’ve tested and tweaked your mail streams to determine exactly who and what is sending mail for your domain, it’s time to turn it up a notch.

Up until now you should have only been using the p=none policy to get reports of any errant behavior, and you should have a good idea of where email is coming from. The next step is to adjust the policy on your DMARC record to start controlling how receivers handle mail claiming to be from your domain.

  • p=none – Get reports of infractions, but no action is taken by recipients as far as processing the messages themselves.
  • p=quarantine – Unqualified mail goes directly to spam, but can be recovered. This is useful when you’re fairly certain you know all the locations where mail is coming from, but want to ‘softfail’ any messages that are unqualified until you’re 100% sure.
  • p=reject – When you’re absolutely sure you know every server and service that is sending email for your domain, signing is in place for each of these services and you want anything with the audacity to claim otherwise completely denied. Unqualified mail is completely deleted by the recipient mail server, never to be seen again.

For more information about DMARC, refer to these resources:


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>