CloudInsidr

Cyber security, infotech

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

Follow us on Twitter: @cloudinsidr
  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home cloud, edge and everything in between DNS How to set up DMARC
How to set up DMARC

Cloud Insidr 2018-12-17 Leave a Comment

How to set up DMARC

The relentless onslaught of spam continues to drive mail administrators up the proverbial wall. DMARC, the unofficial successor to SPF (Sender Policy Framework), holds the promise of more email legitimacy, but can it deliver? Here is how you can put DMARC to the test.

Step 1. Verify your DNS configuration

Make sure you have your A/AAA and MX records set up correctly. For IPv4 traffic, your DNS zone needs at least one record of type A pointing to an IPv4 address; for IPv6 traffic, you need at least one record of the type AAA pointing to a valid IPv6 record (currently, the latter one is optional, but this will change).

Step 2. Set up SPF

DMARC relies on Sender Policy Framework (SPF). You will need a valid SPF record to set up DMARC. Make sure it’s one of the type TXT; the type SPF is deprecated. A valid SPF record could look something like this:

"v=spf1 ip4:12.23.34.567 ip4:34.43.24.65 a:smtp.yourdomain.tld a mx ?all"

Increment your SOA serial number, save your changes and wait for your NS servers to catch up. (Your configuration changes may not reflect in testing tools immediately.)

To validate or pre-validate your SPF syntax, head over to of these services:

https://www.dmarcanalyzer.com/spf/checker/

https://vamsoft.com/support/tools/spf-syntax-validator

Step 3. Generate and test your DMARC record

We recommend the DMARC RECORD GENERATOR by MX TOOLBOX available at:

https://mxtoolbox.com/DMARCRecordGenerator.aspx

Make sure you check out all options available in the wizard. Copy the generated record into a text editor and adjust the mailto: options to reflect your desired setup.

Next, test your DMARC record thoroughly. We recommend the DMARC Inspector by DMARcian:

DMARC Inspector

This utility lists all DMARC tags it discovers as well as implicit tags (those that take effect even though you have not declared them) and explains each one in plain English. Another service worth trying is Fraudmarc.

Step 4. Complete your DNS configuration

You can send DMARC reports either to an email address on the same domain (Option A) or on another domain (Option B).

DMARC configuration example on Route 53
DMARC configuration example on Route 53

Option A. Send DMARC reports to an email address on the same domain

If you intend to send DMARC reports to an email address on the same domain they are generated for, use the following settings:

label: _dmarc.yourdomain.tld.
type: TXT
alias: no
TTL (in seconds, example value): 300
Value (example value, enter without quotes): "v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.tld; ruf=mailto:dmarc@yourdomain.tld; fo=1; adkim=r; aspf=r"

With this setup, emails will be delivered even if they fail DMARC validation.

Select the routing policy and save the record set. Be sure to increment your SOA serial.

You are now ready to validate your DMARC record (see step 5 below).

Option B. Send DMARC reports to an email address on another domain

To send your DMARC reports outside of the domain that generates them, you need to authorize the other domain to receive them. Here is how to do that.

[Option B, step 1.] Create a new record set in the zone that will send DMARC reports

label: _dmarc.domain-that-sends-DMARC-reports.tld.
type: TXT
alias: no
TTL (in seconds, example value): 300
Value (example value, enter without quotes): "v=DMARC1; p=none; rua=mailto:dmarc@domain-that-receives-reports.tld; ruf=mailto:dmarc@yourdomain-that-receives-reports.tld; fo=1; adkim=r; aspf=r"
Select the routing policy and save.

[Option B, step 2.] Create a new record set in the zone that will receive DMARC reports

Open the DNS configuration of the zone that will receive your DMARC reports for yourdomain.tld. Create a new record set using these settings:

label (omit the angle brackets): <domain-that-sends-DMARC-reports.tld>._report._dmarc.<domain-that-receives-reports.tld>.
type: TXT 
alias: no
TTL (in seconds, example value): 300
Value (example value, enter without quotes): "v=DMARC1"

Select the routing policy and save. Be sure to increment your SOA serial.

You are now ready to validate your DMARC record (see step 5 below).

Step 5. Keep a watchful eye on your DMARC reports

Verify changes to your DNS configuration using one of the services listed in Step 3 above.

Going forward, you will need to keep an eye on your DMARC reports, particularly if you intend to use a restrictive configuration. It almost goes without saying that if you encounter any undesirable activity, you should take action on the reports immediately.

Filed Under: DNS, mail servers Tagged With: DMARC, DNS, email, SPF

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe

SSL/TLS Certificate Square (250 x 250)

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

Recent Posts

  • Upgrading from CentOS 6 to CentOS 7 and Beyond?
  • How To Figure Out Who is Signing In To Dovecot to Send or Retrieve Email
  • OpenSSH 9.9 Introduces Enhanced Quantum-Resistant Algorithms
  • OpenSSL 3.3 Final Release is now live!
  • How to Activate HTTP/2 with TLS 1.3 Encryption in NGINX for Secure Connections without a Performance Penalty
  • Is AWS sucking your budget dry? Strip it down to the nitty-gritty (without breaking stuff)
  • How to attach and mount an NVMe EBS volume on EC2
  • SELinux security contexts: correcting SELinux labels on a file system
  • Intel gobbling up Israeli Tower Semiconductor, Stock Goes Through The Roof
  • NGINX on AWS EC2: setting up a web server from scratch on a domain of your choice
  • Log4j RCE and mitigation techniques
  • Set up logrotate for Postfix

Symantec

Categories

  • administration and orchestration
  • alerts
  • AWS
  • Bitcoin
  • cloud, edge and everything in between
  • cryptocurrencies
  • cybersecurity and cyber warfare
  • databases
  • DNS
  • encryption
  • events
  • FinTech and InsurTech
  • homeland security
  • HTTP Security Headers
  • industries
  • industry analysis
  • industry gossip
  • Java
  • Linux
  • mail servers
  • networking
  • news
  • NGINX
  • people
  • php-fpm
  • reviews
  • SELinux
  • tips and tricks
  • Uncategorized
  • web servers in the cloud

Tags

AMI AWS AWS EBS Azure certificate cipher suites cryptography cyber defense cybersecurity cyber security Diffie-Hellman DNS DNS over HTTPS Dovecot EBS EC2 email encryption Fedora HTTP/2 HTTPS IBM letsencrypt Linux logs MariaDB MFA MySQL NGINX OpenSSL permissions php-fpm PHP 7 postfix RegEx Route 53 RSA SELinux SQL SSH SSL TLS TLS 1.3 TLS vulnerabilities WordPress

Archives

  • January 2025
  • November 2024
  • October 2024
  • May 2024
  • January 2023
  • March 2022
  • February 2022
  • December 2021
  • December 2020
  • November 2020
  • September 2020
  • January 2020
  • November 2019
  • August 2019
  • July 2019
  • April 2019
  • December 2018
  • October 2018
  • September 2018
  • August 2018
  • June 2018
  • May 2018
  • April 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • August 2017
  • April 2017
  • February 2017
  • January 2017
  • November 2016
  • September 2016
  • August 2016
  • July 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • July 2015
  • February 2015

Recent Comments

    Wicked fast Networking (With a Government Clearance to Boot)

    ©2022 CybrAnalytiqa OÜ

    • Content purchasing and syndication