the most common DMARC mistake I see is publishing the record and walking away

it's the right first step

but I see domains that have been at p=none for years

the path is:

- p=none
- collect reports for 4-8 weeks
- identify all legitimate senders
- move subdomain policy to reject
- move organizational policy to quarantine
- then reject

https://dmarcguard.io/blog/dmarc-policy-not-enabled-fix/

#DMARC #EmailSecurity #EmailAdmin #InfoSec

DMARC Quarantine/Reject Policy Not Enabled: Fix It | DMARCguard

See 'DMARC quarantine/reject policy not enabled'? Learn what it means, why it matters, and how to fix it step by step for any DNS provider. Free checker included.

DMARCguard

A major new spam campaign has been launched by Linode servers using 3rd and 4th tier subdomains of throwaway domains, mostly .us and .cl all with
Return-Path: <[email protected]>

#EmailAdmin #SpamAlert

I have an enforcing #DMARC policy set up on my personal email domain. I use #DMARCAnalyzer for processing aggregate reports from servers that send them. Every week I log in and check to make sure everything's fine, i.e., (a) there isn't a significant uptick of people forging emails from my domain that I should look into (unlikely), and (b) I haven't broken something stupid in my infrastructure and caused my own outbound emails to violate my policy.
#SMTP #emailAdmin #sysAdmin (1/2)
tfw you can't get the verification code sent by your health insurance company to your email because the IP address it's coming from is listed in Spamhaus AND the email they're sending violates their enforcing DMARC policy. *sigh*
#infosec #DMARC #Spamhaus #SysAdmin #EmailAdmin #healthInsurance
Running our own mail servers comes with challenges, but using third-party services like SES or SendGrid means trusting their processes for delisting. Either way, dealing with blocklists is part of the game, and it’s not fun. Sigh. #EmailAdmin #selfhosted

CORRECTION!

I made a post about OPENPGPKEY DNS records, and turns out I misread the content relating to it. It is the hash as bytes that is truncated, not the digest itself.

I have corrected my DNS records, the script at https://gist.github.com/TruncatedDinoSour/a0874bf1e90647a9a49985e531d9d15f and the blog post at https://blog.ari.lt/b/openpgpkey-records-are-cool/ - It was an honest mistake!

Regardless, all good now and I have put in efforts to retract the wrong version ASAP 😭 The RFC by “octets” means a byte in the actual hash of sha-256 output, not the hex digest.

Anyway, you should still set OPENPGPKEY stuff up :p Ofc now hearing with CORRECT information :D

#email #pgp #gpg #sysadmin #emailadmin #dns #rfc

OPENPGPKEY DNS record generator implementing RFC 7929 (https://www.rfc-editor.org/rfc/rfc7929.txt)

OPENPGPKEY DNS record generator implementing RFC 7929 (https://www.rfc-editor.org/rfc/rfc7929.txt) - pgpkeydns.sh

Gist
Hello #MailServer maintainers! If you are using rbl.realtimeblacklist.com, you should be aware that as of around 4am US/Eastern this morning their domain has been parked and is returning bogus #DNSBL results. I suspect that the registration lapsed and a domain resale stalker snapped it up, though I can't say for certain. Perhaps it's a temporary blip that will be resolved, but you should stop using it in the meantime.
#SysAdmin #SMTP #EmailAdmin

"Why are you rejecting our emails?”

“Your SPF doesn’t include the servers your mail comes from.”

“What’s SPF?”

“A thing that says which servers can send mail for your domain.”

“Why do I need to do that? I don’t have problems writing to anyone else.”

“You will, and you really should fix it. Just let your mail admin know.”

“OK fine, but I’m the mail admin… so how do I fix it?”

“You just have to update a DNS record.”

“What’s DNS?”

💀 💀 💀

#SysAdmin #EmailAdmin

Received a bunch of phishing messages from random senders at the domain of a large, prestigious university. They passed SPF checks, so out of curiosity I looked up their record. It includes two entire /16 networks. And to top it off their DMARC policy is set to “none”. 😭 #SysAdmin #EmailAdmin

If anyone is following along, I came up with a solution to my Gmail gateway.

It’s bash because is there any other way?

It scrapes Google’s list of networks from DNS and collects them in a temp file.

If a network isn’t already allowed in iptables, a rule gets added.

It diffs against my production list. If the files don’t match it updates the production one and restarts Postfix.

The file is assigned to mynetworks in Postfix:
mynetworks = /etc/postfix/mynetworks.cidr

#SysAdmin #EmailAdmin